搜索筛选:
搜索耗时4.6448秒,为你在为你在102,285,761篇论文里面共找到 23 篇相符的论文内容
类      型:
[期刊论文] 作者:Chin-Chen Chang,, 来源:Journal of Electronic Science and Technology 年份:2012
This paper proposes a new proactive weighted threshold signature scheme based on Iftene’s general secret sharing, the generalized Chinese remainder theorem, an...
[期刊论文] 作者:Cheng Guo,Chin-Chen Chang, 来源:电子科技学刊:英文版 年份:2012
This paper proposes a new proactive weighted threshold signature scheme based on Iftene's general secret sharing, the generalized Chinese remainder theorem,...
[期刊论文] 作者:Chin-Chen Chang Ming-Shiang Hw, 来源:电子科技学刊:英文版 年份:2012
Because of the advanced developments in information technology and networking,a user can easily communicate with others via the Intemet....
[期刊论文] 作者:Chin-Chen Chang,Chia-Chen Lin, 来源:电子科技学刊:英文版 年份:2011
The Internet is a popular channel for allowing more and more users to exchange information without geographical limitations and time restrictions. Therefore...
[期刊论文] 作者:Chia-Chen Lin,Chin-Chen Chang,, 来源:电子科技学刊:英文版 年份:2012
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such...
[期刊论文] 作者:Chin-Chen Chang,Yung-Chen Chou,, 来源:Journal of Electronic Science and Technology 年份:2013
With the advanced developments in information technology and networking,a user can easily communicate with others via the Internet.In daily life,users can make orders of products through the e-commerc...
[期刊论文] 作者:Chin-Chen Chang,Chia-Chen Lin,, 来源:Journal of Electronic Science and Technology 年份:2011
The Internet is a popular channel for allowing more and more users to exchange information without geographical limitations and time restrictions. Therefore, a...
[期刊论文] 作者:Chin-Chen Chang,Jung-San Lee,, 来源:Journal of Electronic Science and Technology 年份:2010
Compared with the traditional cryptography,visual cryptography(VC) decrypts secret images referring to the characteristics of human vision,rather than the crypt...
[期刊论文] 作者:Chin-Chen Chang,Ming-Shiang Hwang,, 来源:Journal of Electronic Science and Technology 年份:2012
Because of the advanced developments in information technology and networking, a user can easily communicate with others via the Internet. In daily life, users...
[期刊论文] 作者:Chin-Chen Chang,Yi-Pei Hsieh,, 来源:Journal of Electronic Science and Technology 年份:2011
Visual secret sharing has received more and more attention over the past years due to the fact that neither complex computation nor cryptographic knowledge is required to decrypt the secret image dire...
[期刊论文] 作者:Chin-Chen Chang,Yi-Pei Hsieh,C, 来源:电子科技学刊:英文版 年份:2011
视觉秘密分享由于既不复杂计算也不密码的知识被要求根据人的视觉 system.Considering 的特征直接解密秘密图象的事实在过去的年收到了越来越多的注意与有意义的阴影在多重图...
[期刊论文] 作者:Chin-Chen Chang,Bo Li,Jung-San, 来源:电子科技学刊:英文版 年份:2010
与传统的秘密成员相比 -- graphy,视觉密码学(VC ) 解密指人的视觉,而非密码学知识或复杂计算的特征的秘密图象。而且,看到秘密钥匙的自由,象为视觉密码学的解密一样的加密的整个......
[期刊论文] 作者:Chin-Chen Chang,Yi-Pei Hsieh,C, 来源:电子科技学刊 年份:2004
Visual secret sharing has received more and more attention over the past years due to the fact that neither complex computation nor cryptographic knowledge is r...
[期刊论文] 作者:Chin-Chen Chang,Bo Li,Jung-San, 来源:电子科技学刊 年份:2004
Compared with the traditional crypto- graphy, visual cryptography (VC) decrypts secret images referring to the characteristics of human vision, rather than the...
[期刊论文] 作者:Chia-Chi Wu,Chin-Chen Chang,Iu, 来源:计算机科学技术学报(英文版) 年份:2004
Electronic sealed-bid auction schemes usually have a common drawback, the third party (auction host) can conspire with a malicious bidder to leak all bidding pr...
[期刊论文] 作者:Zhi-Hui Wang,Chin-Chen Chang,T, 来源:电子科技学刊:英文版 年份:2013
Information hiding schemes based on vector quantization(VQ) usually require lengthy VQ encoding and decoding processes.In this paper,we propose an efficient inf...
[期刊论文] 作者:Zhi-Hui Wang,Cheng Guo,Chin-Chen Chang,, 来源:Journal of Electronic Science and Technology 年份:2013
Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. B...
[期刊论文] 作者:Wei-Bo Chu,Li-Fang Wang,Ze-Jun Jiang,Chin-Chen Chang, 来源:计算机科学技术学报(英文版) 年份:2017
In-network caching is a fundamental mechanism advocated by information-centric networks (ICNs) for efficient content delivery. However, this new mechanism also...
[期刊论文] 作者:Rong Wang,Yan Zhu,Tung-Shou Chen,Chin-Chen Chang, 来源:计算机科学技术学报(英文版) 年份:2018
Although k-anonymity is a good way of publishing microdata for research purposes,it cannot resist several common attacks,such as attribute disclosure and the si...
[期刊论文] 作者:Hsien-Hsi Hsieh,Chin-Chen Chang,Wen-Kai Tai,Han-Wei Shen, 来源:计算机科学技术学报(英文版) 年份:2010
This paper presents a novel geometrical voxelization algorithm for polygonal models. First, distance computation is performed slice by slice on graphics process...
相关搜索: