| 題名 | 作者 | 日期 |
| A Collusion Attack on Ghodosi and Saeednia’s Scheme | Chen, Chien-Yuan; Hsueh, Chih-Cheng | 2006-10-17T03:50:42Z |
| A Feasible Image Hiding Scheme Based on JPEG and VQ | Lin, Shinfeng D.; Shie, Shih-Chieh; Chou, Chung-Chien | 2006-06-09T08:33:43Z |
| A Secure Dynamic Conference Scheme with Anonymity for Mobile Communications | Hwang, Shin-Jia; Chai, Ming-Jhang | 2009-02-10T06:20:54Z |
| A Specifiable-Verifier Group-Oriented Threshold Signature Scheme Based on the Elliptic Curve Cryptosystem | Chen, Tzer-Shyong; Huang, Gwo-Shiuan; Chung, Yu-Fang; Chang, Nien-Tzu | 2006-10-16T04:01:21Z |
| An Adaptive Technique for the Steganography in Spatial Domain | Lou, Der-Chyuan; Liu, Jiang-Lung | 2006-11-13T01:43:35Z |
| Improvements of Chang-Wu group-oriented authentication and key exchange protocols | Chien, Hung-Yu; Wu, Tzong-Chen; Jan, Jinn-Ke; Tseng, Yuh-Min | 2006-11-13T02:58:29Z |
| Investigations on Fast Exponentiation Algorithms for RSA Cryptographic Applications | Wu, Chia-Long; Lou, Der-Chyuan; Chang, Te-Jen | 2006-10-04T02:31:26Z |
| Online Fair Games based on Oblivious Signatures | 左, 瑞麟 Jr; 吳, 佩穎 Jr; 黃, 齡葦 Jr; 張, 莞純 Jr | 2011-03-24T23:41:30Z |
| Performance Improvement for the GGM-Construction of Pseudorandom Functions | Chen, Yu-Sheng; Horng, Gwo-Boa; Liu, Chao-Liang | 2006-10-13T06:52:41Z |
| Quantum Identification Protocol with Trusted Author | Hsueh, Chih-Cheng; Chen, Chien-Yuan; Dai, Yu-Chin | 2006-10-13T08:21:05Z |
| Zero-Knowledge Interactive Proof Schemes Based on Subset Sum Promblem | Laih, Chi-Sung; Kuo, Wen-Chung; Gau, M. J. | 2006-10-31T09:14:09Z |