瀏覽 的方式: 關鍵字 Information Security

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1 到 20 筆資料,總共 88 筆  下一頁 >
題名作者日期
A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored DataKu, Wei-Chi; Tsai, Hao-Chuan; Tsaur, Maw-Jinn2006-10-16T05:38:00Z
A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet TransformationHsieh, Shang-Lin; Huang, Bin-Yuan2006-10-16T01:54:57Z
A Deniable Authentication Protocol with Anonymous Sender ProtectionHwang, Shin-Jia; Ma, Juei-Che2009-02-10T02:28:29Z
A Detection Scheme for Flooding Attack on Application Layer Based on Semantic ConceptLin, Chu-Hsing; Lee, Chen-Yu; Liu, Jung-Chun; Chen, Ching-Ru; Huang, Shin-Yang2011-01-19T04:17:27Z
A DK-PHBT Based Key Management Mechanism in Heterogeneous Wireless Sensor NetworksWang, ChihHung; Wei, ShihYi2009-02-10T02:40:27Z
A modified user-friendly remote authentication scheme with smart cardsChen, Yi-Hwa; Jan, Jinn-Ke2006-10-16T05:33:59Z
A new construction of resilient functions over GF(p) with good cryptographic propertiesHuang, Kai-Qun; Chang, Jen-Chun; Chen, Rong-Jaye2006-10-16T05:35:19Z
A New Efficient k-out-of-n Oblivious Transfer Scheme by means of Common CipherWang, Chih-Hung; Lin, Chi-Shin2006-10-13T01:19:20Z
A New Matrix Decode Scheme for Error Diffusion on Visual Share ImagesLee, Bor-Woei Jr; Chen, Hong-Hao Jr; Lee, Chih-Chiang Jr; Lin, Tsung-Hung Jr2011-01-06T20:51:29Z
A Novel Metropolitan Area Network Service Model with Free Use and Privacy ProtectionChen, Yu-Yi; Lu, Jun-Chao; Lin, Chih-Chiang; Jan, Jinn-Ke; Huang, Der-Chen2011-01-19T04:17:05Z
A Public Verifiable Security-Enhanced Voting Protocol for a Committee Board MeetingTing, Pei-yih; Hung, Po-Yueh; Chen, Ching-Yi2006-10-16T05:33:38Z
A Robust Oblivious Watermarking TechniqueChen, Huang-Chi Jr; Chang, Yu-Wen Jr; Hwang, Rey-Chue Jr2011-01-10T00:04:36Z
A robust password-based remote user authentication scheme using bilinear pairings without using smart cardsLiao, Yi-Pin Jr; Wang, Shuenn-Shyang Jr2011-01-10T02:18:02Z
A robust watermarking scheme based on singular value decomposition and quantization techniqueWu, Hsien-Chu Jr; Jang, Ruen-Jie Jr; Liu, Yu-Chi Jr2011-01-10T00:04:27Z
A Robust Watermarking Technique for Still Image Using Compression Concept and Coefficient DifferenceLou, Der-Chyuan; Liu, Jiang-Lung; Tso, Hao-Kuan2006-10-13T01:21:57Z
A Secure and Privacy Protection Digital Goods Trading Scheme in Cloud ComputingJuang, Wen-Shenq Jr; Shue, Yun-Yu Jr2011-01-10T02:18:24Z
A Secure Dynamic Conference Scheme with Anonymity for Mobile CommunicationsHwang, Shin-Jia; Chai, Ming-Jhang2009-02-10T06:20:54Z
A Study on Industrial Control System Risk AssessmentFarn, Kwo-Jean; Wang, Yen-Fang; Lin, Shu-Kuo; Yang, Chung-Huang; Huang, Chien-Cheng2009-02-10T02:24:36Z
A study on VoIP SecuritySung, Chia-Ming; Lo, Ching-Cheng; Peng, Chung-Hao; Tsai, Wen-Nung2006-10-16T05:39:09Z
A Veriable Secure Metering Scheme with Shadow-Self-RefreshingCheng, Jiin-Chiou; Chen, Jiun-Ming; Laih, Chi-Sung2009-02-10T03:59:57Z