題名 | 作者 | 日期 |
A modified user-friendly remote authentication scheme with smart cards | Chen, Yi-Hwa; Jan, Jinn-Ke | 2006-10-16T05:33:59Z |
Cryptanalysis of an Enhanced Authentication Key Exchange Protocol | Yang, Fuw-Yi; Jan, Jinn-Ke | 2006-10-16T05:38:08Z |
Security Analysis of a Remote User Authentication Scheme Using Euclidean Plane for Multi-Server Architecture | Ku, Wei-Chi; Chang, Shen-Tien; Chiang, Min-Hung | 2006-10-13T01:19:44Z |
Mobile Payment System Using Dynamic Transaction Numbers | Sue, Kuen-Liang; Tsai, Chung-Hsien | 2006-10-16T05:37:36Z |
A study on VoIP Security | Sung, Chia-Ming; Lo, Ching-Cheng; Peng, Chung-Hao; Tsai, Wen-Nung | 2006-10-16T05:39:09Z |
Rule Set Decomposition for Hardware Network Intrusion Detection | Ramirez, Timothy; Lo, Chia-Tien Dan | 2006-10-16T03:38:14Z |
An Anomaly Intrusion Detection on Database Operation by Fuzzy ART Neural Network | Chen, Rung Ching; Hsieh, Cheng Chia | 2006-10-16T05:37:51Z |
An High Efficiency Feature Extraction Based on Wavelet Transform for Speaker Recognition | Chen, Ching-Han; Chu, Chia-Te | 2006-10-13T01:22:14Z |
NEW IMAGE ENCRYPTION/DECRYPTION ALGORITHMS BASED OF CHAOS | Lin, Hung-Chun; Wang, Shuenn-Shyang; Chen, Li-Ling | 2006-10-16T05:39:21Z |
Watermarking Damage to Risk Multimedia in Intellectual Property Systems | Ke, Hung-Jui; Wang, Shiuh-Jeng; Chiang, Wen-Ya | 2009-02-09T08:32:39Z |