|
English
|
正體中文
|
简体中文
|
总笔数 :0
|
|
造访人次 :
52899780
在线人数 :
991
教育部委托研究计画 计画执行:国立台湾大学图书馆
|
|
|
"tzeng wen guey"的相关文件
显示项目 101-110 / 114 (共12页) << < 3 4 5 6 7 8 9 10 11 12 > >> 每页显示[10|25|50]项目
| 國立交通大學 |
2014-12-08T15:18:08Z |
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
|
Chen, Yi-Ruei; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:17:39Z |
Conditional oblivious cast
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:15:03Z |
Cheating prevention in visual cryptography
|
Hu, Chih-Ming; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:13:03Z |
Efficient large-scale distributed key generation against burst interruption
|
Ou, Jheng-Ru; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:12:52Z |
Efficient k-out-of-n oblivious transfer schemes
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:12:05Z |
An Optimal Data Hiding Scheme With Tree-Based Parity Check
|
Hou, Chung-Li; Lu, ChangChun; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:10:43Z |
Identity-committable signatures and their extension to group-oriented ring signatures
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:09:56Z |
Key Establishment Schemes against Storage-Bounded Adversaries in Wireless Sensor Networks
|
Tsai, Shi-Chun; Tzeng, Wen-Guey; Zhou, Kun-Yi |
| 國立交通大學 |
2014-12-08T15:09:35Z |
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication
|
Lin, Hsiao-Ying; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:08:53Z |
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
显示项目 101-110 / 114 (共12页) << < 3 4 5 6 7 8 9 10 11 12 > >> 每页显示[10|25|50]项目
|