A new hierarchical digital image authentication method for tamper detection and recovery against microdotting attacks
QoS multicast routing based on double-population differential evolution algorithm
EEG channel evaluation and selection by rough set in P300 BCI
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment