1 |
B. Karthikeyan, S. Ramakrishnan, V. Vaithiyanathan, S. Sruti, and M. Gomathymeenakshi, "An Improved Steganographic Technique Using LSB Replacement on a Scanned Path Image," International Journal of Network Security, vol.15, no.1, pp.314-318, 2013./
|
|
2 |
D. Xu, Z. Feng, and P. Zhang, "Effective capacity of delay quality-of-service constrained spectrum sharing cognitive radio with outdated channel feedback," Science China Information Sciences, 2013./
|
|
3 |
SafeNet, "SafeNet Authentication Manager," SafeNet, Inc., 2013./
|
|
4 |
E. Magli, M. Wang, P. Frossard and A. Markopoulou, "Network coding meets multimedia: a review," IEEE Trans. Multimedia, vol. PP, no. 99, pp. 1-18, Jan. 2013./
|
|
5 |
Zhao, H., et al., "Multi-focus image fusion based on the neighbor distance," Pattern Recognition, vol 46, no.3, pp.1002-1011, March 2013./
|
|
6 |
D. Cash, S. Jarecki, C. Jutla, H. Krawczyk, M. Rosu, and M. Steiner, "Highly-scalable searchable symmetric encryption with support for Boolean queries," IACR ePrint Cryptography Archive 2013/169, 2013./
|
|
7 |
A. Bilge and H. Polat, "A comparison of clustering-based privacy-preserving collaborative filtering schemes," Applied Soft Computing, 2013, doi: 10.1016/j.asoc.2012.11.046./
|
|
8 |
I. Gunes, A. Bilge, C. Kaleli and H. Polat, "Shilling attacks against privacy-preserving collaborative filtering," Journal of Advanced Management Science, vol. 1, no. 1, pp. 54-60, 2013./
|
|
9 |
F. Zhao, X. Lv, and H. Chen, "A leakage-based beamforming algorithm for cognitive MIMO systems via game theory," Journal of Networks, vol. 8, no. 3, pp. 623-627, May, 2013./
|
|
10 |
D Zhang, Z. Yang, V. Raychoudhury, Z. Chen and J. Lloret, "An Energy-Efficient Routing Protocol Using Movement Trends in Vehicular Ad hoc Networks," The Computer Journal, published online: March 2013./
|
|