| 佛光大學 |
1999-05-01 |
Authenticated encryption schemes with double linkage
|
吳宗杉;Wu T.C.;He W.H. |
| 佛光大學 |
1999-05-01 |
Authenticated encryption schemes with double linkage
|
吳宗杉;Wu T.C.;He W.H. |
| 國立交通大學 |
2014-12-08T15:02:38Z |
Authenticated encryption schemes with message linkage
|
Hwang, SJ; Chang, CC; Yang, WP |
| 國立交通大學 |
2019-04-02T05:59:09Z |
Authenticated encryption schemes with message linkage
|
Hwang, SJ; Chang, CC; Yang, WP |
| 亞洲大學 |
2005-03 |
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
|
Huang, C. H.;Lee, C. Y.;Lin, C. H.;Chang, C. C.;Chen, K. L. |
| 東海大學 |
2005-03-25 |
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
|
林祝興; Chu-Hsing Lin, Chi-Hsiung Huang, Chia-Yin Lee, Chin-Chen Chang, and Kuo-Lun Chen |
| 東海大學 |
2005-03-28 |
Authenticated encryption schemes with message linkage for threshold signatures?
|
Huang, C.-H., Lee, C.-Y., Lin, C.-H., Chang, C.-C., Chen, K.-L. |
| 國立彰化師範大學 |
2003-01 |
Authenticated Encryption Schemes with Message Linkages for Message Flows
|
Tseng, Yuh-Min; Jan, Jinn-Ke; Chien, Hung-Yu |
| 國立彰化師範大學 |
2000-05 |
Authenticated Encryption Schemes with Message Linkages for Message Flows
|
Tseng, Yuh-Min; Jan, J. K. ; Chien, H. Y. |
| 亞洲大學 |
2005-09 |
Authenticated Encryption Schemes: Current Status and Key Issues
|
黃明祥;Hwang, Min-Shiang |
| 國立臺灣科技大學 |
2010 |
Authenticated group key agreement protocol for unbalanced wireless mobile networks
|
Lu C.-F.; Wu T.-C.; Shih T.-F. |
| 東海大學 |
2003 |
Authenticated Key Agreement Based on Elliptic Curve Cryptography
|
林祝興; Chu-hsing Lin and K. L. Hwang |
| 亞洲大學 |
2012-08 |
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
|
黃明祥;Hwang, Min-Shiang |
| 南台科技大學 |
2008-01 |
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
|
李南逸; N.Y. Lee; C.N. Wu; C.C. Wang |
| 亞洲大學 |
2010-05 |
Authenticated Multiple Keys Exchange Protocol based on Bilinear Pairings
|
李正吉;Lee, Cheng-Chi |
| 國立交通大學 |
2014-12-08T15:25:33Z |
Authenticated public-key distribution over WLAN/cellular dual networks
|
Hwu, JS; Chen, RJ; Lin, YB |
| 國立成功大學 |
2015-03 |
Authenticated Quantum Dialogue Based on Bell States
|
Lin, Ching-Ying; Yang, Chun-Wei; Hwang, Tzonelih |
| 亞洲大學 |
2013-01 |
Authenticated RFID security mechanism based on chaotic maps
|
Cheng, Zi-Yao;Cheng, Zi-Yao;Liu, Yun;Liu, Yun;張真誠;Chang, Chin-Chen;Shih-Chang, C;Chang, Shih-Chang |
| 國立成功大學 |
2016-02 |
Authenticated semi-quantum direct communication protocols using Bell states
|
Luo, Yi-Ping; Hwang, Tzonelih |
| 國立成功大學 |
2014-06 |
Authenticated semi-quantum key distribution protocol using Bell states
|
Yu, Kun-Fei; Yang, Chun-Wei; Liao, Ci-Hong; Hwang, Tzonelih |
| 國立成功大學 |
2016-07 |
Authenticated semi-quantum key distributions without classical channel
|
Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih |
| 臺大學術典藏 |
2021-08-12T02:12:49Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner E;Liao Y.-F;Wagner S.; Wagner E; Liao Y.-F; Wagner S.; YEN-FEN LIAO |
| 臺大學術典藏 |
2021-01-18T09:11:46Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner, Elvis; YEN-FEN LIAO; Wagner, Santoi |
| 國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
| 國立交通大學 |
2014-12-08T15:32:26Z |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics
|
Chang, Chia-Hao; Jang-Liaw, Nian-Hong; Lin, Yeong-Shin; Fang, Yi-Chiao; Shao, Kwang-Tsao |