JOURNAL OF COMPUTERS Vol.22 No.4 January 2012
¡@
1. An Efficient Authentication Mechanism for (2, 2)-Visual Cryptography Scheme | ||||||||
Yi-Hui Chen For full article CEPS | ||||||||
|
||||||||
Shi-Yu Cui, Zhi-Hui Wang, Chin-Chen Chang, and Ming-Chu Li For full article CEPS | ||||||||
6. Applying Personalized Tag Group Recommendation Model to Social Photo Sharing | ||||||||
Tao Zhang and Guijia He For full article CEPS | ||||||||
¡@
¡@