| 國立勤益科技大學 |
2012-12 |
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
|
林宗宏 |
| 國立交通大學 |
2014-12-08T15:30:24Z |
Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
|
Mohammad, Zeyad; Hsu, Chien-Lung; Chen, Yaw-Chung; Lo, Chi-Chun |
| 亞洲大學 |
2009-12 |
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2009.12 |
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
|
黃明祥;Hwang, Min-Shiang |
| 南台科技大學 |
2004 |
Cryptanalysis of a Threshold Proxy Signature Scheme
|
楊政達; Cheng-Ta Yang; Hung-Min Sun; Bin-Tsan Hsieh |
| 朝陽科技大學 |
2005 |
Cryptanalysis of a threshold proxy signature with known signers
|
楊伏夷 |
| 朝陽科技大學 |
2004 |
Cryptanalysis of a Threshold Proxy Signature with Known Signers
|
楊伏夷;詹進科;鄭偉駿 |
| 亞洲大學 |
2004-06 |
Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2004.06 |
Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card
|
黃明祥;Hwang, Min-Shiang |
| 朝陽科技大學 |
2004 |
Cryptanalysis of an Anonymous user Identification and Key Distribution Scheme
|
楊伏夷 |
| 亞洲大學 |
2005 |
Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys
|
黃明祥;Hwang, Min-Shiang |
| 朝陽科技大學 |
2010 |
Cryptanalysis of an efficient biometrics-based remote user authentication scheme using smart cards
|
楊伏夷;王建森 |
| 國立臺灣科技大學 |
2010 |
Cryptanalysis of an efficient remote user authentication scheme with smart cards
|
Yeh K.-H.; Lo N.W.; Winata E. |
| 亞洲大學 |
2004-10 |
Cryptanalysis of an Efficient Secure Group Signature Scheme
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2005-06 |
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
|
劉兆樑;Liu, Chao-Liang |
| 國立高雄師範大學 |
2004 |
Cryptanalysis of an ElGamal-Like Cryptosystem for Enciphering Large Messages
|
吳明倫; Yuh-Dauh Lyuu;Ming-Luen Wu |
| 臺大學術典藏 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen; Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 臺大學術典藏 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Yuh-Dauh Lyuu; Ming-Luen Wu; Yuh-Dauh Lyuu; Ming-Luen Wu |
| 國立臺灣大學 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立臺灣大學 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Yuh-Dauh Lyuu; Ming-Luen Wu |
| 朝陽科技大學 |
2004 |
Cryptanalysis of an Enhanced Authentication Key Exchange Protocol
|
楊伏夷;詹進科 |
| 亞洲大學 |
2019-03 |
Cryptanalysis of an ID-based Deniable Threshold Ring Authentication
|
Lin, Tzu-Chun;Lin, Tzu-Chun;Yeh, Ting-Yi;Yeh, Ting-Yi;黃明祥;Hwang, Min-Shiang |
| 朝陽科技大學 |
2017-04 |
Cryptanalysis of an innovative electronic group-buying system
|
Chin-Ling Chen, Yong-Yuan Deng and Yun-Ciao Wang |
| 國立中山大學 |
1994 |
Cryptanalysis of an Intractable Trapdoor One-way Function Based on Quadratic Residue
|
Chun-I Fan ; Chin-Laung Lei ; Wen-Shenq Juang |
| 國立臺灣大學 |
1994 |
Cryptanalysis of an Intractable Trapdoor One-Way Function Based on Quadratic Residue
|
Fan, C. I.; Lei, C. L.; Juang, W. S. |
| 亞洲大學 |
2002-05-16 |
Cryptanalysis of An Optimized Protocol for Mobile Network Authentication and Security
|
C.S. Laih (賴溪松); S.Y. Chiou (邱錫彥) |
| 國立成功大學 |
2003-03-31 |
Cryptanalysis of an optimized protocol for mobile network authentication and security
|
Laih, Chi-Sung; Chiou, S. Y. |
| 國立高雄師範大學 |
2005-08-05 |
Cryptanalysis of and Improvement on the Hwang-Chen Multi-proxy Multi-signature Schemes
|
吳明倫; Yuh-Dauh Lyuu;Ming-Luen Wu |
| 臺大學術典藏 |
2005 |
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen; Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 臺大學術典藏 |
2018-07-05T01:26:47Z |
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes
|
Wu, Ming-Luen; Lyuu, Yuh-Dauh; Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立臺灣大學 |
2004 |
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立臺灣大學 |
2005 |
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立彰化師範大學 |
2001-10 |
Cryptanalysis of Chang-Wu's Group-oriented Authentication and Key Exchange Protocols
|
Chien, Hung-Yu; Wu, Tzong-Chen; Jan, Jinn-Ke; Tseng, Yuh-Min |
| 國立臺灣科技大學 |
2001 |
Cryptanalysis of Chang-Wu’s group-oriented authentication and key exchange protocols
|
Chien, H.Y;Wu, T.C;Jan, J.K;Tseng, Y.M |
| 國立臺灣科技大學 |
2003 |
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems
|
Wu, T.C;Hsu, C.L |
| 國立成功大學 |
2002-01-03 |
Cryptanalysis of enhancement for simple authentication key agreement algorithm
|
Hsieh, Bin-Tsan; Sun, Hung-Min; Hwang, Tzonelih |
| 國立政治大學 |
2012 |
Cryptanalysis of exhaustive search on attacking RSA
|
Wu, M.-E.;Tso, R.;Sun, H.-M.; 左瑞麟 |
| 臺大學術典藏 |
2021-03-04T06:45:05Z |
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines
|
Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI |
| 南台科技大學 |
1999-10 |
Cryptanalysis of group signature scheme using self-certified public keys
|
陳炳彰; H.M. Sun; B.C. Chen; and T. Hwang |
| 國立成功大學 |
1999-10-28 |
Cryptanalysis of group signature scheme using self-certified public keys
|
Sun, Hung-Min; Chen, Biing-Jang; Hwang, Tzonelih |
| 佛光大學 |
2004-09-01 |
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers
|
吳宗杉;Hsu C.L |
| 國立臺灣科技大學 |
2011 |
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
|
Yeh, K.H.;Lo, N.W.;Li, Y.J. |
| 國立成功大學 |
2004-02-15 |
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
|
Wang, Shyh-Yih; Laih, Chi-Sung |
| 國立高雄師範大學 |
2005-02-15 |
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
|
王釋毅; Shyh-Yih Wang;Chi-Sung Laih |
| 亞洲大學 |
2008-11 |
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
|
Yang, J. H.;Chang, C. C |
| 國立臺灣科技大學 |
1999 |
Cryptanalysis of Lee and Chang’s ID-based information security functions
|
He, W.H;Wu, T.C |
| 輔英科技大學 |
2009-02-01 |
Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme
|
Fan, Chun-I;Guan, D.J.;Wang, Chih-I;Lin, Dai-Rui |
| 國立中山大學 |
2008 |
Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme
|
Chun-I Fan;D.J. Guan;Chih-I Wang;Dai-Rui Lin |
| 國立中山大學 |
2009 |
Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme
|
C.I. Fan;D.J. Guan;C.I. Wang.D.R. Lin |
| 國立彰化師範大學 |
2001-06 |
Cryptanalysis of Liaw's Broadcasting Cryptosystem
|
Tseng, Yuh-Min; Jan, Jinn-Ke |