×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
shujun-li documents
Documents
A new trust region filter algorithm
Documents
Breaking a chaos-based secure communication scheme designed by an improved modulation method
Documents
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Documents
Cryptanalysis of the RCES/RSES image encryption scheme
Documents
Baptista-type chaotic cryptosystems: problems and countermeasures
Documents
Improving security of a chaotic encryption approach
Documents
miR-223 regulates migration and invasion by targeting Artemin in human esophageal carcinoma
Documents
Security problems with improper implementations of improved FEA-M
Documents
Diffuse biliary tract injury after orthotopic liver transplantation
Technology
Human/User-Centric Security
Science
From Digital Watermarking to Multimedia Forensics: How can they help to detect lost identities in multimedia work?
Documents
recommendation letter
Science
From Captchas to Captchæckers: Can we automate usability and security evaluation of CAPTCHAs?