題名 | 作者 | 日期 |
Error Spreading Control in Steganographic Embedding Schemes Using UEP Codes | Yang, Ching-Nung; Chen, Guo-Jau | 2006-10-13T01:21:24Z |
An Intrusion Prevention System using Wrapper | Tsai, Tsung-Yi; Cheng, Kuang-Hung; Chen, Chi-Hung; Tsai, Wen-Nung | 2006-10-16T03:32:52Z |
A new construction of resilient functions over GF(p) with good cryptographic properties | Huang, Kai-Qun; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T05:35:19Z |
Fail-Stop Blind Signature Scheme Based on the Integer Factorization | Wu, Lin-Chuan; Fan, Chun-I; Yeh, Yi-Shiung; Liu, Tsann-Shyong | 2006-10-13T01:20:10Z |
A Public Verifiable Security-Enhanced Voting Protocol for a Committee Board Meeting | Ting, Pei-yih; Hung, Po-Yueh; Chen, Ching-Yi | 2006-10-16T05:33:38Z |
Card Secure Code for Preventing Fraudulent Use of Credit Cards Online | Sue, Kuen-Liang; Juan, Chien-Lin | 2006-10-16T05:33:31Z |
Three Methods of Control Flow Obfuscation on Java Software | Tsai, Ming-Hsiu; Chen, Hsiang-Yang; Hou, Ting-Wei | 2006-10-13T01:20:53Z |
Cryptanalysis of a New Password Authentication Scheme Using Hash Functions | Ku, Wei-Chi; Chiang, Min-Hung; Chang, Shen-Tien | 2006-10-16T05:33:45Z |
New Efficient Constructions of Binary Asymmetric Error-Correcting Codes | Liang, Han-Chang; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T05:34:57Z |
An Energy-Efficient En-route Filtering False Data Scheme in Wireless Sensor Networks | Wang, Chueh; Hwang, Ren-Junn; Liu, Yu-Hang | 2009-02-10T02:21:13Z |