Article ID: | iaor201530330 |
Volume: | 116 |
Issue: | 2 |
Start Page Number: | 183 |
End Page Number: | 191 |
Publication Date: | Feb 2016 |
Journal: | Information Processing Letters |
Authors: | Kuo Wen-Chung, Wang Chun-Cheng, Hou Hong-Ching |
Keywords: | security |
The EMD (Exploiting Modification Direction) method by Zhang and Wang uses (