題名 | 作者 | 日期 |
Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment | Chuang, Yun-Hsin Jr; Tseng, Yuh-Min Jr | 2011-03-25T00:47:14Z |
Reversible Data Hiding Based on CSD Data Representation | Lin, Wei-Sheng Jr; Cho, Cheng-Min Jr; Wang, Shuenn-Shyang Jr; Fan, Sz–Jiun Jr | 2011-03-25T00:46:40Z |
A Priority and Trust Value Scheme to Inhibit the Flooding Attack in Ad Hoc Networks | Lin, Yi-Hsing Jr; Lin, Chu-Hsing Jr | 2011-03-24T23:42:31Z |
Scalable Architecture for Dual Basis Multiplication over GF(2m) | Chen, Liang-Hwa Jr; Chang, Po-Lun Jr; Lee, Chiou-Yng Jr | 2011-03-24T23:42:19Z |
Identity-Based Strong Designated Verifier Signature Scheme from Pairings | 吳, 宗杉 Jr; 高, 俊海 Jr; 林, 韓禹 Jr; 黃, 世豪 Jr | 2011-03-24T23:42:03Z |
A Patch Protocol for SHK Secret Transfer Scheme | Lu, Tian-Lung Jr; Chang, Jen-Chun Jr; Wu, Hsin-Lung Jr | 2011-03-24T23:42:42Z |
Steganalyses of Reversible Data Hiding Techniques | 婁德權; 周兆龍; 瞿忠正 | 2011-03-31T21:48:00Z |
(n,t) Threshold Key Generation in Identity-based Cryptosystems | Tseng, Fu-Kuo; Chen, Rong-Jaye | 2011-03-31T21:47:52Z |
半盲目型浮水印植基自我參照影像 | 李, 金鳳 Jr; 陳, 星琳 Jr; 楊, 宗家 Jr | 2011-03-24T23:40:11Z |
一個針對微聚合問題的分裂重組法 | 林, 惠珍 Jr; 尹, 邦嚴 Jr | 2011-03-25T01:00:05Z |