|
Search the dblp DataBase
Ching-Nung Yang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:433-447 [Conf]
- Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih
Authorized Tracking and Tracing for RFID Tags. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:435-444 [Conf]
- Ching-Nung Yang, Tse-Shih Chen
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2005, pp:19-28 [Conf]
- Ching-Nung Yang, Tse-Shih Chen
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation. [Citation Graph (0, 0)][DBLP] ICIAR, 2005, pp:1167-1174 [Conf]
- Ching-Nung Yang, Tse-Shih Chen
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels. [Citation Graph (0, 0)][DBLP] ICIAR, 2005, pp:1184-1191 [Conf]
- Ching-Nung Yang, Tse-Shih Chen
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions. [Citation Graph (0, 0)][DBLP] ICIAR (1), 2006, pp:468-479 [Conf]
- Ching-Nung Yang, Hsu-Tun Teng
An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment. [Citation Graph (0, 0)][DBLP] CEC, 2003, pp:45-48 [Conf]
- Ching-Nung Yang, Chi-Sung Laih
New Colored Visual Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2000, v:20, n:3, pp:325-336 [Journal]
- Ching-Nung Yang, Chi-Sung Laih
A Note on Error-Correcting Codes for Authentication and Subliminal Channels. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1997, v:62, n:3, pp:141-143 [Journal]
- Chen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang
New Audio Secret Sharing Schemes With Time Division Technique. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2003, v:19, n:4, pp:605-614 [Journal]
- Ching-Nung Yang
A Note on Efficient Color Visual Encryption. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:367-372 [Journal]
- Ching-Nung Yang
Improvements on Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:381-391 [Journal]
- Ching-Nung Yang
A Note on Efficient Color Visual Encryption. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:367-372 [Journal]
- Ching-Nung Yang
Improvements on Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:381-391 [Journal]
- Ching-Nung Yang, Tse-Shih Chen
Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. [Citation Graph (0, 0)][DBLP] Pattern Recognition, 2006, v:39, n:7, pp:1300-1314 [Journal]
- Ching-Nung Yang
New visual secret sharing schemes using probabilistic method. [Citation Graph (0, 0)][DBLP] Pattern Recognition Letters, 2004, v:25, n:4, pp:481-494 [Journal]
- Ching-Nung Yang, Tse-Shih Chen
Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. [Citation Graph (0, 0)][DBLP] Pattern Recognition Letters, 2005, v:26, n:2, pp:193-206 [Journal]
- Chi-Sung Laih, Ching-Nung Yang
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1996, v:45, n:1, pp:103-108 [Journal]
- Ching-Nung Yang, Dong-Jing Lee
Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2006, v:55, n:7, pp:924-927 [Journal]
- Ching-Nung Yang, Chi-Sung Laih
DCm Codes for Constructing t-EC/AUED Codes. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 1998, v:47, n:4, pp:492- [Journal]
- Ching-Nung Yang
Design of efficient second-order spectral- codes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:4, pp:1580-1584 [Journal]
- Ching-Nung Yang, Guo-Jau Chen
A comment on "Systematic single asymmetric error-correcting Codes". [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1214-1217 [Journal]
- Ching-Nung Yang, Kun-Hsuan Yu, Rastislav Lukac
User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes. [Citation Graph (0, 0)][DBLP] MMM (2), 2007, pp:443-452 [Conf]
- Ching-Nung Yang, Tse-Shih Chen, Kun-Hsuan Yu, Chung-Chun Wang
Improvements of image sharing with steganography and authentication. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:7, pp:1070-1076 [Journal]
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. [Citation Graph (, )][DBLP]
Micropayment schemes with ability to return changes. [Citation Graph (, )][DBLP]
Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in P2P information systems. [Citation Graph (, )][DBLP]
Visual Cryptography Schemes with Reversing. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.005secs
|