瀏覽 的方式: 關鍵字 Cryptography

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1 到 20 筆資料,總共 21 筆  下一頁 >
題名作者日期
A BLOCK-BASED APPROACH TO SECURE ATM NETWORKINGGamage, Chandana; Leiwo, Jussipekka; Zheng, Yuliang2006-10-20T02:11:33Z
A New Efficient k-out-of-n Oblivious Transfer Scheme by means of Common CipherWang, Chih-Hung; Lin, Chi-Shin2006-10-13T01:19:20Z
A NOVEL ID-BASED GROUP SIGNATURETseng, Yuh-Min; Jan, Jinn-Ke2006-10-20T06:04:18Z
A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting ProcessFan, Chun-I; Lei, Chin-Laung2006-11-13T02:44:13Z
An Attack on Untraceable Blind Signature SchemeFan, Chun-I; Chen, Ming-Te2006-06-09T08:18:49Z
Authenticated Key Agreement Protocol for Exchanging n2 Keys without Using One-way Hash FunctionHuang, Chih-Jen; Chang, Shih-Hsu; Hsu, Wen-Hsing2006-11-13T03:00:30Z
Authentication Protocol for 3G Mobile Communication SystemsLin, Chih-Hsing; Twu, Shih-Hsiung2006-10-16T03:22:52Z
Convertible Proxy Signature SchemeSun, Hung-Min2006-11-13T01:16:12Z
Cryptanalysis of a digital signature scheme based on factoring and discrete logarithmsSun, Hung-Min2006-10-17T03:53:12Z
Cryptanalysis on Traceability on RSA-Based Partially Signature with Low ComputationWu, Lin-Chuan; Yeh, Yi-Shiung; Liu, Tsann-Shyong2006-10-16T05:34:06Z
Fail-Stop Blind Signature Scheme Based on the Integer FactorizationWu, Lin-Chuan; Fan, Chun-I; Yeh, Yi-Shiung; Liu, Tsann-Shyong2006-10-13T01:20:10Z
Group-Access Smart Card with Elliptic Curve CryptosystemWu, Shyi-Tsong; Chieu, Bin-Chang2006-10-16T04:01:04Z
Improved Authenticated Key Agreement Scheme via Password AuthenticationSun, Hung-Min; Hsieh, Bin-Tsan2006-11-13T03:00:59Z
Improved authenticated multiple-key agreement protocol without using conventional one-way functionChien, Hung-Yu2006-10-16T03:22:30Z
Nearly Optimal user Efficient Partially Blind SignaturesFan, Chun-I2006-10-16T04:00:15Z
On-line Error Detection in Systolic Polynomial Basis Multiplier over GF(2m) Using Parity Prediction MethodMa, Chi-Ting Jr; Wu, Chia-Jen Jr; Chiou, Che Wun Jr2011-03-24T23:44:00Z
Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback optionSchartner, Peter Jr; Rass, Stefan Jr2011-01-10T00:03:57Z
Randomized Key Chaining Mides with UnforgeabilityLin, Hsi-Chung; Yen, Sung-Ming2006-10-16T03:22:42Z
Scalable Architecture for Dual Basis Multiplication over GF(2m)Chen, Liang-Hwa Jr; Chang, Po-Lun Jr; Lee, Chiou-Yng Jr2011-03-24T23:42:19Z
User Efficient Randomized Chaum's Blind SignaturesFan, Chun-I; Chen, Wei-Kuei2006-10-17T04:05:14Z