Showing results 17 to 29 of 29
< previous
Issue Date | Title | Author(s) | Text |
- | Local allocation of end-to-end delay requirement | Chu, Y.P.; 林冠成; Hwang, E.H.; Lin, K.C.; Chen, C.H. | - |
- | A minute lossy method for 2D-gel images compression | Chan, Y.K.; 詹永寬; Liau, D.L.; Chen, Y.F.; Wu, H.C.; Chu, Y.P. | - |
- | A multiple-level visual secret-sharing scheme without image size expansion | Chen, Y.F.; 蔡孟勳; Chan, Y.K.; Huang, C.C.; Tsai, M.H.; Chu, Y.P.; 詹永寬 | - |
- | New data hiding scheme using pixel swapping for halftone images | Chang, Y.F.; 蔡垂雄; Feng, J.B.; Tsai, C.S.; Chu, Y.P.; Syu, H.C. | - |
- | A new multi-secret images sharing scheme using Largrange's interpolation | Feng, J.B.; 蔡垂雄; Wu, H.C.; Tsai, C.S.; Chu, Y.P. | - |
- | New steganographic method of pixel value differencing | Lu, H.C.; Chu, Y.P.; Hwang, M.S. | - |
- | Optimal admission control based on per-switch delay allocation for networks with a bounded delay service | Chu, Y.P.; 林冠成; Lin, K.C. | - |
- | Quality-of-service allocation for networks with bounded-delay service | Chu, Y.P.; 林冠成; Lin, K.C. | - |
- | Resampling Halftone Images Using Interpolation and Error-Diffusion | Feng, J.B.; 林詠章; Lin, I.C.; Chu, Y.P.; Tsaur, S.C. | - |
- | Secret image sharing scheme based solely on ADDITION | Tsai, M.H.; 蔡孟勳; Chen, C.K.; Chen, Y.F.; Chan, Y.K.; Chen, K.C.; Chu, Y.P.; 詹永寬 | - |
- | Secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks | Li, C.T.; Hwang, M.S.; Chu, Y.P. | - |
- | A SECURE AND EFFICIENT ECC-BASED AKA PROTOCOL FOR WIRELESS MOBILE COMMUNICATIONS | Lo, J.W.; 黃明祥; Lee, C.C.; Hwang, M.S.; Chu, Y.P. | - |
- | Visual secret sharing for multiple secrets | Feng, J.B.; 蔡垂雄; Wu, H.C.; Tsai, C.S.; Chang, Y.F.; Chu, Y.P. | - |