168 results on '"Jan, Jinn-Ke"'
Search Results
2. An Interpolative AMBTC-based high-payload RDH scheme for encrypted images
3. A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
4. A Reversible Data Hiding Scheme in AMBTC Compression Code Using Joint Neighborhood Coding
5. A novel deployment of smart cold chain system using 2G-RFID-Sys
6. A Secure Authentication Scheme for a Public Terminal Before a Transaction
7. Senary Huffman Compression – A Reversible Data Hiding Scheme for Binary Images
8. A Reversible Data Hiding Scheme in AMBTC Compression Code Using Joint Neighborhood Coding
9. The Design of AATIS Emergency Access Authorization for Personally Controlled Online Health Records
10. An innovative RFID-embedded certificate mechanism for applying and recruiting of jobs
11. The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
12. Towards secure and efficient user authentication scheme using smart card for multi-server environments
13. A cocktail protocol with the Authentication and Key Agreement on the UMTS
14. A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System
15. A Secure EHR System Based on Hybrid Clouds
16. A Design of Tamper Resistant Prescription RFID Access Control System
17. A Provable Billing Protocol on the Current UMTS
18. A Mobile Ticket System Based on Personal Trusted Device
19. An innovative revocation scheme for one-to-many E-services
20. A simple mobile communication billing system among charged parties
21. The UMTS-AKA Protocols for Intelligent Transportation Systems
22. A fair and secure mobile billing system
23. A hybrid authentication protocol for large mobile network
24. Authenticated encryption schemes with message linkages for message flows
25. A modified remote login authentication scheme based on geometric approach
26. Design of a fair proxy raffle protocol on the Internet
27. A novel proxy deposit protocol for e-cash systems
28. Solving the invalid signer-verified signature problem and comments on Xia–You group signature
29. Improved authenticated multiple-key agreement protocol without using conventional one-way function
30. Cryptanalysis of log-in authentication based on circle property
31. A provable secure access control using smart cards
32. New hierarchical assignment without public key cryptography
33. An efficient and practical solution to remote authentication: smart card
34. Cryptanalysis on Mu–Varadharajan’s e-voting schemes
35. The UMTS-AKA Protocols for Intelligent Transportation Systems
36. Forgery attacks on 'multisignature schemes for authenticating mobile code delegates'
37. Cryptanalysis of Liaw's broadcasting Cryptosystem
38. A displacement addressing method for letter-oriented keys
39. A novel ID-based group signature
40. The UMTS-AKA protocols for intelligent transportation systems
41. Effective quality improvement of upscaled images by differential image scheme
42. The Design of Secure Group Communication with Contributory Group Key Agreement Based on Mobile Ad Hoc Network
43. Equalized CR-dropping for Image Compression
44. A Secure Anonymous E-Voting System based on Discrete Logarithm Problem
45. Senary Huffman Compression – A Reversible Data Hiding Scheme for Binary Images
46. A Secure Authentication Scheme for a Public Terminal Before a Transaction
47. A high capacity data hiding scheme for binary images based on block patterns
48. The design of speedy seamless safe messaging mechanism in VANET
49. The Light-Weighted Coding Schemes for Images Sharing on Mobile Devices
50. Study and Implementation of RFID Eseals for Power Meters
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.