Showing results 3 to 7 of 7
Identity-based chameleon hash scheme without key exposure Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05 |
Identity-based secret signature scheme LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24 |
Practical threshold signatures without random oracles Li, J.; Yuen, T.H.; Kim, Kwangjo, 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, pp.198 - 207, 2007 |
Reversible data hiding giving priority to the use of edges and textures Hu, Y.; Lee, Heung-Kyu; Li, J., 5th International Conference on Visual Information Engineering, VIE 2008, no.543 CP, pp.643 - 647, IEEE, 2008-07-29 |
Reversible data hiding using prediction error values embedding Hu, Y.; Lee, Heung-Kyu; Li, J.; Chen, K., 6th International Workshop on Digital Watermarking, IWDW 2007, pp.244 - 253, Springer Verlag, 2007-12-03 |
Discover