|
|
Taiwan Academic Institutional Repository >
Browse by Author
|
"wu t c"
Showing items 501-550 of 561 (12 Page(s) Totally) << < 3 4 5 6 7 8 9 10 11 12 > >> View [10|25|50] records per page
| 佛光大學 |
1999-06-01 |
Cryptographic Implementation of Supervising Secure Communications for Rooted Poset User Hierarchy
|
吳宗杉;Wu T.C. |
| 佛光大學 |
1999-05-01 |
Authenticated encryption schemes with double linkage
|
吳宗杉;Wu T.C.;He W.H. |
| 佛光大學 |
1999-05-01 |
Authenticated encryption schemes with double linkage
|
吳宗杉;Wu T.C.;He W.H. |
| 國立臺灣科技大學 |
1999 |
Cryptanalysis of Lee and Chang’s ID-based information security functions
|
He, W.H;Wu, T.C |
| 國立臺灣科技大學 |
1999 |
Cryptanalysis and improvement of Petersen-Michels signcryption scheme
|
He, W.H;Wu, T.C |
| 國立臺灣科技大學 |
1999 |
Authorization-based group-oriented secure broadcasting system
|
Wu, T.C;Chang, Y.S |
| 國立臺灣科技大學 |
1999 |
“(t, n)-threshold verifiable multisecret sharing scheme based on the factorisation and the discrete logarithm modulo a composite problems
|
Lin, T.Y;Wu, T.C |
| 國立彰化師範大學 |
1999 |
Improvements of Group-oriented Authentication and Key Exchange Protocols
|
Chien, H. Y. ; Wu, T. C. ; Jan, J. K. ; Tseng, Yuh-Min |
| 佛光大學 |
1998-07-01 |
適用於網際網路EDI之密碼學探討
|
吳宗杉;吳宗成;何煒華;Wu T.C. |
| 佛光大學 |
1998-05-01 |
On the design of ID-based digital signature scheme based on Rabin’s public key cryptosystem
|
吳宗杉;Wu T.C. |
| 佛光大學 |
1998-05-01 |
On the design of ID-based digital signature scheme based on Rabin’s public key cryptosystem
|
吳宗杉;Wu T.C. |
| 國立臺灣科技大學 |
1998 |
Broadcasting secrets in communication networks
|
Chang, C.C;Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1998 |
Group-oriented authentication mechanism with key exchange
|
Chang, Y.S;Wu, T.C |
| 國立臺灣科技大學 |
1998 |
Improvement of Saeednia’s self-certified key exchange protocols
|
Wu, T.C;Chang, Y.S;Lin, T.Y. |
| 國立臺灣科技大學 |
1998 |
Authenticated encryption scheme with (t, n) shared verification
|
Hsu, C.L;Wu, T.C |
| 國立臺灣科技大學 |
1998 |
Undeniable (t, n)-threshold signature scheme with cheater identification
|
Lin, T.Y;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
On the design of a secure anonymous conference key distribution system
|
Wu, T.C;Hwang, B.R |
| 國立臺灣科技大學 |
1997 |
A binary access control method using prime factorization
|
Chang, C.C;Lou, D.C;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Conference key distribution system with user anonymity based on algebraic approach
|
Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Improvement of Harn’s digital signature for Diffie-Hellman public keys
|
He, W.H;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
ID-based group-oriented cryptosystem and its digital signature scheme
|
Wu, T.C;Su, R.L |
| 國立臺灣科技大學 |
1997 |
A smart card oriented password authentication scheme based on Rabin’s public key cryptosystem
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Retrieving similar pictures from iconic databases using G-tree
|
Wu, T.C;Cheng, J. |
| 國立臺灣科技大學 |
1997 |
Improvement of the Nyang-Song fast digital signature scheme
|
He, W.H;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Improvement of the Chang-Wu broadcasting cryptosystem using geometric properties of lines
|
Wu, T.S;Wu, T.C |
| 國立臺灣大學 |
1996-01 |
“Mineral Spectroscopy: A contribution to R. G. Burns.The Geochemical Society Spec. Pub. No. 5.
|
Bassett, W. A.; Wu, T.-C.; Chou, I.-M.; Haselton, H. T.; Frantz, J.; Mysen, B. O.; Huang, W.-L.; Sharma, S. K.; Schiferl, D. S. |
| 國立臺灣科技大學 |
1996 |
Retrieving Chinese characters with similar appearance from a reorganized Chinese dictionary
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1996 |
An improved one-time digital signature scheme based on one-way function
|
Wu, T.C;Sung, H.S |
| 國立臺灣科技大學 |
1996 |
Two ID-based multisignature protocols for sequential and broadcasting architectures
|
Wu, T.C;Chou, S.L;Wu, T.S |
| 國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis of a password authentication scheme using quadratic residues
|
Chang, C.C;Wu, T.C;Laih, C.S |
| 國立臺灣科技大學 |
1995 |
Group commitment protocol based on zero knowledge proofs
|
Wu, T.C;Wu, T.S |
| 國立臺灣科技大學 |
1995 |
Remote login authentication scheme based on a geometric approach
|
Wu, T.C |
| 國立臺灣科技大學 |
1995 |
Dynamic access control scheme based on the Chinese remainder theorem
|
Wu, T.C;Wu, T.S;He, W.H |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis and improvement on a conference key distribution system
|
Chang, C.C;Wu, W.B;Wu, T.C |
| 國立臺灣科技大學 |
1995 |
An exact match retrieval scheme based upon principal components analysis
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1995 |
A geometric approach for sharing secrets
|
Wu, T.C;He, W.H |
| 國立臺灣科技大學 |
1995 |
Cheating detection and cheater identification in secret sharing schemes
|
Wu, T.C;Wu, T.S |
| 國立臺灣科技大學 |
1995 |
Improved generalization common multiplicand multiplications algorithm of Yen and Laih
|
Wu, T.C;Chang, Y.S |
| 國立臺灣科技大學 |
1994 |
Controlling access in tree hierarchies
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1994 |
Application of geometric hashing to iconic database retrieval
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1994 |
Cryptographic implementation of dynamic access control in user hierarchy
|
Wu, T.C. |
| 國立臺灣科技大學 |
1994 |
Access control with binary keys
|
Chang, C.C;Shen, J.J;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
Controlling the access requests in an information protection system
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
A conference key distribution system based on cross-product
|
Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
Cryptosystem for selectively broadcasting separate secrets
|
Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
Algebraic operations on encrypted relational databases
|
Wu, T.C;Yeh, Y.S;Chang, C.C |
| 國立臺灣科技大學 |
1993 |
An authentication-combined access control scheme using a one-way function
|
Wu, T.C;Chang, C.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
A hashing-oriented nearest neighbor searching scheme
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
A refinement of a compression-oriented addressing scheme
|
Chang, C.C;Kowng, H.C;Wu, T.C |
Showing items 501-550 of 561 (12 Page(s) Totally) << < 3 4 5 6 7 8 9 10 11 12 > >> View [10|25|50] records per page
|