The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Qiming Li: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Qiming Li, Yagiz Sutcu, Nasir Memon
    Secure Sketch for Biometric Templates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:99-113 [Conf]
  2. Ee-Chien Chang, Qiming Li
    Hiding Secret Points Amidst Chaff. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:59-72 [Conf]
  3. Qiming Li, Ee-Chien Chang
    Security of Public Watermarking Schemes for Binary Sequences. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:119-128 [Conf]
  4. Qiming Li, Ee-Chien Chang
    On the Possibility of Non-invertible Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:13-24 [Conf]
  5. Qiming Li, Ee-Chien Chang, Mun Choon Chan
    On the effectiveness of DDoS attacks on statistical filtering. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:1373-1383 [Conf]
  6. Qiming Li, Ee-Chien Chang
    Public Watermark Detection Using Multiple Proxies and Secret Sharing. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:558-569 [Conf]
  7. Yagiz Sutcu, Qiming Li, Nasir Memon
    Secure Biometric Templates from Fingerprint-Face Features. [Citation Graph (0, 0)][DBLP]
    CVPR, 2007, pp:- [Conf]
  8. Qiming Li, Nasir Memon
    Security Models of Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:60-64 [Conf]
  9. Qiming Li, Ee-Chien Chang
    Robust, short and sensitive authentication tags using secure sketch. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:56-61 [Conf]
  10. Husrev T. Sencar, Qiming Li, Nasir Memon
    A new approach to countering ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:205-214 [Conf]
  11. Qiming Li, Ee-Chien Chang
    Zero-knowledge watermark detection resistant to ambiguity attacks. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2006, pp:158-163 [Conf]

  12. Secure Sketch for Multiple Secrets. [Citation Graph (, )][DBLP]


  13. Practical Security of Non-Invertiblewatermarking Schemes. [Citation Graph (, )][DBLP]


  14. On the security of non-forgeable robust hash functions. [Citation Graph (, )][DBLP]


  15. Optimizing the capacity of distortion-freewatermarking on palette images. [Citation Graph (, )][DBLP]


  16. On the Practical and Security Issues of Batch Content Distribution Via Network Coding. [Citation Graph (, )][DBLP]


  17. A Reversible Data Hiding Scheme for JPEG Images. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002