題名 | 作者 | 日期 |
Preventing Information Leakage within Object-Oriented Systems Using RBAC-Based Model | Chou, Shih-Chien; Wu, Chien-Jung | 2006-10-16T05:39:29Z |
Image Hiding Based on a Hybrid Technique of VQ Compression and Discrete Wavelet Transformation | Chu, Yen-Ping; Guo, Shu-Wei; Chan, Yung-Kuan; Wu, Hsien-Chu | 2006-10-13T01:20:32Z |
Improvement on a Provable Secure Access Control using Smart Cards | Yang, Fuw-Yi; Jan, Jinn-Ke | 2006-10-13T01:17:18Z |
Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable Recipient | Lin, Han-Yu; Wu, Tzong-Sun | 2009-02-10T02:32:52Z |
Performance Evaluation of Two Secure Communication Schemes on Vehicular Ad Hoc Networks | Lo, N.W.; Yang, Chu-Hsiang; Yeh, Kuo-Hui | 2009-02-10T06:29:06Z |
A Study on Industrial Control System Risk Assessment | Farn, Kwo-Jean; Wang, Yen-Fang; Lin, Shu-Kuo; Yang, Chung-Huang; Huang, Chien-Cheng | 2009-02-10T02:24:36Z |
Secure Localization in Wireless Sensor Networks | Fan, You-Sheng; Wang, Chueh; Hsiao, Yu-Kai | 2009-02-10T03:04:33Z |
Pseudonym-based Anonymous PKI with Short Group Signature | Lee, Sokjoon; Chung, Byung-Ho | 2009-02-10T02:24:21Z |
Practical anonymous proxy signature schemes without trusted alias issuers | Hwang, Shin-Jia; Hsu, Pi-Hung | 2009-02-09T08:38:29Z |
A Robust Watermarking Technique for Still Image Using Compression Concept and Coefficient Difference | Lou, Der-Chyuan; Liu, Jiang-Lung; Tso, Hao-Kuan | 2006-10-13T01:21:57Z |