Filter your results
- 3
- 3
- 3
- 3
- 2
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
3 results
|
|
sorted by
|
|
Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.633-642, ⟨10.1007/978-3-642-55032-4_65⟩
Conference papers
hal-01397281v1
|
||
|
Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter13th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Nov 2014, Ho Chi Minh City, Vietnam. pp.526-534, ⟨10.1007/978-3-662-45237-0_48⟩
Conference papers
hal-01405635v1
|
||
|
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.222-235
Conference papers
hal-01506557v1
|