Jia-Hong Li

According to our database1, Jia-Hong Li authored at least 5 papers between 2005 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Tattooing Attack: A New Type of Watermarking Attacks on Image Authentication.
Int. J. Digit. Crime Forensics, 2014

2013
Using MapReduce Framework for Mining Association Rules.
Proceedings of the Information Technology Convergence, 2013

2012
An efficient and secure multi-server authentication scheme with key agreement.
J. Syst. Softw., 2012

2011
Adaptive Secret Sharing for Color Images.
Int. J. Comput. Intell. Syst., 2011

2005
Efficient Date-Constraint Hierarchical Key Assignment Scheme.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...