|
???tair.name??? >
???browser.page.title.author???
|
"tso ray lin"???jsp.browse.items-by-author.description???
Showing items 1-20 of 20 (1 Page(s) Totally) 1 View [10|25|50] records per page
國立政治大學 |
2017-11 |
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption
|
左瑞麟; Huang, Kaibin; Tso, Ray-Lin; Chen, Yu Chi |
國立政治大學 |
2016-12 |
NFC-based Mobile Payment Protocol with User Anonymity
|
左瑞麟; Chen, Shang Wen; Tso, Ray-Lin |
國立政治大學 |
2016-10 |
Security analysis of a NTRU-based mutual authentication scheme
|
左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio |
國立政治大學 |
2016 |
Two-in-one oblivious signatures secure in the random oracle model
|
左瑞麟; Tso, Ray-Lin |
國立政治大學 |
2015-01 |
Cryptanalysis and improvement of an efficient password authentication scheme based on smart card
|
Tso, Ray-Lin; 左瑞麟; Wu, M.-E.; Lin, Yi Shiuan |
國立政治大學 |
2014-12 |
Pitfalls in an ultra-lightweight authentication protocol for low-cost RFID
|
Chen, C.M.;Pan, J.S.;Tso, Ray-Lin;Huang, Szu Wei;Wu, M.E.; 左瑞麟 |
國立政治大學 |
2014-10 |
Security analysis and improvement of femtocell access control
|
Chen, C.-M.;Wu, T.-Y.;Tso, Ray-Lin;Wu, M.-E.; 左瑞麟 |
國立政治大學 |
2014-04 |
Certificateless signatures with message recovery
|
Tso, Ray-Lin; 左瑞麟 |
國立政治大學 |
2014-04 |
A secret sharing scheme for EBTC using steganography
|
Kim, C.;Shin, D.;Shin, D.;Tso, Ray-Lin;Yang, C.-N.; 左瑞麟 |
國立政治大學 |
2013-07 |
Design and implementation of digital forensic software for iPhone
|
Chen, C.-N.;Tso, Ray-Lin;Yang, C.-H.; 左瑞麟 |
國立政治大學 |
2013 |
Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme
|
Tso, Ray-Lin; 左瑞麟; Chen, Y.-C.; Horng, G. |
國立政治大學 |
2012 |
A commutative encryption scheme based on ElGamal encryption
|
Huang, K.;Tso, Ray-Lin; 左瑞麟 |
國立政治大學 |
2012 |
Message from UIPM-12 workshop chairs
|
Wang, S.-J.;Kwak, J.;Liu, J.;Wang, W.-J.;Desell, T.;Su, P.-C.;Chang, C.-L.;Chen, C.-C.;Chen, Y.-L.;Cheng, H.-Y.;Huang, C.-W.;Kumar, S.;Huang, L.;Huang, S.-H.;Kim, C.;Kim, C.;Kim, J.W.;Sheu, R.-K.;Song, H.;Tsai, M.-F.;Tso, H.-K.;Tso, Ray-Lin;Varela, C.A.;Yang, C.-H.;Yu, C.-C.;Yuan, S.-M.; 左瑞麟 |
國立政治大學 |
2012 |
Identity-based password-authenticated key exchange for client/server model
|
Yi, X.;Tso, Ray-Lin;Okamoto, E.; 左瑞麟 |
國立政治大學 |
2012 |
Security analysis concerning the random numbers of threshold ring signatures
|
Huang, Kaibin;Tso, Ray-Lin; 左瑞麟 |
國立政治大學 |
2011.10 |
Certificateless Message Recovery Signatures Providing Girault’s Level-3 Security
|
左瑞麟; TSO, Ray-lin; Kim, Cheonshik; 易訓 |
國立政治大學 |
2011-08 |
A privacy preserved two-party equality testing protocol
|
Ciou, Shih Fong;Tso, Ray-Lin; 邱士峰;左瑞麟 |
國立政治大學 |
2011-07 |
Three-party password-authenticated key exchange without random oracles
|
Yi, X.;Tso, Ray-Lin ; Okamoto, E.; 左瑞麟 |
國立政治大學 |
2010 |
Design and analysis of "flexible" k-out-of-n signatures
|
Tso, Ray-Lin;Yi, X.;Ito, T.;Okamoto, T.;Okamoto, E.; 左瑞麟 |
國立政治大學 |
2009 |
ID-based group password-authenticated key exchange
|
Yi, X.;Tso, Ray Lin; 左瑞麟 |
Showing items 1-20 of 20 (1 Page(s) Totally) 1 View [10|25|50] records per page
|