國立臺灣科技大學 |
2013 |
Two ID-based authenticated schemes with key agreement for mobile environments
|
Chou, C.-H.;Tsai, K.-Y.;Lu, C.-F. |
國立臺灣科技大學 |
2013 |
Efficient and secure three-party authenticated key exchange protocol for mobile environments
|
Chou, C.-H.;Tsai, K.-Y.;Wu, T.-C.;Yeh, K.-H. |
臺大學術典藏 |
2013 |
Solution-refined method for electrostatic potential distribution of large-scale electron optics
|
Sheu, T.-W.-H.; Tsai, K.-Y.; Yen, J.-Y.; JIA-HAN LI; Li, J.-H.; Lee, Y.-M. |
國立臺灣科技大學 |
2012 |
A fair-exchange e-payment protocol for digital products with customer unlinkability
|
Yen, Y.-C.;Wu, T.-C.;Lo, N.-W.;Tsai, K.-Y. |
國立臺灣科技大學 |
2012 |
Efficient ecc-based key management scheme for secure multicast in heterogeneous sensor networks
|
Lee, C.-I.;Wu, T.-C.;Chien, H.-Y.;Tsai, K.-Y. |
臺大學術典藏 |
2012 |
Electron-beam proximity effect model calibration for fabricating scatterometry calibration samples
|
Shen, Y.-T.; Liu, C.-H.; Chen, C.-Y.; Ng, H.-T.; Tsai, K.-Y.; Wang, F.-M.; Kuan, C.-H.; Lee, Y.-M.; Cheng, H.-H.; Li, J.-H.; Chen, A.C.; JIA-HAN LI |
國立臺灣科技大學 |
2011 |
Developing contour surfaces of manipulators with specified dexterities
|
Tsai, K.Y.;Lin, P.J.;Yu, H.Y. |
國立臺灣科技大學 |
2011 |
NEW SECRET KEY TRAITOR TRACING SCHEME WITH DISPUTE SETTLEMENT FROM BILINEAR MAPS
|
Tsai, K.Y.;Wu, T.C.;Hsu, C.L. |
國立臺灣科技大學 |
2010 |
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
|
Tsai, K.Y;Hsu, C.L;Wu, T.C |
國立臺灣科技大學 |
2010 |
A novel multisignature scheme for special verifier group against clerk attack
|
Tsai, J.L;Wu, T.C;Tsai, K.Y |
國立臺灣科技大學 |
2010 |
New dynamic ID authentication scheme using smart cards
|
Tsai J.-L.; Wu T.-C.; Tsai K.-Y. |
國立臺灣科技大學 |
2010 |
A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks
|
Tsai J.-L.; Wu T.-C.; Tsai K.-Y. |
國立臺灣科技大學 |
2010 |
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
|
Tsai K.-Y.; Hsu C.-L.; Wu T.-C. |
國立臺灣科技大學 |
2010 |
Self-Certified Multi-authenticated Encryption Scheme
|
Tsai, J.L.;Wu, T.C.;Tsai, K.Y. |
國立臺灣科技大學 |
2009 |
Synthesis of 6-DOF 3-chain isotropic parallel manipulators
|
Tsai K.Y.; Lee T.K. |
國立臺灣科技大學 |
2009 |
6-DOF parallel manipulators with better dexterity, rotatability, or singularity-free workspace
|
Tsai K.Y.; Lee T.K. |
國立臺灣科技大學 |
2008 |
Convertible multi-authenticated encryption scheme
|
Wu, T.S;Hsu, C.L;Tsai, K.Y;Lin, H.Y;Wu, T.C |
國立臺灣科技大學 |
2008 |
Recursive protocol for group-oriented authentication with key distribution
|
Wu, T.C;Huang T.T;Hsu, C.L;Tsai, K.Y |
國立臺灣科技大學 |
2008 |
A new class of isotropic generators for developing 6-DOF isotropic manipulators
|
Tsai, K.Y.;Lee, T.K.;Jang, Y.S. |
國立臺灣科技大學 |
2008 |
4R spatial and 5R parallel manipulators that can reach maximum number of isotropic positions
|
Tsai, K.Y.;Lin, P.Y.;Lee, T.K. |
國立臺灣科技大學 |
2008 |
Convertible multi-authenticated encryption scheme
|
Wu, T.-S.;Hsu, C.-L.;Tsai, K.-Y.;Lin, H.-Y.;Wu, T.-C. |
國立臺灣科技大學 |
2007 |
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
|
Hsu, C.-L.;Tsai, K.-Y.;Tsai, P.-L. |
國立臺灣科技大學 |
2006 |
Determining the compatible orientation workspace of Stewart-Gough parallel manipulators
|
Tsai, K.Y.;Lin, J.C. |
國立臺灣科技大學 |
2006 |
Determining the workspace boundary of 6-DOF parallel manipulators
|
Tsai, K.Y.;Lee, T.K.;Huang, K.D. |