| 題名 | 作者 | 日期 |
| A copyright protection technique by using hybrid domains | Huang, Larry; Jan, Jinn-Ke | 2006-10-16T01:42:13Z |
| A Proxy-Protected Proxy Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem | Chen, Tzer-Shyong; Liu, Tzuoh-Pyng; Chung, Yu-Fang | 2006-10-16T04:01:13Z |
| A Specifiable-Verifier Group-Oriented Threshold Signature Scheme Based on the Elliptic Curve Cryptosystem | Chen, Tzer-Shyong; Huang, Gwo-Shiuan; Chung, Yu-Fang; Chang, Nien-Tzu | 2006-10-16T04:01:21Z |
| A Variant of AES against Square Attack | Wang, Wei-Chuan; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T04:00:36Z |
| An Efficient MAKEP for Wireless Network | Yangy, Chou-Chen; Hwangz, Min-Shiang; Liy, Jian-Wei; Chang, Ting-Yi | 2006-10-16T02:06:20Z |
| Browser Spoofing | Wu, Yongdong; Sheng, Xu Chang; Ma Di | 2006-10-16T03:29:00Z |
| Clustered Architecture for High-Speed IPsec Gateway | Shieh, Shiuhpyng; Lai, Yung-Zen | 2006-10-16T01:43:37Z |
| Cryptanalysis and improvement of an improved Identity-Based key exchange protocol | Tseng, Yu-Mim; Jan, Jinn-Ke; Wang, Ching-Hung | 2006-10-16T04:00:56Z |
| Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet Fields | Jong, Chang-Han; Shieh, Shiuh-Pyng | 2006-10-16T01:43:11Z |
| Dynamic Triple-DES | Lin, Chu-Hsing; Yeh, Yi-Shiung; Lee, Chen-Yu | 2006-10-16T04:01:34Z |
| Enhanced Authentication Key Agreement Protocol | Hwang, Ren-Junn; Shiau, Sheng-Hua; Lin, Kai-Jun | 2006-10-16T03:23:02Z |
| Forgery Attack on Xia-You’s Group Signature | Chien, Hung-Yu | 2006-10-16T03:22:20Z |
| Improved authenticated multiple-key agreement protocol without using conventional one-way function | Chien, Hung-Yu | 2006-10-16T03:22:30Z |
| Java Card Cryptography Design | Tseng, Shau-Yin; Lin, Hui-Ching | 2006-10-16T01:42:44Z |
| Nearly Optimal user Efficient Partially Blind Signatures | Fan, Chun-I | 2006-10-16T04:00:15Z |
| Repairing ElGamal-like multi-signature schemes using self-certified public keys | Hwang, Shin-Jia; Lee, Yun-Hwa | 2006-10-16T03:23:24Z |
| The Design of Math Core in CPLD for the AES Application | Jing, M.H.; Chen, Y.H.; Hsu, C. H. | 2006-10-16T01:44:01Z |
| Two Layer Network Intrusion Detection System | Lin, Yao-Tsung; Tseng, Shian-Shyong; Kuo, T. T. | 2006-10-16T03:28:39Z |