瀏覽 的方式: 關鍵字 cryptography

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1 到 11 筆資料,總共 11 筆
題名作者日期
A Collusion Attack on Ghodosi and Saeednia’s SchemeChen, Chien-Yuan; Hsueh, Chih-Cheng2006-10-17T03:50:42Z
A Feasible Image Hiding Scheme Based on JPEG and VQLin, Shinfeng D.; Shie, Shih-Chieh; Chou, Chung-Chien2006-06-09T08:33:43Z
A Secure Dynamic Conference Scheme with Anonymity for Mobile CommunicationsHwang, Shin-Jia; Chai, Ming-Jhang2009-02-10T06:20:54Z
A Specifiable-Verifier Group-Oriented Threshold Signature Scheme Based on the Elliptic Curve CryptosystemChen, Tzer-Shyong; Huang, Gwo-Shiuan; Chung, Yu-Fang; Chang, Nien-Tzu2006-10-16T04:01:21Z
An Adaptive Technique for the Steganography in Spatial DomainLou, Der-Chyuan; Liu, Jiang-Lung2006-11-13T01:43:35Z
Improvements of Chang-Wu group-oriented authentication and key exchange protocolsChien, Hung-Yu; Wu, Tzong-Chen; Jan, Jinn-Ke; Tseng, Yuh-Min2006-11-13T02:58:29Z
Investigations on Fast Exponentiation Algorithms for RSA Cryptographic ApplicationsWu, Chia-Long; Lou, Der-Chyuan; Chang, Te-Jen2006-10-04T02:31:26Z
Online Fair Games based on Oblivious Signatures左, 瑞麟 Jr; 吳, 佩穎 Jr; 黃, 齡葦 Jr; 張, 莞純 Jr2011-03-24T23:41:30Z
Performance Improvement for the GGM-Construction of Pseudorandom FunctionsChen, Yu-Sheng; Horng, Gwo-Boa; Liu, Chao-Liang2006-10-13T06:52:41Z
Quantum Identification Protocol with Trusted AuthorHsueh, Chih-Cheng; Chen, Chien-Yuan; Dai, Yu-Chin2006-10-13T08:21:05Z
Zero-Knowledge Interactive Proof Schemes Based on Subset Sum PromblemLaih, Chi-Sung; Kuo, Wen-Chung; Gau, M. J.2006-10-31T09:14:09Z