|
"wu t c"的相關文件
顯示項目 526-550 / 561 (共23頁) << < 14 15 16 17 18 19 20 21 22 23 > >> 每頁顯示[10|25|50]項目
| 國立臺灣大學 |
1996-01 |
“Mineral Spectroscopy: A contribution to R. G. Burns.The Geochemical Society Spec. Pub. No. 5.
|
Bassett, W. A.; Wu, T.-C.; Chou, I.-M.; Haselton, H. T.; Frantz, J.; Mysen, B. O.; Huang, W.-L.; Sharma, S. K.; Schiferl, D. S. |
| 國立臺灣科技大學 |
1996 |
Retrieving Chinese characters with similar appearance from a reorganized Chinese dictionary
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1996 |
An improved one-time digital signature scheme based on one-way function
|
Wu, T.C;Sung, H.S |
| 國立臺灣科技大學 |
1996 |
Two ID-based multisignature protocols for sequential and broadcasting architectures
|
Wu, T.C;Chou, S.L;Wu, T.S |
| 國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis of a password authentication scheme using quadratic residues
|
Chang, C.C;Wu, T.C;Laih, C.S |
| 國立臺灣科技大學 |
1995 |
Group commitment protocol based on zero knowledge proofs
|
Wu, T.C;Wu, T.S |
| 國立臺灣科技大學 |
1995 |
Remote login authentication scheme based on a geometric approach
|
Wu, T.C |
| 國立臺灣科技大學 |
1995 |
Dynamic access control scheme based on the Chinese remainder theorem
|
Wu, T.C;Wu, T.S;He, W.H |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis and improvement on a conference key distribution system
|
Chang, C.C;Wu, W.B;Wu, T.C |
| 國立臺灣科技大學 |
1995 |
An exact match retrieval scheme based upon principal components analysis
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1995 |
A geometric approach for sharing secrets
|
Wu, T.C;He, W.H |
| 國立臺灣科技大學 |
1995 |
Cheating detection and cheater identification in secret sharing schemes
|
Wu, T.C;Wu, T.S |
| 國立臺灣科技大學 |
1995 |
Improved generalization common multiplicand multiplications algorithm of Yen and Laih
|
Wu, T.C;Chang, Y.S |
| 國立臺灣科技大學 |
1994 |
Controlling access in tree hierarchies
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1994 |
Application of geometric hashing to iconic database retrieval
|
Wu, T.C;Chang, C.C |
| 國立臺灣科技大學 |
1994 |
Cryptographic implementation of dynamic access control in user hierarchy
|
Wu, T.C. |
| 國立臺灣科技大學 |
1994 |
Access control with binary keys
|
Chang, C.C;Shen, J.J;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
Controlling the access requests in an information protection system
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
A conference key distribution system based on cross-product
|
Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
Cryptosystem for selectively broadcasting separate secrets
|
Wu, T.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
Algebraic operations on encrypted relational databases
|
Wu, T.C;Yeh, Y.S;Chang, C.C |
| 國立臺灣科技大學 |
1993 |
An authentication-combined access control scheme using a one-way function
|
Wu, T.C;Chang, C.C;Yeh, Y.S |
| 國立臺灣科技大學 |
1993 |
A hashing-oriented nearest neighbor searching scheme
|
Chang, C.C;Wu, T.C |
| 國立臺灣科技大學 |
1993 |
A refinement of a compression-oriented addressing scheme
|
Chang, C.C;Kowng, H.C;Wu, T.C |
顯示項目 526-550 / 561 (共23頁) << < 14 15 16 17 18 19 20 21 22 23 > >> 每頁顯示[10|25|50]項目
|