Citation to this article as recorded by
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690. CrossRefDirect Link |
Lv, M.L. and Z.M. Lu, 2011. An image hashing scheme based on mean-removed vector quantization for multiple purposes. Inform. Technol. J., 10: 120-126. CrossRefDirect Link |
Lv, M.L. and Z.M. Lu, 2011. Multipurpose perceptual image hashing based on block truncation coding. Inform. Technol. J., 10: 207-212. CrossRefDirect Link |
Zeki, A.M., A.A. Manaf, A.A. Ibrahim and M. Zamani, 2011. A robust watermark embedding in smooth areas. Res. J. Inform. Technol., 3: 123-131. CrossRef |
Zeng, W. and Y. Wu, 2010. A visible watermarking scheme in spatial domain using HVS model. Inform. Technol. J., 9: 1622-1628. CrossRefDirect Link |
Zhang, Y., Z.M. Lu and D.N. Zhao, 2010. A blind image watermarking scheme using fast hadamard transform. Inform. Technol. J., 9: 1369-1375. CrossRefDirect Link |
Zhang, Y., Z.M. Lu and D.N. Zhao, 2010. Quantization based semi-fragile watermarking scheme for H.264 video. Inform. Technol. J., 9: 1476-1482. CrossRefDirect Link |
Citation to this article as recorded by
A blind image watermarking scheme using fast hadamard transform. Information Technology Journal Vol. 9, Issue 7, 1369, 2010 |
Quantization based semi-fragile watermarking scheme for H.264 video. Information Technology Journal Vol. 9, Issue 7, 1476, 2010 |
A visible watermarking scheme in spatial domain using HVS model. Information Technology Journal Vol. 9, Issue 8, 1622, 2010 |
An image hashing scheme based on mean-removed vector quantization for multiple purposes. Information Technology Journal Vol. 10, Issue 1, 120, 2010 |
Multipurpose perceptual image hashing based on block truncation coding. Information Technology Journal Vol. 10, Issue 1, 207, 2011 |
Encryption Algorithm of RSH (Round Sheep Hash) Information Technology Journal Vol. 10, Issue 3, 686, 2011 |
A Robust Watermark Embedding in Smooth Areas Research Journal of Information Technology Vol. 3, Issue 2, 123, 2011 |
How to cite this article
Abid Khan, Xiamu Niu and Zhang Yong, 2008. A Robust Framework for Protecting Computation Results of Mobile Agents. Information Technology Journal, 7: 24-31.
DOI: 10.3923/itj.2008.24.31
URL: https://scialert.net/abstract/?doi=itj.2008.24.31
DOI: 10.3923/itj.2008.24.31
URL: https://scialert.net/abstract/?doi=itj.2008.24.31