Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Electronic Science and Technology
1674-862X
2011 Issue 4
optimal static partition configuration in arinc653 system
Sheng-Lin Gui;Lei Luo;Sen-Sen Tang;Yang Meng
..............page:373-378
security architecture on the trusting internet of things
Bing Zhang;Xin-Xin Ma;Zhi-Guang Qin
..............page:364-367
information
..............page:381-382
steganalysis using fractal block codes and ap clustering in grayscale images
Guang-Yu Kang;Yu-Xin Su;Shi-Ze Guo;Rui-Xu Guo;Zhe-Ming Lu
..............page:312-316
enhanced delegation based authentication protocol for secure roaming service with synchronization
Hsing-Bai Chen;Yung-Hsiang Lai;Kuei-Wan Chen;Wei-Bin Lee
..............page:345-351
guest editorial special issue on information security
Chin-Chen Chang;Chia-Chen Lin
..............page:289-290
a novel shopping protocol for ubiquitous commerce
Iuon-Chang Lin;Hsiao-Chi Chiang
..............page:359-363
a novel scheme for compression of cash images
Li Li;Feng Wang;Jian-Feng Lu;Da-Xing Zhang
..............page:301-305
construction of general (k, n) probabilistic visual cryptography scheme
Ching-Nung Yang;Chih-Cheng Wu;Feng Liu
..............page:317-324
block-based adaptive image steganography using lsb matching revisited
Wei Huang;Yao Zhao;Rong-Rong Ni
..............page:291-296
a photo certificate a framework for generating visualized public key certificates
Wei-Bin Lee;Chien-Chen Huang;Chia-Chen Lin
..............page:339-344
double-layer data embedding scheme based on three-pixel differences
Yi-Hui Chen;Chiao-Chih Huang;Chi-Shiang Chan
..............page:297-300
an improved user authentication and key agreement scheme providing user anonymity
Ya-Fen Chang;Pei-Yu Chang
..............page:352-358
a visual secret sharing scheme for progressively restoring secrets
Chin-Chen Chang;Yi-Pei Hsieh;Chi-Cheng Liao
..............page:325-331