題名 | 作者 | 日期 |
Cryptanalysis of a More Secure Remote User Authentication Scheme | Horng, Wen-Bing Jr; Lee, Cheng-Ping Jr; Peng, Jian-Wen Jr | 2011-01-10T02:18:09Z |
A New Matrix Decode Scheme for Error Diffusion on Visual Share Images | Lee, Bor-Woei Jr; Chen, Hong-Hao Jr; Lee, Chih-Chiang Jr; Lin, Tsung-Hung Jr | 2011-01-06T20:51:29Z |
A Detection Scheme for Flooding Attack on Application Layer Based on Semantic Concept | Lin, Chu-Hsing; Lee, Chen-Yu; Liu, Jung-Chun; Chen, Ching-Ru; Huang, Shin-Yang | 2011-01-19T04:17:27Z |
Basic Unit Layer Rate Control for Video Security | Yan, Tao Jr; Deng, Anyuan Jr; Tsaur, Woei-Jiunn Jr; Li, Jia-Hong Jr; Tsai, Hsin-Chieh Jr | 2011-01-06T20:52:55Z |
Quantum Key Distribution and Denial-of-Service: Using strengthened classical cryptography as a fallback option | Schartner, Peter Jr; Rass, Stefan Jr | 2011-01-10T00:03:57Z |
A Copyright Protection Scheme for Gray-Level Images Based on Image Secret Sharing and Wavelet Transformation | Hsieh, Shang-Lin; Huang, Bin-Yuan | 2006-10-16T01:54:57Z |
Quantum secret key encryption algorithm based on quantum discrete logarithm problem | Hsueh, Chih-Cheng; Chen, Chien-Yuan | 2006-10-13T01:19:58Z |
Self-Synchronization Object Watermarking Scheme Based on shape Subdivision | Ho, Yu-Kuen; Wu, Mei-Yi; Lin, Fu-Chun | 2006-10-16T03:32:22Z |
Changing Data Type Method of Data Obfuscation on Java Software | Chen, Hsiang-Yang; Hou, Ting-Wei | 2006-10-13T01:21:03Z |
A Common Weakness of Password Authentication Schemes Requiring Synchronous Update of Stored Data | Ku, Wei-Chi; Tsai, Hao-Chuan; Tsaur, Maw-Jinn | 2006-10-16T05:38:00Z |