| 國立交通大學 |
2014-12-12T01:52:10Z |
Android上的殭屍網路攻擊偵測
|
劉恩榜; Liu, En-Bang; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-12T01:43:42Z |
以智慧型手機為使用者端裝置之安全分散式儲存系統實作
|
顏豪緯; Yen, Hao-wei; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-12T01:34:25Z |
一個可證明且伺服器端驅動的密碼認證金鑰交換機制
|
蔡家宏; Tsai, Chya-Hung; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-12T01:34:03Z |
最佳密文傳輸率的公開金鑰背叛者追蹤系統
|
陳毅睿; Chen, Yi-Ruei; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-12T01:34:02Z |
具有固定大小搜尋符號之隱私的字串搜尋
|
劉思維; Liu, Szu-Wei; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-12T01:33:51Z |
用於共享式訊息之公開金鑰加密系統
|
簡韶瑩; Chien, Shao-Yin; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-12T01:24:13Z |
具有資訊隱密性與容錯能力的分散式雲端儲存系統
|
林孝盈; Lin, Hsiao-Ying; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-12T01:19:28Z |
在無線隨意網路上基於可自我驗證簽名系統的安全的群組金鑰協議協定
|
曾智暘; Tseng, Chih-Yang; 曾文貴; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:48:06Z |
Efficient Encoding and Decoding with Permutation Arrays
|
Lin, Te-Tsung; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:47:46Z |
A Secure Decentralized Erasure Code for Distributed Networked Storage
|
Lin, Hsiao-Ying; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:45:19Z |
Public key broadcast encryption with low number of keys and constant decryption time
|
Liu, Yi-Ru; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:33:54Z |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
|
Chu, Cheng-Kang; Chow, Sherman S. M.; Tzeng, Wen-Guey; Zhou, Jianying; Deng, Robert H. |
| 國立交通大學 |
2014-12-08T15:24:35Z |
Delegable Provable Data Possession for Remote Data in the Clouds
|
Shen, Shiuan-Tzuo; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:22:34Z |
A Secure Erasure Code-Based Cloud Storage System with Secure Data Forwarding
|
Lin, Hsiao-Ying; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:21:22Z |
Secure Group Key Management Using Uni-Directional Proxy Re-Encryption Schemes
|
Chen, Yi-Ruei; Tygar, J. D.; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:18:08Z |
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate
|
Chen, Yi-Ruei; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:17:39Z |
Conditional oblivious cast
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:15:03Z |
Cheating prevention in visual cryptography
|
Hu, Chih-Ming; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:13:03Z |
Efficient large-scale distributed key generation against burst interruption
|
Ou, Jheng-Ru; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:12:52Z |
Efficient k-out-of-n oblivious transfer schemes
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:12:05Z |
An Optimal Data Hiding Scheme With Tree-Based Parity Check
|
Hou, Chung-Li; Lu, ChangChun; Tsai, Shi-Chun; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:10:43Z |
Identity-committable signatures and their extension to group-oriented ring signatures
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:09:56Z |
Key Establishment Schemes against Storage-Bounded Adversaries in Wireless Sensor Networks
|
Tsai, Shi-Chun; Tzeng, Wen-Guey; Zhou, Kun-Yi |
| 國立交通大學 |
2014-12-08T15:09:35Z |
Anonymous Password Based Authenticated Key Exchange with Sub-Linear Communication
|
Lin, Hsiao-Ying; Tzeng, Wen-Guey |
| 國立交通大學 |
2014-12-08T15:08:53Z |
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes
|
Chu, Cheng-Kang; Tzeng, Wen-Guey |