English  |  正體中文  |  简体中文  |  2823698  
???header.visitor??? :  30499090    ???header.onlineuser??? :  1137
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

"n y lee"???jsp.browse.items-by-author.description???

???jsp.browse.items-by-author.back???
???jsp.browse.items-by-author.order1??? ???jsp.browse.items-by-author.order2???

Showing items 51-71 of 71  (3 Page(s) Totally)
<< < 1 2 3 
View [10|25|50] records per page

Institution Date Title Author
南台科技大學 1999 Comments on Dynamic key management schemes for access control in a hierarchy 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1999 Comments on two group signatures 李南逸; C.H. Wang; T. Hwang; N.Y. Lee
南台科技大學 1998-12 Group-oriented undeniable signature schemes without a trusted center 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1998-07 On Zhang's nonrepudiable proxy signature schemes 李南逸; N.Y. Lee; T. Hwang; C.H. Wang
南台科技大學 1997-10 On the security of Park et al’s key distribution protocol for digital mobile communications 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1997 Remarks on Chang-Buehrer access control scheme in a hierarchy 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1996-12 On the security of Chang et al. ‘s cryptographic key assignment scheme for access control in a hierarchy 李南逸; T. Hwang; N.Y. Lee; C.C. Chang
南台科技大學 1996-09 多種數位簽章系統之簡介 李南逸; N.Y. Lee
南台科技大學 1996 Modified Harn signature scheme based on factoring and discrete logaritms 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1996 On the security of Chang and Wu`s broadcasting cryptosystem for computer networks 李南逸; T. Hwang; N.Y. Lee; C.M. Li; C.C. Chang
南台科技大學 1996 Comment on “Cryptanalysis of the blind signatures based on the discrete logarithm problem 李南逸; N.Y. Lee; T. Hwang; C.H. Wang
南台科技大學 1995 On the security of Wu and Yeh`s conference key distribution system 李南逸; T. Hwang; N.Y. Lee; C.H. Wang; M.Y. Ko
南台科技大學 1995 The security of He and Kiesler`s signature schemes 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1995 Two attacks on Neuman-Sutbblebine authentication protocols 李南逸; T. Hwang; N.Y. Lee; C.M. Li; M.Y. Ko; Y.H. Chen
南台科技大學 1995 Yet another efficient access control for user hierarchy 李南逸; T. Hwang; N.Y. Lee
南台科技大學 1994 A pseudo-key scheme for dynamic access control in a hierarchy 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1994 Conspiracy attacks on the threshold RSA sigature scheme 李南逸; C.M. Li; T. Hwang; N.Y. Lee
南台科技大學 1994 Remark on Yen adn Laih`s digital signature scheme 李南逸; N.Y. Lee; T. Hwang; C.M. Li
南台科技大學 1994 Threshold-multisignature schemes where suspected forgery implies traceability of adversarial sharteholders 李南逸; C.M. Li; T. Hwang; N.Y. Lee
南台科技大學 1993 On the security of Blundo-Santis Herzberg-Kutten-Vaccaro-Yung perfectly-secure key distribtion for dynamic coferences 李南逸; T. Hwang; N.Y. Lee; M.Y. Ko; C.M. Li; Y.H. Chen
南台科技大學 1993 Remark on the threshold RSA signature scheme 李南逸; C.M. Li; T. Hwang; N.Y. Lee

Showing items 51-71 of 71  (3 Page(s) Totally)
<< < 1 2 3 
View [10|25|50] records per page