English  |  正體中文  |  简体中文  |  Total items :0  
Visitors :  50692173    Online Users :  212
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

"t hwang"

Return to Browse by Author
Sorting by Title Sort by Date

Showing items 16-37 of 37  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page

Institution Date Title Author
南台科技大學 1999-01 On the security of fair blind signature scheme using oblivious transfer 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1999-01 The security of two ID-based multisignature protocols for sequential and broadcasting architectures 李南逸; N.Y. Lee; T. Hwang; C.H. Wang
南台科技大學 1999 Comments on Dynamic key management schemes for access control in a hierarchy 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1999 Comments on two group signatures 李南逸; C.H. Wang; T. Hwang; N.Y. Lee
南台科技大學 1998-12 Group-oriented undeniable signature schemes without a trusted center 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1998-07 On Zhang's nonrepudiable proxy signature schemes 李南逸; N.Y. Lee; T. Hwang; C.H. Wang
南台科技大學 1997-10 On the security of Park et al’s key distribution protocol for digital mobile communications 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1997 Remarks on Chang-Buehrer access control scheme in a hierarchy 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1996-12 On the security of Chang et al. ‘s cryptographic key assignment scheme for access control in a hierarchy 李南逸; T. Hwang; N.Y. Lee; C.C. Chang
南台科技大學 1996 Modified Harn signature scheme based on factoring and discrete logaritms 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1996 On the security of Chang and Wu`s broadcasting cryptosystem for computer networks 李南逸; T. Hwang; N.Y. Lee; C.M. Li; C.C. Chang
南台科技大學 1996 Comment on “Cryptanalysis of the blind signatures based on the discrete logarithm problem 李南逸; N.Y. Lee; T. Hwang; C.H. Wang
南台科技大學 1995 On the security of Wu and Yeh`s conference key distribution system 李南逸; T. Hwang; N.Y. Lee; C.H. Wang; M.Y. Ko
南台科技大學 1995 The security of He and Kiesler`s signature schemes 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1995 Two attacks on Neuman-Sutbblebine authentication protocols 李南逸; T. Hwang; N.Y. Lee; C.M. Li; M.Y. Ko; Y.H. Chen
南台科技大學 1995 Yet another efficient access control for user hierarchy 李南逸; T. Hwang; N.Y. Lee
南台科技大學 1994 A pseudo-key scheme for dynamic access control in a hierarchy 李南逸; N.Y. Lee; T. Hwang
南台科技大學 1994 Conspiracy attacks on the threshold RSA sigature scheme 李南逸; C.M. Li; T. Hwang; N.Y. Lee
南台科技大學 1994 Remark on Yen adn Laih`s digital signature scheme 李南逸; N.Y. Lee; T. Hwang; C.M. Li
南台科技大學 1994 Threshold-multisignature schemes where suspected forgery implies traceability of adversarial sharteholders 李南逸; C.M. Li; T. Hwang; N.Y. Lee
南台科技大學 1993 On the security of Blundo-Santis Herzberg-Kutten-Vaccaro-Yung perfectly-secure key distribtion for dynamic coferences 李南逸; T. Hwang; N.Y. Lee; M.Y. Ko; C.M. Li; Y.H. Chen
南台科技大學 1993 Remark on the threshold RSA signature scheme 李南逸; C.M. Li; T. Hwang; N.Y. Lee

Showing items 16-37 of 37  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page