搜尋
新增篩選器:
使用篩選器讓結果更精確。
符合的文件:
題名 | 作者 | 日期 |
---|---|---|
一種應用於挖掘關聯式法則可防止洩密的資料擾亂方法 | 賈坤芳; 賴俐錦 | 2006-06-08T09:26:52Z |
應用模糊混沌同步與國際數據加密演算法之密碼系統 | 余國瑞; 吳東軒 | 2006-06-12T06:10:25Z |
Robust Gray-level Digital Image Watermarking Techniques | 邱于真; 張元馨; 謝明興 | 2006-06-12T03:48:55Z |
Cryptanalysis of Li et al.’s Generalization of Proxy Signature Schemes | Hwang, Shin-Jia; Chan, Ching-Chung | 2006-06-09T08:57:43Z |
Design of Message Authentication Code with AES and SHA-1 on FPGA | Yeh, Kuo-Hsien; Liang, Yin-Zhen | 2006-06-09T02:50:13Z |
A New Authentication Scheme for Protecting Mobile Agent Platforms Using Pairing-Based Cryptosystems | Tsaur, Woei-Jiunn; Ho, Chien-Hao; Guo, Chii-Jyh | 2006-06-09T08:48:25Z |
Digital Watermarking of Color Images Using Support Vector Machines | Yu, Pao-Ta; Tsai, Hung-Hsu; Sun, Duen-Wu | 2006-06-08T08:24:25Z |
無需揭露未得標價之第(M + 1)高價秘密競標協定 | 吳宗成; 黃士原 | 2006-06-09T02:32:09Z |
Cryptanalysis of publicly verifiable authenticated encryption | Hwang, Ren-Junn; Lai, Chih-Hua; Peng, Jui-Chu | 2006-06-12T06:52:56Z |
資料加密與解密─應用於網路安全 | 王鑫聖; 翁鈺華; 顏淑惠 | 2006-06-12T03:09:11Z |