Research Article
A Robust Framework for Protecting Computation Results of Mobile Agents

Citation to this article as recorded by ASCI
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690.
CrossRef  |  Direct Link  |  

Lv, M.L. and Z.M. Lu, 2011. An image hashing scheme based on mean-removed vector quantization for multiple purposes. Inform. Technol. J., 10: 120-126.
CrossRef  |  Direct Link  |  

Lv, M.L. and Z.M. Lu, 2011. Multipurpose perceptual image hashing based on block truncation coding. Inform. Technol. J., 10: 207-212.
CrossRef  |  Direct Link  |  

Zeki, A.M., A.A. Manaf, A.A. Ibrahim and M. Zamani, 2011. A robust watermark embedding in smooth areas. Res. J. Inform. Technol., 3: 123-131.
CrossRef  |  

Zeng, W. and Y. Wu, 2010. A visible watermarking scheme in spatial domain using HVS model. Inform. Technol. J., 9: 1622-1628.
CrossRef  |  Direct Link  |  

Zhang, Y., Z.M. Lu and D.N. Zhao, 2010. A blind image watermarking scheme using fast hadamard transform. Inform. Technol. J., 9: 1369-1375.
CrossRef  |  Direct Link  |  

Zhang, Y., Z.M. Lu and D.N. Zhao, 2010. Quantization based semi-fragile watermarking scheme for H.264 video. Inform. Technol. J., 9: 1476-1482.
CrossRef  |  Direct Link  |  

Services
Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

 
©  2020 Science Alert. All Rights Reserved