Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, "An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image," International Journal of Network Security, vol.15, no.1, pp.314-318, 2013./ View Article
2 D. Xu, Z. Feng, and P. Zhang, "Effective capacity of delay quality-of-service constrained spectrum sharing cognitive radio with outdated channel feedback," Science China Information Sciences, 2013./ View Article
3 SafeNet, "SafeNet Authentication Manager," SafeNet, Inc., 2013./ View Article
4 E. Magli, M. Wang, P. Frossard and A. Markopoulou, "Network coding meets multimedia: a review," IEEE Trans. Multimedia, vol. PP, no. 99, pp. 1-18, Jan. 2013./ View Article
5 Zhao, H., et al., "Multi-focus image fusion based on the neighbor distance," Pattern Recognition, vol 46, no.3, pp.1002-1011, March 2013./   DOI   Ndsl View Article
6 D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries," IACR ePrint Cryptography Archive 2013/169, 2013./ View Article
7 A. Bilge and H. Polat, "A comparison of clustering-based privacy-preserving collaborative filtering schemes," Applied Soft Computing, 2013, doi: 10.1016/j.asoc.2012.11.046./ View Article
8 I. Gunes, A. Bilge, C. Kaleli and H. Polat, "Shilling attacks against privacy-preserving collaborative filtering," Journal of Advanced Management Science, vol. 1, no. 1, pp. 54-60, 2013./   DOI View Article
9 F. Zhao, X. Lv, and H. Chen, "A leakage-based beamforming algorithm for cognitive MIMO systems via game theory," Journal of Networks, vol. 8, no. 3, pp. 623-627, May, 2013./ View Article
10 D Zhang, Z. Yang, V. Raychoudhury, Z. Chen and J. Lloret, "An Energy-Efficient Routing Protocol Using Movement Trends in Vehicular Ad hoc Networks," The Computer Journal, published online: March 2013./ View Article