|
Search the dblp DataBase
Yuan-Liang Tang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yuan-Liang Tang, Ching-Ting Chen
Image Authentication Using Relation Measures of Wavelet Coefficients. [Citation Graph (0, 0)][DBLP] EEE, 2004, pp:543-547 [Conf]
- Yuan-Liang Tang, Chun-Hung Chen
Image Authentication Using Hierarchical Semi-Fragile Watermarks. [Citation Graph (0, 0)][DBLP] ICETE (3), 2004, pp:284-289 [Conf]
- Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
Two Simple Batch Verifying Multiple Digital Signatures. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:233-237 [Conf]
- Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
An Improvement of SPLICE/AS in WIDE against Guessing Attack. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2001, v:12, n:2, pp:297-302 [Journal]
- Yuan-Liang Tang, Rangachar Kasturi
Tracking moving objects during low altitude flight. [Citation Graph (0, 0)][DBLP] Mach. Vis. Appl., 1996, v:9, n:1, pp:20-31 [Journal]
- Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang
A new convertible authenticated encryption scheme with message linkages. [Citation Graph (0, 0)][DBLP] Computers & Electrical Engineering, 2007, v:33, n:2, pp:133-138 [Journal]
Secure Fast Pre-authentication Based on IEEE 802.11i. [Citation Graph (, )][DBLP]
A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (, )][DBLP]
Efficient Image Recovery Based on Self-Embedding. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|