題名 | 作者 | 日期 |
A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation | Hsieh, Shang-Lin; Huang, Bin-Yuan | 2006-10-16T01:54:57Z |
Quantum secret key encryption algorithm based on quantum discrete logarithm problem | Hsueh, Chih-Cheng; Chen, Chien-Yuan | 2006-10-13T01:19:58Z |
Self-Synchronization Object Watermarking Scheme Based on shape Subdivision | Ho, Yu-Kuen; Wu, Mei-Yi; Lin, Fu-Chun | 2006-10-16T03:32:22Z |
Changing Data Type Method of Data Obfuscation on Java Software | Chen, Hsiang-Yang; Hou, Ting-Wei | 2006-10-13T01:21:03Z |
A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored Data | Ku, Wei-Chi; Tsai, Hao-Chuan; Tsaur, Maw-Jinn | 2006-10-16T05:38:00Z |
A modified user-friendly remote authentication scheme with smart cards | Chen, Yi-Hwa; Jan, Jinn-Ke | 2006-10-16T05:33:59Z |
Cryptanalysis of an Enhanced Authentication Key Exchange Protocol | Yang, Fuw-Yi; Jan, Jinn-Ke | 2006-10-16T05:38:08Z |
Security Analysis of a Remote User Authentication Scheme Using Euclidean Plane for Multi-Server Architecture | Ku, Wei-Chi; Chang, Shen-Tien; Chiang, Min-Hung | 2006-10-13T01:19:44Z |
Mobile Payment System Using Dynamic Transaction Numbers | Sue, Kuen-Liang; Tsai, Chung-Hsien | 2006-10-16T05:37:36Z |
A study on VoIP Security | Sung, Chia-Ming; Lo, Ching-Cheng; Peng, Chung-Hao; Tsai, Wen-Nung | 2006-10-16T05:39:09Z |