The SCEAS System
| |||||||

## Search the dblp DataBase
Charlie Obimbo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Charlie Obimbo
**A Parallel Algorithm For Determining The Inverse Of A Matrix For Use In Block Cipher Encryption And Decryption.**[Citation Graph (0, 0)][DBLP] CSC, 2005, pp:164-172 [Conf] - Charlie Obimbo, Nhi Tonnu
**A System That Can Enhance E-Business In The Developing World.**[Citation Graph (0, 0)][DBLP] CSREA EEE, 2005, pp:68-74 [Conf] - Charlie Obimbo, Rohit Makhijani
**An Online Linking System for Researchers.**[Citation Graph (0, 0)][DBLP] International Conference on Internet Computing, 2004, pp:455-458 [Conf] - Gary William Grewal, Mike O'Cleirigh, Charlie Obimbo
**Hierarchical Genetic Algorithms Applied to Datapath Synthesis.**[Citation Graph (0, 0)][DBLP] IC-AI, 2003, pp:994-1002 [Conf] - Gary William Grewal, Ming Xu, Charlie Obimbo
**An Approximate Solution for Steiner Trees in Multicast Routing.**[Citation Graph (0, 0)][DBLP] IC-AI, 2004, pp:707-711 [Conf] - Anthony Koso, Andrew Turi, Charlie Obimbo
**Embedding Digital Signatures in MP3s.**[Citation Graph (0, 0)][DBLP] IMSA, 2005, pp:271-274 [Conf] - Ming Xu, Behzad Salami, Charlie Obimbo
**How to Protect Personal Information against Keyloggers.**[Citation Graph (0, 0)][DBLP] IMSA, 2005, pp:275-280 [Conf] - Charlie Obimbo, Stephen Doxsee
**The Threat of a Deterministic Polynomial Time Algorithm for Primality Testing in Applied Cryptography.**[Citation Graph (0, 0)][DBLP] MSV/AMCS, 2004, pp:423-426 [Conf] - Charlie Obimbo, Liliana M. Arboleda C., Yunfeng Chen
**A Watchdog Enhancement to IDS in MANET.**[Citation Graph (0, 0)][DBLP] Wireless and Optical Communications, 2006, pp:- [Conf] - Charlie Obimbo, JingBo Ni
**A grey-level image watermarking method based on block DCT and statistic correlation adjustment.**[Citation Graph (0, 0)][DBLP] Communication, Network, and Information Security, 2006, pp:22-27 [Conf] - Behzad Salami, Charlie Obimbo
**A multi-bitwatermark generation algorithm with properties of error correction.**[Citation Graph (0, 0)][DBLP] Communication, Network, and Information Security, 2006, pp:44-49 [Conf] - Charlie Obimbo, Behzad Salami
**A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption.**[Citation Graph (0, 0)][DBLP] The Journal of Supercomputing, 2007, v:39, n:2, pp:113-130 [Journal] **An Adaptive Coding Algorithm for Secret Transmission of Information.**[Citation Graph (, )][DBLP]**An Intrusion Detection System for Mobile Ad-Hoc Networks.**[Citation Graph (, )][DBLP]**Approximating the Vertex Cover Problem by Selection of Nodes of Maximum Degrees for use in Wireless Sensor Networks.**[Citation Graph (, )][DBLP]**Using the HC for Shape Representation and Description.**[Citation Graph (, )][DBLP]**A Watermark Generation Algorithm Using The Mersenne Twister.**[Citation Graph (, )][DBLP]**Near-linear wirelength estimation for FPGA placement.**[Citation Graph (, )][DBLP]
Search in 0.013secs, Finished in 0.014secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |