題名 | 作者 | 日期 |
A Java Security Model Based on Information Flow Control | Chang, Chih-Yuh; Lei, Chin-Laung; Juang, Wen-Shenq | 2006-10-31T09:02:09Z |
A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process | Fan, Chun-I; Lei, Chin-Laung | 2006-11-13T02:44:13Z |
A UNIFIED MODEL FOR SOFTWARE COMPONENT CLASSIFICATION | Sun, Yuen-Chang; Lei, Chin-Laung | 2006-10-23T06:06:57Z |
A VERIGIABLE MULTI-AUTHORITIES SECRET ELECTION ALLOWING ABSTAINING FROM VOTING | Juang, Wen-Shenq; Lei, Chin-Laung; Yu, Pei-Ling | 2006-10-20T03:33:13Z |
An Efficient Anonymous Buyer-Seller Watermarking Protocol | Lei, Chin-Laung; Chan, Ming-Hwa | 2006-10-16T01:42:53Z |
AN EFFICIENT ELECTION SCHEME FOR RESOLVING TIES | Fan, Chun-I; Lei, Chin-Laung; Chang, Chin-Yuh | 2006-10-20T03:21:51Z |
An Efficient Tree-Based Processor Allocation Scheme For Mesh Connected Systems | Tsai, Shuen-Fu; Lei, Chin-Laung; Lai, I-Chi | 2006-10-30T02:26:44Z |
An Efficient Tree-Based Processor Allocation Scheme For Mesh Connected Systems | Tsai, Shuen-Fu; Lei, Chin-Laung; Lai, I-Chi | 2006-11-20T01:27:45Z |
Anonymous Channel and Authentication in Wireless | Juang, Wen-Shenq; Lei, Chin-Laung; Fan, Chun-I | 2006-10-30T01:38:20Z |
EFFICIENT CHEATER IDENTIFICATION IN SEQUENTIAL SECRET SHARING SCHEMES | Lei, Chin-Laung; Cho, Cheng-Tsung | 2006-10-20T05:34:22Z |
Fair Blind T hreshold Signatures in Wallet w ith Observers | Juang, Wen-Shenq; Liaw, Horng-Twu; Lei, Chin-Laung; Lin, Po-Chou | 2006-10-17T04:05:39Z |
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | Lei, Chin-Laung; Juang, Wen-Shenq; Yu, Pei-Ling | 2006-11-13T02:57:51Z |
Skins as a Mechanism for Makin Languages Syntactically Extensible | Sun, Yuen-Chang; Lei, Chin-Laung | 2006-10-27T07:19:09Z |
USING THESAURI FOR TERM-BASED COMPONENT RETRIEVAL: A DISTRIBUTED AND ADAPTIVE MODEL | Sun, Yuen-Chang; Lei, Chin-Laung | 2006-10-22T08:32:15Z |