Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Li Weng
A Secure Perceptual Hash Algorithm for Image Content Authentication
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Related publications
Secure Virtualisation Using Hash Key Authentication
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Secure Mobile Computing Authentication Utilizing Hash, Cryptography and Steganography Combination
Journal of Information Security and Cybercrimes Research
Secure Barcode Authentication Using Genetic Algorithm
IOSR Journal of Computer Engineering
Secure Hash Authentication and Cryptography Based Geographical Routing (SHAC-GR) for Wireless Sensor Networks
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
Quantization-Based Semi-Fragile Public-Key Watermarking for Secure Image Authentication
A Robust Speech Content Authentication Algorithm Against Desynchronization Attacks
Journal of Communications
Electronic Engineering
Electrical
Provable Secured Hash Password Authentication
International Journal of Computer Applications
Message Authentication With a New Quantum Hash Function
Computers, Materials and Continua
Mechanics of Materials
Electronic Engineering
Simulation
Computer Science Applications
Electrical
Modeling
Biomaterials
Secure Authentication Protocol for Mobile Payment
Tsinghua Science and Technology
Multidisciplinary