|
"tzeng wg"的相关文件
显示项目 1-25 / 28 (共2页) 1 2 > >> 每页显示[10|25|50]项目
國立交通大學 |
2014-12-08T15:46:53Z |
Three-quarter approximation for the number of unused colors in graph coloring
|
Tzeng, WG; King, GH |
國立交通大學 |
2014-12-08T15:46:45Z |
Inter-protocol interleaving attacks on some authentication and key distribution protocols
|
Tzeng, WG; Hu, CM |
國立交通大學 |
2014-12-08T15:46:40Z |
A new graph invariant for graph isomorphism: Probability propagation matrix
|
King, GH; Tzeng, WG |
國立交通大學 |
2014-12-08T15:46:36Z |
Common modulus and chosen-message attacks on public-key schemes with linear recurrence relations
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:45:53Z |
A practical and secure fault-tolerant conference-key agreement protocol
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:45:52Z |
Round-efficient conference key agreement protocols with provable security
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:44:26Z |
Robust forward-secure signature schemes with proactive security
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:44:22Z |
Authentication of mobile users in third generation mobile systems
|
Tzeng, ZJ; Tzeng, WG |
國立交通大學 |
2014-12-08T15:44:21Z |
A public-key traitor tracing scheme with revocation using dynamic shares
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:43:20Z |
Practical and efficient electronic voting schemes
|
Tzeng, ZJ; Tzeng, WG |
國立交通大學 |
2014-12-08T15:43:07Z |
Distributed key generation as a component of an integrated protocol
|
Chu, CK; Tzeng, WG |
國立交通大學 |
2014-12-08T15:43:07Z |
Robust key-evolving public key encryption schemes
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:43:00Z |
A time-bound cryptographic key assignment scheme for access control in a hierarchy
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:42:32Z |
A secure fault-tolerant conference-key agreement protocol
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:41:42Z |
A secure fault-tolerant conference-key agreement protocol (vol 51, pg 373, 2002)
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:41:40Z |
A new approach for visual cryptography
|
Tzeng, WG; Hu, CM |
國立交通大學 |
2014-12-08T15:41:35Z |
A threshold GQ signature scheme
|
Liu, LS; Chu, CK; Tzeng, WG |
國立交通大學 |
2014-12-08T15:39:37Z |
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
|
Tzeng, WG |
國立交通大學 |
2014-12-08T15:37:08Z |
Compatible ideal contrast visual cryptography schemes with reversing
|
Hu, CM; Tzeng, WG |
國立交通大學 |
2014-12-08T15:36:43Z |
Efficient k-out-of-n oblivious transfer schemes. with adaptive and non-adaptive queries
|
Chu, CK; Tzeng, WG |
國立交通大學 |
2014-12-08T15:36:38Z |
An efficient solution to the millionaires' problem based on homomorphic encryption
|
Lin, HY; Tzeng, WG |
國立交通大學 |
2014-12-08T15:19:25Z |
A public-key traitor tracing scheme with revocation using dynamic shares
|
Tzeng, WG; Tzeng, ZJ |
國立交通大學 |
2014-12-08T15:19:03Z |
Extracting randomness from multiple independent sources
|
Lee, CJ; Lu, CJ; Tsai, SC; Tzeng, WG |
國立交通大學 |
2014-12-08T15:18:35Z |
On the Jensen-Shannon divergence and variational distance
|
Tsai, SC; Tzeng, WG; Wu, HL |
國立交通大學 |
2014-12-08T15:03:47Z |
A 2-KEY-LOCK-PAIR ACCESS-CONTROL METHOD USING PRIME FACTORIZATION AND TIME STAMP
|
HWANG, MS; TZENG, WG; YANG, WP |
显示项目 1-25 / 28 (共2页) 1 2 > >> 每页显示[10|25|50]项目
|