1. Authenticating corrupted photo images based on noise parameter estimation;Lee;Pattern Recognition,2006
2. An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communication sin wireless sensor networks;Li;International Journal of Innovative Computing, Information and Control,2009
3. A simple attack on a recently introduced hash-based strong-password authentication scheme;Kim;International Journal of Network Security,2005
4. Cryptanalysis of a new efficient make up for wireless communications;Shen;International Journal of Network Security,2005
5. The advanced decryption standard;Daemen;Dr. Dobb's Journal,2001