Method of trajectory privacy protection based on restraining trajectory in LBS.
Int. J. Inf. Commun. Technol., 2018
The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network.
Comput. Inf. Sci., 2010
Steganalysis on echo hiding based on combinatorial high order statistics.
Proceedings of the First International Conference on Internet Multimedia Computing and Service, 2009
The Tight Error Linear Complexity of Periodic Sequences.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Computing the m-Tight Error Linear Complexity of Periodic Binary Sequences.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Payment Scheme for Multi-Party Cascading P2P Exchange.
Proceedings of the Integration and Innovation Orient to E-Society, 2007
An ID-based Anonymous Proxy Signature From Bilinear Pairings.
Proceedings of the 2006 International Conference on Security & Management, 2006