刘峰 您所在的位置:网站首页 刘峰画家简介 刘峰

刘峰

2024-06-01 15:09| 来源: 网络整理| 查看: 265

1. Feng Liu and Weiqi Yan. Visual Cryptography for Image Processing and Security - Theory, Methods, and Applications . Springer-Verlag London, 2014.

2. Feng Liu etc. Overview of the Cybersecurity System in USA. Science Press, 2015. 刘峰等著,《美国网络空间安全体系》,科学出版社,2015。

3. Dingyu Yan, Feng Liu, Yaqin Zhang, Kun Jia "Dynamical model for individual defence against cyber epidemic attacks ", IET Information Security, 2019.

4. Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao "Protecting White-Box Cryptographic Implementations with Obfuscated Round Boundaries ", SCIENCE CHINA Information Sciences, 2017.

5. Huashan Chen, Xiuyan Zhao, Feng Liu, Shouhuai Xu and Wenlian Lu "Optimizing interconnections to maximize the spectral radius of interdependent networks", Physical Review E, volume 95, 032308 , 2017.

6. Gang Shen, Feng Liu, Zhengxin Fu and Bi-n Yu "Perfect Contrast XOR-based Visual Cryptography Schemes via Linear Algebra", Designs, Codes and Cryptography, volume 85, issue 1, pages 15-37, 2017. 

7. Teng Guo, Feng Liu and Chuankun Wu. k out of k extended visual cryptography scheme by random grids. Signal Processing (Elsevier), volume 94, pages 90–101, January 2014.

8. Teng Guo, Feng Liu and Chuankun Wu. Threshold visual secret sharing by random grids with improved contrast. Journal of Systems and Software, volume 86, issue 8, pages 2094–2109, 2013.

9. Feng Liu and Chuankun Wu. Embedded Extended Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 6, No. 2, pages 307-322, 2011.

10. Feng Liu, Chuankun Wu and Xijun Lin. Step Construction of Visual Cryptography Schemes. IEEE Transactions on Information Forensics & Security, volume 5, No. 1, pages 27-38, 2010.

11. Feng Liu, Chuankun Wu and Xijun Lin. Some Extensions on Threshold Visual Cryptography Schemes. The Computer Journal, volume 53, issue 1, pages 107-119, 2010.

12. Feng Liu, Chuankun Wu and Xijun Lin. The Alignment Problem of the Visual Cryptography Scheme. Designs, codes and cryptography, volume 50, issue 2, pages 215-227, 2009.



【本文地址】

公司简介

联系我们

今日新闻

    推荐新闻

    专题文章
      CopyRight 2018-2019 实验室设备网 版权所有