每週二報 報告紀錄
回首頁
帳號: 密碼:
上傳報告 登出
報告日期 論文標題 論文期刊 論文作者 報告者 分類 下載次數
2018-12-13Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging StreamsIEEE Transactions on Dependable and Secure Computing, Vol. 15, pp. 840- 852, Sept. 2018Nurzhan Zhumabekuly Aitzhan, Davor Svetinovic簡楷帆other11
2018-12-13High-fidelity reversible data hiding by Quadtree-based pixel value orderingMultimedia Tools and Applications, 2018, pp 1–17Fuqiang Di, Minqing Zhang, Xin Liao, Jia Liu王旭image13
2018-12-13Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging StreamsIEEE Transactions on Dependable and Secure Computing, Vol. 15, pp. 840- 852, Sept. 2018Nurzhan Zhumabekuly Aitzhan, Davor Svetinovic簡楷帆other5
2018-12-06Controllable and Trustworthy Blockchain-based Cloud Data ManagementFuture Generation Computer Systems, Vol. 91, pp. 527-535, Feb. 2019Lie-Huang Zhu, Yu-Lu Wu, Ke-Ke Gai, and Kim-Kwang Raymond Choo楊仁凱other13
2018-12-06An Efficient MSB Prediction-based Method for High-capacity Reversible Data Hiding in Encrypted ImagesIEEE Transaction on Information Forensics and SecurityPauline Puteaux and William Puech苏国栋image21
2018-12-02Controllable and Trustworthy Blockchain-based Cloud Data ManagementFuture Generation Computer Systems, Vol. 91, pp. 527-535, Feb. 2019Lie-Huang Zhu, Yu-Lu Wu, Ke-Ke Gai, and Kim-Kwang Raymond Choo楊仁凱other15
2018-11-29Improving recovered image quality in secret image sharing by simple modular arithmeticSignal Processing: Image Communication, Volume 66, Pages 42-49, August 2018Xiaotian Wu, Ching-Nung Yang, Yi Ting Zhuang, Shen-Chieh Hsu 李琳image14
2018-11-29Improving recovered image quality in secret image sharing by simple modular arithmeticSignal Processing: Image Communication, Volume 66, Pages 42-49, August 2018Xiaotian Wu, Ching-Nung Yang, Yi Ting Zhuang, Shen-Chieh Hsu 李琳security18
2018-11-29Significant Permission Identification for Machine-Learning-Based Android Malware DetectionIEEE Transactions on Industrial informatics, Vol. 14, No. 7, pp.3216-3225, July 2018.Jin Li, Lichao Sun, Qiben Yan , Zhiqiang Li, Witawas Srisa-an , and Heng Ye 李心瑜other23
2018-11-22A Novel Electricity Transaction Mode of Microgrids based on Blockchain and Continuous Double AuctionEnergies, vol. 10, no. 12, pp. 1-22, November 2017Jian Wang, Qiang-Gang Wang, Nian-Cheng Zhou, and Yuan Chi周澤捷other13
2018-11-22Lightweight IoT-based authentication scheme in cloud computing circumstanceFuture Generation Computer Systems Volume 91, February 2019, Pages 244-251Lu Zhou , Xiong Li , Kuo-Hui Yeh , Chunhua Su , Wayne Chiu鄭耀主security27
2018-11-22Lightweight IoT-based authentication scheme in cloud computing circumstanceFuture Generation Computer Systems Volume 91, February 2019, Pages 244-251 Lu Zhou , Xiong Li , Kuo-Hui Yeh , Chunhua Su , Wayne Chiu鄭耀主security20
2018-11-22A Novel Electricity Transaction Mode of Microgrids Based on Blockchain and Continuous Double AuctionEnergies, Vol. 10, No. 12, November 2017Jian Wang, Qiang-Gang Wang, Nian-Cheng Zhou, and Yuan Chi周澤捷other24
2018-11-15An efficient authentication method for AMBTC compressed images using adaptive pixel pair matchingMultimedia Tools and Applications, Volume 77, Issue 4, February 2018, pp. 4677–4695Wien Hong, Meijin Chen, Tung Shou Chen, Chien-Che Huang李冠龍image52
2018-11-13Blind Dual Watermarking for Color Images’ Authentication and Copyright ProtectionIEEE Transactions on Circuits and Systems for Video Technology, Vol. 28, No. 5, pp.1047-1055, May 2018.Xiao-Long Liu, Chia-Chen Lin, and Shyan-Ming Yuan何思亮image35
[上一頁]
1/20 頁 [下一頁]