瀏覽 的方式: 關鍵字 Authentication

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1 到 16 筆資料,總共 16 筆
題名作者日期
A Key Authentication Scheme for Non-repudiationHwang, Min-Shiang; Li, Li-Mua; Lee, Cheng-Chi2006-11-13T02:58:57Z
A modified user-friendly remote authentication scheme with smart cardsChen, Yi-Hwa; Jan, Jinn-Ke2006-10-16T05:33:59Z
A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication SystemsWang, Ren-Chiun Jr; Juang, Wen-Shenq Jr; Lei, Chin-Laung Jr2011-05-23T20:40:41Z
A Wireless-based Authentication and Anonymous Channels for GSM SystemHwang, Ren-Junn; Li, Jing-Feng; Hsiao, Yu-Kai2008-11-07T08:57:17Z
Comments on A Remote User Authentication Scheme Using Smart Cards with Forward SecrecyChen, Yi-Hwa; Jan, Jinn-Ke2006-10-16T05:38:28Z
Cryptanalysis and improvement of an improved Identity-Based key exchange protocolTseng, Yu-Mim; Jan, Jinn-Ke; Wang, Ching-Hung2006-10-16T04:00:56Z
Cryptanalysis of an Enhanced Authentication Key Exchange ProtocolYang, Fuw-Yi; Jan, Jinn-Ke2006-10-16T05:38:08Z
Cryptanalysis of Authenticated Key Agreement ProtocolsYeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih2006-10-17T03:55:56Z
Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication SchemeKuo, Wen-Chung; Chu, Yu-Shuan; Chen, Bae-Ling2011-03-31T21:48:12Z
Enhanced Authentication Key Agreement ProtocolHwang, Ren-Junn; Shiau, Sheng-Hua; Lin, Kai-Jun2006-10-16T03:23:02Z
Mutually Identity Authentications in GSM-based Anonymous CommunicationsWang, Shiuh-Jeng; Tsai, Yuh-Ren; Chou, Lei-Sheng; Lin, I-Shan2008-11-11T07:38:18Z
New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless NetworksHsu, Chien-Lung; Lin, Wen-Te; Chou, Yen-Chun2008-11-11T07:29:34Z
Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil PairingHorng, Gwoboa; Liu, Chao-Liang; Liu, Hsin-Yu2006-10-16T05:38:51Z
Security Enhancement for Robust Password Authenticated Key Agreement Using Smart CardsJuang, Wen-Shenq; Chen, Sian-Teng2007-01-29T08:34:09Z
The Implementation of Data Security Base on Wireless NetworksYeh, Sheng-Cheng2006-10-17T07:01:07Z
Weaknesses of a Flexible Remote User Authentication Scheme Using Smart CardsKu, Wei-Chi; Chen, Wei-Chi; Chuang, Hsiu-Mei2006-10-13T01:10:34Z