Many Multi-Objective Evolutionary Algorithms (MOEAs) have been proposed in recent years. However, almost all MOEAs have been evaluated on problems with two to four objectives only...
In this paper, we propose an efficient watermarking technique using adaptive differential energy watermarking (ADEW) and cross binding wavelet tree (CBWT) for copyright protection....
Pairing-based cryptosystems (PBC) have been attracted by researchers in cryptography. Some implementations show that PBC are relatively slower than the standard public key cryptosy...
For senior executives, information security is a basic requirement for business success. Yet, despite being well-motivated, top managers often have only a superficial understandin...
Jorma Kajava, Juhani Anttila, Rauno Varonen, Reijo...
In hardware implementation for the finite field, the use of normal basis has several advantages, especially the optimal normal basis is the most efficient to hardware implementati...
Chang Han Kim, Yongtae Kim, Sung Yeon Ji, IlWhan P...
In this paper, we propose a new variational decomposition model which splits an image into two components: a first one containing the structure and a second one the texture or nois...
The emerging ubiquitous computing is changing the current computing paradigm, and it lets the ubiquitous RFID applications consistently and independently utilize the sensed inform...
Dongwon Jeong, Keunhwan Jeon, Jang-won Kim, Jinhyu...