題名 | 作者 | 日期 |
A Study on Industrial Control System Risk Assessment | Farn, Kwo-Jean; Wang, Yen-Fang; Lin, Shu-Kuo; Yang, Chung-Huang; Huang, Chien-Cheng | 2009-02-10T02:24:36Z |
Secure Localization in Wireless Sensor Networks | Fan, You-Sheng; Wang, Chueh; Hsiao, Yu-Kai | 2009-02-10T03:04:33Z |
Pseudonym-based Anonymous PKI with Short Group Signature | Lee, Sokjoon; Chung, Byung-Ho | 2009-02-10T02:24:21Z |
Practical anonymous proxy signature schemes without trusted alias issuers | Hwang, Shin-Jia; Hsu, Pi-Hung | 2009-02-09T08:38:29Z |
A Robust Watermarking Technique for Still Image Using Compression Concept and Coefficient Difference | Lou, Der-Chyuan; Liu, Jiang-Lung; Tso, Hao-Kuan | 2006-10-13T01:21:57Z |
Weaknesses of a Flexible Remote User Authentication Scheme Using Smart Cards | Ku, Wei-Chi; Chen, Wei-Chi; Chuang, Hsiu-Mei | 2006-10-13T01:10:34Z |
Error Spreading Control in Steganographic Embedding Schemes Using UEP Codes | Yang, Ching-Nung; Chen, Guo-Jau | 2006-10-13T01:21:24Z |
An Intrusion Prevention System using Wrapper | Tsai, Tsung-Yi; Cheng, Kuang-Hung; Chen, Chi-Hung; Tsai, Wen-Nung | 2006-10-16T03:32:52Z |
A new construction of resilient functions over GF(p) with good cryptographic properties | Huang, Kai-Qun; Chang, Jen-Chun; Chen, Rong-Jaye | 2006-10-16T05:35:19Z |
Fail-Stop Blind Signature Scheme Based on the Integer Factorization | Wu, Lin-Chuan; Fan, Chun-I; Yeh, Yi-Shiung; Liu, Tsann-Shyong | 2006-10-13T01:20:10Z |