|
|
Taiwan Academic Institutional Repository >
Browse by Author
|
"wu t c"
Showing items 511-560 of 561 (12 Page(s) Totally) << < 3 4 5 6 7 8 9 10 11 12 > >> View [10|25|50] records per page
| 佛光大學 |
1998-05-01 |
On the design of ID-based digital signature scheme based on Rabin’s public key cryptosystem
|
吳宗杉;Wu T.C. |
| 國立臺灣科技大學 |
1998 |
Broadcasting secrets in communication networks
|
Chang, C.C;Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1998 |
Group-oriented authentication mechanism with key exchange
|
Chang, Y.S;Wu, T.C |
| 國立臺灣科技大學 |
1998 |
Improvement of Saeednia’s self-certified key exchange protocols
|
Wu, T.C;Chang, Y.S;Lin, T.Y. |
| 國立臺灣科技大學 |
1998 |
Authenticated encryption scheme with (t, n) shared verification
|
Hsu, C.L;Wu, T.C |
| 國立臺灣科技大學 |
1998 |
Undeniable (t, n)-threshold signature scheme with cheater identification
|
Lin, T.Y;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
On the design of a secure anonymous conference key distribution system
|
Wu, T.C;Hwang, B.R |
| 國立臺灣科技大學 |
1997 |
A binary access control method using prime factorization
|
Chang, C.C;Lou, D.C;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Conference key distribution system with user anonymity based on algebraic approach
|
Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Improvement of Harn’s digital signature for Diffie-Hellman public keys
|
He, W.H;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
ID-based group-oriented cryptosystem and its digital signature scheme
|
Wu, T.C;Su, R.L |
| 國立臺灣科技大學 |
1997 |
A smart card oriented password authentication scheme based on Rabin’s public key cryptosystem
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Retrieving similar pictures from iconic databases using G-tree
|
Wu, T.C;Cheng, J. |
| 國立臺灣科技大學 |
1997 |
Improvement of the Nyang-Song fast digital signature scheme
|
He, W.H;Wu, T.C |
| 國立臺灣科技大學 |
1997 |
Improvement of the Chang-Wu broadcasting cryptosystem using geometric properties of lines
|
Wu, T.S;Wu, T.C |
| 國立臺灣大學 |
1996-01 |
“Mineral Spectroscopy: A contribution to R. G. Burns.The Geochemical Society Spec. Pub. No. 5.
|
Bassett, W. A.; Wu, T.-C.; Chou, I.-M.; Haselton, H. T.; Frantz, J.; Mysen, B. O.; Huang, W.-L.; Sharma, S. K.; Schiferl, D. S. |
| 國立臺灣科技大學 |
1996 |
Retrieving Chinese characters with similar appearance from a reorganized Chinese dictionary
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1996 |
An improved one-time digital signature scheme based on one-way function
|
Wu, T.C;Sung, H.S |
| 國立臺灣科技大學 |
1996 |
Two ID-based multisignature protocols for sequential and broadcasting architectures
|
Wu, T.C;Chou, S.L;Wu, T.S |
| 國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis of a password authentication scheme using quadratic residues
|
Chang, C.C;Wu, T.C;Laih, C.S |
| 國立臺灣科技大學 |
1995 |
Group commitment protocol based on zero knowledge proofs
|
Wu, T.C;Wu, T.S |
| 國立臺灣科技大學 |
1995 |
Remote login authentication scheme based on a geometric approach
|
Wu, T.C |
| 國立臺灣科技大學 |
1995 |
Dynamic access control scheme based on the Chinese remainder theorem
|
Wu, T.C;Wu, T.S;He, W.H |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis and improvement on a conference key distribution system
|
Chang, C.C;Wu, W.B;Wu, T.C |
| 國立臺灣科技大學 |
1995 |
An exact match retrieval scheme based upon principal components analysis
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1995 |
A geometric approach for sharing secrets
|
Wu, T.C;He, W.H |
| 國立臺灣科技大學 |
1995 |
Cheating detection and cheater identification in secret sharing schemes
|
Wu, T.C;Wu, T.S |
| 國立臺灣科技大學 |
1995 |
Improved generalization common multiplicand multiplications algorithm of Yen and Laih
|
Wu, T.C;Chang, Y.S |
| 國立臺灣科技大學 |
1994 |
Controlling access in tree hierarchies
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1994 |
Application of geometric hashing to iconic database retrieval
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1994 |
Cryptographic implementation of dynamic access control in user hierarchy
|
Wu, T.C. |
| 國立臺灣科技大學 |
1994 |
Access control with binary keys
|
Chang, C.C;Shen, J.J;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
Controlling the access requests in an information protection system
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
A conference key distribution system based on cross-product
|
Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
Cryptosystem for selectively broadcasting separate secrets
|
Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
Algebraic operations on encrypted relational databases
|
Wu, T.C;Yeh, Y.S;Chang, C.C |
| 國立臺灣科技大學 |
1993 |
An authentication-combined access control scheme using a one-way function
|
Wu, T.C;Chang, C.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
A hashing-oriented nearest neighbor searching scheme
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
A refinement of a compression-oriented addressing scheme
|
Chang, C.C;Kowng, H.C;Wu, T.C |
| 國立臺灣科技大學 |
1992 |
Cryptographic key assignment scheme for access control in a hierarchy
|
Chang, C.C;Hwang, R.J;Wu, T.C |
| 國立臺灣科技大學 |
1992 |
Retrieving the most similar symbolic pictures from pictorial databases
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1991 |
Letter-oriented perfect hashing scheme based upon sparse table compression
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1991 |
Password authentication using Newton’s interpolating polynomials
|
Lin, C.H;Chang, C.C;Wu, T.C;Lee, R.C.T |
| 國立臺灣科技大學 |
1991 |
Remote password authentication with smart cards
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1991 |
roadcasting cryptosystem in computer networks using interpolating polynomials
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1991 |
A password authentication scheme based on discrete logarithms
|
Wu, T.C;Chang, C.C |
| 國立臺灣大學 |
1991 |
Degradation of Isouron in Thiec Upland Soil in Taiwan
|
Wu, T. C.; 王一雄; 陳玉麟; Wu, T. C.; Wang, Yei-Shung; Chen, Yuh-Lin |
| 國立臺灣科技大學 |
1989 |
A broadcasting cryptosystem based upon Euclidean geometry
|
Chang, C.C;Wu, T.C |
| 國立臺灣大學 |
1989 |
Movement, Adsorption and Desorption of Herbicide Isouron in Soil
|
Wu, T. C.; 王一雄; 陳玉麟; Wu, T. C.; Wang, Yei-Shung; Chen, Yuh-Lin |
Showing items 511-560 of 561 (12 Page(s) Totally) << < 3 4 5 6 7 8 9 10 11 12 > >> View [10|25|50] records per page
|