Chuanda Qi

According to our database1, Chuanda Qi authored at least 19 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
On the Complexity of Hybrid n-Term Karatsuba Multiplier for Trinomials.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020

Speech watermarking robust against recapturing and de-synchronization attacks.
Multim. Tools Appl., 2020

2019
On the Complexity of non-recursive n-term Karatsuba Multiplier for Trinomials.
IACR Cryptol. ePrint Arch., 2019

2018
A Survey on Data Storage and Information Discovery in the WSANs-Based Edge Computing Systems.
Sensors, 2018

A Comparative Study on Two Typical Schemes for Securing Spatial-Temporal Top-<i>k</i> Queries in Two-Tiered Mobile Wireless Sensor Networks.
Sensors, 2018

Secure fine-grained spatio-temporal Top-k queries in TMWSNs.
Future Gener. Comput. Syst., 2018

Fault-Tolerant Scheduling Algorithm With Re-Allocation for Divisible Task.
IEEE Access, 2018

N-Term Karatsuba Algorithm and its Application to Multiplier Designs for Special Trinomials.
IEEE Access, 2018

Efficient Square-Based Montgomery Multiplier for All Type C.1 Pentanomials.
IEEE Access, 2018

A Robust Recoverable Algorithm Used for Digital Speech Forensics Based on DCT.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Mastrovito Form of Non-Recursive Karatsuba Multiplier for All Trinomials.
IEEE Trans. Computers, 2017

Tamper recovery algorithm for digital speech signal based on DWT and DCT.
Multim. Tools Appl., 2017

A security watermark scheme used for digital speech forensics.
Multim. Tools Appl., 2017

Speech Content Authentication Scheme based on High-Capacity Watermark Embedding.
Int. J. Digit. Crime Forensics, 2017

Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials.
IACR Cryptol. ePrint Arch., 2017

2016
Mastrovito form of Karatsuba Multiplier for All Trinomials.
IACR Cryptol. ePrint Arch., 2016

2015
An Authentication and Recovery Scheme for Digital Speech Signal Based on DWT.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
New Treatment of the BSW Sampling and Its Applications to Stream Ciphers.
IACR Cryptol. ePrint Arch., 2014

2009
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers.
Proceedings of the Advances in Neural Networks, 2009


  Loading...