Gwoboa Horng
Orcid: 0000-0002-6899-7703Affiliations:
- National Chung Hsing University, Taichung, Taiwan
According to our database1,
Gwoboa Horng
authored at least 66 papers
between 1990 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
8
1
1
1
1
3
7
6
5
4
2
1
2
2
4
2
3
1
2
1
1
1
1
1
1
1
1
1
2
3
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2022
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes.
J. Vis. Commun. Image Represent., 2022
2021
J. Supercomput., 2021
2020
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation.
Inf. Sci., 2020
2018
J. Inf. Hiding Multim. Signal Process., 2018
2016
Multim. Tools Appl., 2016
Int. J. Netw. Secur., 2016
Int. J. Netw. Secur., 2016
2015
Reversible data embedding for vector quantization compressed images using search-order coding and index parity matching.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015
Very Effective Multi-Layer Reversible Embedding Method Using Low Distortion Modification.
J. Inf. Hiding Multim. Signal Process., 2015
Dual-Histograms Reversible Data Hiding Capable of Avoiding Underflow/Overflow Problems.
J. Inf. Hiding Multim. Signal Process., 2015
Comput. J., 2015
2014
J. Vis. Commun. Image Represent., 2014
Lossless VQ Indices Compression Based on the High Correlation of Adjacent Image Blocks.
KSII Trans. Internet Inf. Syst., 2014
A New Reference Pixel Prediction for Reversible Data Hiding with Reduced Location Map.
KSII Trans. Internet Inf. Syst., 2014
Int. J. Commun. Syst., 2014
Efficient public key encryption with user-friendly keywords search for searchable cloud storage.
Proceedings of the Intelligent Systems and Applications, 2014
2013
J. Medical Syst., 2013
J. Inf. Hiding Multim. Signal Process., 2013
IET Inf. Secur., 2013
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptol. ePrint Arch., 2013
Digit. Signal Process., 2013
Proceedings of the 9th International Conference on Information, 2013
2012
IEEE Trans. Image Process., 2012
A new authentication based cheating prevention scheme in Naor-Shamir's visual cryptography.
J. Vis. Commun. Image Represent., 2012
J. Medical Syst., 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
IACR Cryptol. ePrint Arch., 2011
On the security models for certificateless signature schemes achieving level 3 security.
IACR Cryptol. ePrint Arch., 2011
2010
J. Educ. Technol. Soc., 2010
2009
Inf. Sci., 2009
Fundam. Informaticae, 2009
2008
Finite Fields Their Appl., 2008
Efficient Vector Quantization Codebook Generation Based on Histogram Thresholding Algorithm.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
A cheating prevention scheme for binary visual cryptography with homogeneous secret images.
Pattern Recognit., 2007
Comput. Stand. Interfaces, 2007
Appl. Math. Comput., 2007
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2007
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007
2006
Appl. Math. Comput., 2006
More Robust Private Information.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the Computational Science, 2006
2005
IEEE Trans. Ind. Electron., 2005
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
IEICE Trans. Commun., 2005
Appl. Math. Comput., 2005
Proceedings of the ITRE 2005, 2005
Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
2004
Protecting the Privacy of Users in e-Commerce Environment.
Proceedings of the 2nd International Conference Computing, 2004
2001
A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing.
J. Inf. Sci. Eng., 2001
2000
J. Inf. Sci. Eng., 2000
1999
Math. Comput., 1999
1998
Inf. Process. Lett., 1998
1996
Comput. Commun., 1996
1995
1990
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, 1990