瀏覽 的方式: 關鍵字 Cryptology and Information Security

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1 到 18 筆資料,總共 18 筆
題名作者日期
A copyright protection technique by using hybrid domainsHuang, Larry; Jan, Jinn-Ke2006-10-16T01:42:13Z
A Proxy-Protected Proxy Multi-Signature Scheme Based on the Elliptic Curve CryptosystemChen, Tzer-Shyong; Liu, Tzuoh-Pyng; Chung, Yu-Fang2006-10-16T04:01:13Z
A Specifiable-Verifier Group-Oriented Threshold Signature Scheme Based on the Elliptic Curve CryptosystemChen, Tzer-Shyong; Huang, Gwo-Shiuan; Chung, Yu-Fang; Chang, Nien-Tzu2006-10-16T04:01:21Z
A Variant of AES against Square AttackWang, Wei-Chuan; Chang, Jen-Chun; Chen, Rong-Jaye2006-10-16T04:00:36Z
An Efficient MAKEP for Wireless NetworkYangy, Chou-Chen; Hwangz, Min-Shiang; Liy, Jian-Wei; Chang, Ting-Yi2006-10-16T02:06:20Z
Browser SpoofingWu, Yongdong; Sheng, Xu Chang; Ma Di2006-10-16T03:29:00Z
Clustered Architecture for High-Speed IPsec GatewayShieh, Shiuhpyng; Lai, Yung-Zen2006-10-16T01:43:37Z
Cryptanalysis and improvement of an improved Identity-Based key exchange protocolTseng, Yu-Mim; Jan, Jinn-Ke; Wang, Ching-Hung2006-10-16T04:00:56Z
Detecting Distributed DoS/Scanning by Anomaly Distribution of Packet FieldsJong, Chang-Han; Shieh, Shiuh-Pyng2006-10-16T01:43:11Z
Dynamic Triple-DESLin, Chu-Hsing; Yeh, Yi-Shiung; Lee, Chen-Yu2006-10-16T04:01:34Z
Enhanced Authentication Key Agreement ProtocolHwang, Ren-Junn; Shiau, Sheng-Hua; Lin, Kai-Jun2006-10-16T03:23:02Z
Forgery Attack on Xia-You’s Group SignatureChien, Hung-Yu2006-10-16T03:22:20Z
Improved authenticated multiple-key agreement protocol without using conventional one-way functionChien, Hung-Yu2006-10-16T03:22:30Z
Java Card Cryptography DesignTseng, Shau-Yin; Lin, Hui-Ching2006-10-16T01:42:44Z
Nearly Optimal user Efficient Partially Blind SignaturesFan, Chun-I2006-10-16T04:00:15Z
Repairing ElGamal-like multi-signature schemes using self-certified public keysHwang, Shin-Jia; Lee, Yun-Hwa2006-10-16T03:23:24Z
The Design of Math Core in CPLD for the AES ApplicationJing, M.H.; Chen, Y.H.; Hsu, C. H.2006-10-16T01:44:01Z
Two Layer Network Intrusion Detection SystemLin, Yao-Tsung; Tseng, Shian-Shyong; Kuo, T. T.2006-10-16T03:28:39Z