Adaptive Reversible Data Hiding for JPEG Images
Zhang, Hao (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Yin, Zhaoxia (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Zhang, Xinpeng (School of Communication and Information Engineering, Shanghai University, Shanghai 200072, P.R. China); Chen, Jianpeng (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Wang, Ruonan (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China); Chen, Xianyi (School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing 210044, China); Luo, Bin (Key Laboratory of Intelligent Computing & Signal Processing, Ministry of Education, Anhui University, Hefei 230601, P.R. China)
A Survey Study on Mobile Phone Usage and Security Concerns of Young Generation
Zhang, Sonya ; Costa, Saree (Cal Poly Pomona)
Analysis of network audit in the environment of electronic commerce
hu, yan-ling
Delay-tolerant Network Based Secure Transmission System Design
Ming, Gang (School of information Science and Engineering, University of Jinan); Chen, Zhenxiang (Shandong Provincial Key Laboratory of Network Based Intelligent Computing)
An Internal Waves Detection Method Based on PCANet for Images Captured from UAV
Wang, Shengke (Ocean University of China); Dong, Qinghong (Ocean University of China); Dong, Junyu (Ocean University of China)
A Revocable Outsourcing Attribute-based Encryption Scheme
Jiang, Zoe L. (Harbin Institute of Technology Shenzhen Graduate School); Zhang, Ruoqing (The University of Hong Kong); Liu, Zechao (Harbin Institute of Technology Shenzhen Graduate School); Yiu, SM (The University of Hong Kong); Hui, Lucas (The University of Hong Kong); Fang, Junbin (Jinan University); Wang, Xuan (Harbin Institute of Technology Shenzhen Graduate School)
Generalized Format-preserving Encryption for Character Data
Guo, Jia (Nankai University); Liu, Zheli (Nankai University)
Efficiency Improved Format-Preserving Encryption Method for Integer
Guo, Jia (Nankai University); Liu, Zheli (Nankai University)
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System
Li, Zhen (Shandong University); Zhao, Minghao (Shandong University); Xu, Qiuliang (Shandong University)
Operational-behavior Auditing in Cloud Storage
Chen, Zhaoyi (National Huaqiao University); Tian, Hui (National Huaqiao University); Lu, Jing (National Huaqiao University); Cai, Yiqiao (National Huaqiao University); Wang, Tian (National Huaqiao University); Chen, Yonghong (National Huaqiao University)
Face Recognition based on the Fusion of Wavelet Packet Sub-images and Fisher Linear Discriminant
Tang, Wenjing (College of Information and Electrical Engineering, Ludong University); Gong, Fei (Faculty of Electrical Engineering and Computer Science, Ningbo University); Dong, Renren (College of Information and Electrical Engineering, Ludong University); Wang, Yilei (College of Information and Electrical Engineering, Ludong University); Sun, Yujuan (College of Information and Electrical Engineering, Ludong University)
One Algorithm for Image Segmentation Based on Improved Pixel Relevance and Non-local Information
Song, Lihua (Ludong Unviersity); Sun, Yujuan (Ludong Unviersity); Zhang, xiaofeng (Ludong University)
Ring Signature Scheme from Multilinear Maps in The Standard Model
Han, Hongzhang (Department of Computer Engineering, Jiangsu University of Technology)
ID-based Multi-Recipient Public Key Encryption Scheme in the Standard Model
Jing, Zheng Jun (Department of Computer Engineering, Jiangsu University of Technology); Li, Jin (Department of Computer, Guangzhou University); Gu, Chunsheng (Department of Computer Engineering, Jiangsu University of Technology); Qian, Jin (Department of Computer Science, City University of Hong Kong); Wu, Fangsheng (Department of Computer Engineering, Jiangsu University of Technology)
Verifiable public key encryption with keyword search secure against continual memory attacks
Hu, Chengyu (School of Computer Science and Technology, Shandong University); Liu, Pengtao (Shandong University of Political Science and Law); Yang, Rupeng (School of Computer Science and Technology, Shandong University); Guo, Shanqing (School of Computer Science and Technology, Shandong University)
Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud
Chen, Lanxiang (School of Mathematics and Computer Science, Fujian Normal University); Zhang, Nan (School of Mathematics and Computer Science, Fujian Normal University)
Secure Searchable Public-Key Encryption for Cloud Storage
run, xie (School of Computer Science and Engineering , University of Electronic Science and Technology of China); Chunxiang, Xu (School of Computer Science and Engineering , University of Electronic Science and Technology of China); Fagen, Li (School of Computer Science and Engineering , University of Electronic Science and Technology of China); Changlian, He (School of Computer and Information Engineering, Yibin University, Yibin, China)
Contactless Multiple Palm Features Extraction Method
wei, li ; qi, Yuanwei (Computer Vision Group, Shenyang University of Technology, Shenyang 110870, China)
A Semantic Orientation Distinction Method for Opinion Mining in Tibetan Language
wangyi, lei
Kernel Bilinear Discriminant Analysis for Face Recognition
Liu, Xiaozhang
Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks
Shi, Run-hua (School of Computer Science and Technology, Anhui University); Zhang, Shun(School of Computer Science and Technology, Anhui University)