ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Optimization of Location Information Hiding Algorithm for Anti Attack
Applications and Techniques in Information Security - Communications in Computer and Information Science
◽
10.1007/978-981-13-2907-4_1
◽
2018
◽
pp. 3-11
Author(s):
Bin Wang
◽
Rong-yang Zhao
◽
Guo-yin Zhang
◽
Jia-Hai Liang
Keyword(s):
Information Hiding
◽
Location Information
Start Chat
Download Full-text
Related Documents
Cited By
References
Network Location Information Hiding Algorithm Based on Machine Learning
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS)
◽
10.1109/icicas48597.2019.00068
◽
2019
◽
Author(s):
Bin Wang
◽
Lei Zhang
◽
Guoyin Zhang
Keyword(s):
Machine Learning
◽
Information Hiding
◽
Location Information
◽
Network Location
Start Chat
Download Full-text
A WSN(Wiress Sensor Network) Building Scheme using Clustering and Location information
Jouranl of Information and Security
◽
10.33778/kcsa.2020.20.3.013
◽
2020
◽
Vol 20
(3)
◽
pp. 13-20
Author(s):
Jinsoo Kim
◽
◽
Hyukjin Kwon
◽
Dongkyoo Shin
◽
Sunghoon Hong
Keyword(s):
Sensor Network
◽
Location Information
◽
Network Building
Start Chat
Download Full-text
Mobile Agent-Based Information Dissemination Scheme Using Location Information in Vehicular Ad Hoc Networks
IEICE Transactions on Communications
◽
10.1587/transcom.2016snp0012
◽
2016
◽
Vol E99.B
(9)
◽
pp. 1958-1966
Author(s):
Takeshi HASHIMOTO
◽
Junich AOKI
◽
Tomoyuki OHTA
◽
Yoshiaki KAKUDA
Keyword(s):
Ad Hoc Networks
◽
Mobile Agent
◽
Information Dissemination
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Location Information
◽
Agent Based
◽
Hoc Networks
Start Chat
Download Full-text
Using LSB Steganography Technique and 256 bits Key Length AES Algorithm for High Secured Information Hiding
International Journal of Advanced Research in Computer Science and Software Engineering
◽
10.23956/ijarcsse/sv7i5/0210
◽
2017
◽
Vol 7
(5)
◽
pp. 674-681
Author(s):
Eric Gyamfi
◽
◽
Isaac Kofi Nti
◽
Justice Aning
◽
◽
...
Keyword(s):
Information Hiding
◽
Aes Algorithm
◽
Key Length
Start Chat
Download Full-text
A novel video information hiding scheme with compressed sensing data
Computer Science and Systems Engineering
◽
10.2495/csse140261
◽
2015
◽
Author(s):
H. M. Zhao
◽
Y. M. Fang
Keyword(s):
Compressed Sensing
◽
Information Hiding
◽
Sensing Data
◽
Video Information
Start Chat
Download Full-text
Lossless information hiding scheme for two-dimensional CAD engineering graphics based on coordinate modification
Management Innovation and Information Technology
◽
10.2495/miit130921
◽
2014
◽
Author(s):
Zhengqiao Lei
Keyword(s):
Information Hiding
◽
Two Dimensional
◽
Engineering Graphics
Start Chat
Download Full-text
Buried assets. Capturing, recording, maintaining and sharing of location information and data. Code of practice
10.3403/30336926
◽
2017
◽
Keyword(s):
Location Information
◽
Code Of Practice
Start Chat
Download Full-text
On the Value of Function Evaluation Location Information in Monte Carlo Simulation
10.21236/ada263662
◽
1992
◽
Author(s):
Thomas J. DiCiccio
◽
Peter W. Glynn
Keyword(s):
Monte Carlo Simulation
◽
Monte Carlo
◽
Function Evaluation
◽
Location Information
Start Chat
Download Full-text
Estimation of Information Hiding Algorithms and Parameters
10.21236/ada464991
◽
2007
◽
Author(s):
Scott A. Craver
Keyword(s):
Information Hiding
Start Chat
Download Full-text
Information Hiding based Trusted Computing System Design
10.21236/ada608967
◽
2014
◽
Author(s):
Gang Qu
◽
Min Wu
Keyword(s):
System Design
◽
Information Hiding
◽
Trusted Computing
◽
Computing System
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close