| 題名 | 作者 | 日期 |
| A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored Data | Ku, Wei-Chi; Tsai, Hao-Chuan; Tsaur, Maw-Jinn | 2006-10-16T05:38:00Z |
| A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation | Hsieh, Shang-Lin; Huang, Bin-Yuan | 2006-10-16T01:54:57Z |
| A Deniable Authentication Protocol with Anonymous Sender Protection | Hwang, Shin-Jia; Ma, Juei-Che | 2009-02-10T02:28:29Z |
| A Detection Scheme for Flooding Attack on Application Layer Based on Semantic Concept | Lin, Chu-Hsing; Lee, Chen-Yu; Liu, Jung-Chun; Chen, Ching-Ru; Huang, Shin-Yang | 2011-01-19T04:17:27Z |
| A DK-PHBT Based Key Management Mechanism in Heterogeneous Wireless Sensor Networks | Wang, ChihHung; Wei, ShihYi | 2009-02-10T02:40:27Z |
| A modified user-friendly remote authentication scheme with smart cards | Chen, Yi-Hwa; Jan, Jinn-Ke | 2006-10-16T05:33:59Z |
| A new construction of resilient functions over GF(p) with good cryptographic properties | Huang, Kai-Qun; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T05:35:19Z |
| A New Efficient k-out-of-n Oblivious Transfer Scheme by means of Common Cipher | Wang, Chih-Hung; Lin, Chi-Shin | 2006-10-13T01:19:20Z |
| A New Matrix Decode Scheme for Error Diffusion on Visual Share Images | Lee, Bor-Woei Jr; Chen, Hong-Hao Jr; Lee, Chih-Chiang Jr; Lin, Tsung-Hung Jr | 2011-01-06T20:51:29Z |
| A Novel Metropolitan Area Network Service Model with Free Use and Privacy Protection | Chen, Yu-Yi; Lu, Jun-Chao; Lin, Chih-Chiang; Jan, Jinn-Ke; Huang, Der-Chen | 2011-01-19T04:17:05Z |
| A Public Verifiable Security-Enhanced Voting Protocol for a Committee Board Meeting | Ting, Pei-yih; Hung, Po-Yueh; Chen, Ching-Yi | 2006-10-16T05:33:38Z |
| A Robust Oblivious Watermarking Technique | Chen, Huang-Chi Jr; Chang, Yu-Wen Jr; Hwang, Rey-Chue Jr | 2011-01-10T00:04:36Z |
| A robust password-based remote user authentication scheme using bilinear pairings without using smart cards | Liao, Yi-Pin Jr; Wang, Shuenn-Shyang Jr | 2011-01-10T02:18:02Z |
| A robust watermarking scheme based on singular value decomposition and quantization technique | Wu, Hsien-Chu Jr; Jang, Ruen-Jie Jr; Liu, Yu-Chi Jr | 2011-01-10T00:04:27Z |
| A Robust Watermarking Technique for Still Image Using Compression Concept and Coefficient Difference | Lou, Der-Chyuan; Liu, Jiang-Lung; Tso, Hao-Kuan | 2006-10-13T01:21:57Z |
| A Secure and Privacy Protection Digital Goods Trading Scheme in Cloud Computing | Juang, Wen-Shenq Jr; Shue, Yun-Yu Jr | 2011-01-10T02:18:24Z |
| A Secure Dynamic Conference Scheme with Anonymity for Mobile Communications | Hwang, Shin-Jia; Chai, Ming-Jhang | 2009-02-10T06:20:54Z |
| A Study on Industrial Control System Risk Assessment | Farn, Kwo-Jean; Wang, Yen-Fang; Lin, Shu-Kuo; Yang, Chung-Huang; Huang, Chien-Cheng | 2009-02-10T02:24:36Z |
| A study on VoIP Security | Sung, Chia-Ming; Lo, Ching-Cheng; Peng, Chung-Hao; Tsai, Wen-Nung | 2006-10-16T05:39:09Z |
| A Veriable Secure Metering Scheme with Shadow-Self-Refreshing | Cheng, Jiin-Chiou; Chen, Jiun-Ming; Laih, Chi-Sung | 2009-02-10T03:59:57Z |