Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan Liu, and Dushyant Goyal, "Prediciton-based reversible data hiding using empirical histograms in images," Transactions on Internet and Information Systems, vol. 6, no. 4, pp. 1248-1266, 2012./ View Article
2 M. Zuhairi, H. Zafar, and D. Harle, "Dynamic reverse route for on-demand routing protocol in MANET," KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, vol. 6, no. 5, pp. 1354-1372, 2012./ View Article
3 Yahui Wu, Su Deng, and Hongbin Huang, "Optimal control of two-hop routing in DTNs with time-varying selfish behavior," KSII Transactions on Internet and Information Systems, vol.6, no.9, Sep 2012./ View Article
4 W. A. Hassan, H. S. Jo, M. Nekovee, C. Y. Leow and T. A. Rahman, "Spectrum sharing method for cognitive radio in TV white spaces: enhancing spectrum sensing and geolocation database," KSII Trans. Internet and Information Systems, vol. 6, no. 8, pp. 1894-1912, Aug. 2012./ View Article
5 D. Xu, Z. Feng and P. Zhang, "Power allocation schemes for downlink cognitive radio networks with opportunistic sub-channel access," KSII Trans. Internet and Information Systems, vol. 6, no. 7, pp. 1777-1791, July 2012./ View Article
6 Zhu Jian-Qi, Fu Feng, Chong-kwon Kim, Yin Ke-xin and Liu Yan-Heng, "A DoS Detection Method Based on Composition Self-similarity," KSII Transactions on Internet and Information Systems, vol.6, no.5, pp. 1463-1478, May 2012./ View Article
7 Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII transactions on internet and information systems, Vol. 6, No.12, pp.3352-3365, Dec 2012./ View Article
8 Xixiang Lv and Hui Li, "Group Key Agreement From Signcryption," KSII transactions on internet and information systems, Vol. 6, No. 12, pp. 3338-3351, Dec 2012./ View Article
9 E. C. Lee and S. H. Son, "Anti-spoofing method for iris recognition by combining the optical and textural features of human eye," KSII Transactions on Internet and Information Systems, vol. 6, no. 9, pp. 2424-2441, 2012. http://dx.doi.org/10.3837/tiis.2012.09.026/ View Article
10 C. S. Chan, Y. Y. Tsai, and C. L. Liu, "An image hiding scheme by linking pixels in the circular Wa ," KSII Trans. On Internet and Information Systems, Vol.6, No.6, pp.1718-1734, 2012./ View Article