| 亞洲大學 |
2002-05-16 |
Cryptanalysis and Improvement of Nyberg and Rueppel’s Identity-based Public Key Systems
|
Tzong-Sun Wu;Chien-Lung Hsu;Shu-Hui Kao1 ; Yue Feng Huang |
| 佛光大學 |
2002-05-01 |
Cryptanalysis and improvement of Nyberg and Rueppel’s identity-based public key systems
|
吳宗杉;Hsu C.L.;Kao S.H.;Huang Y.F |
| 國立臺灣科技大學 |
1999 |
Cryptanalysis and improvement of Petersen-Michels signcryption scheme
|
He, W.H;Wu, T.C |
| 南台科技大學 |
2002-02 |
Cryptanalysis and improvement of two access control schemes with user authentication in a distributed computer network
|
李南逸; N.Y. Lee |
| 淡江大學 |
2011-11 |
Cryptanalysis and Improvement of Wen et al.'s Provably Secure Authentication Key Exchange Protocols for Low Power Computing Devices
|
Shieh, Wen-Gong; Horng, Wen-Bing |
| 國立彰化師範大學 |
2002 |
Cryptanalysis and Improvement ofKkey Distribution System for VSAT Satellite Communication
|
Tseng, Yuh-Min |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis and improvement on a conference key distribution system
|
Chang, C.C;Wu, W.B;Wu, T.C |
| 亞洲大學 |
2006-01 |
Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures
|
Feng Bao; Cheng-Chi Lee; Min-Shiang Hwang |
| 亞洲大學 |
2006-01 |
Cryptanalysis and Improvement on Batch Verifying Multiple RSA Digital Signatures
|
黃明祥;Hwang, Min-Shiang |
| 國立彰化師範大學 |
2003 |
Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems
|
Tseng, Yuh-Min |
| 亞洲大學 |
2017-03 |
Cryptanalysis of "An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-based System
|
李俊達;李正吉;Cheng-Chi,Lee; |
| 國立彰化師範大學 |
2004 |
Cryptanalysis of a Blind Signature Scheme Based on ElGamal Signature
|
Chen, Y. Y. ; Jan, J. K. ; Tseng, Yuh-Min; Chen, C. L. |
| 朝陽科技大學 |
2009 |
Cryptanalysis of a DL-based Certificateless Digital Signatures Scheme
|
楊伏夷;駱政宏 |
| 朝陽科技大學 |
2010 |
Cryptanalysis of a DLP based Proxy Blind Signature Scheme with Low-Computation
|
楊伏夷;劉鎮瑋 |
| 朝陽科技大學 |
2010-04-23 |
Cryptanalysis of a DLP based Proxy Blind Signature Scheme with Low-Computation
|
楊伏夷;劉鎮瑋 |
| 淡江大學 |
2010-12 |
Cryptanalysis of a More Secure Remote User Authentication Scheme
|
Horng, Wen-bing; Lee, Cheng-Ping; Peng, Jian-Wen |
| 東海大學 |
2004-09-22 |
Cryptanalysis of a New Authentication Scheme with Anonymity for Wireless Environments
|
林祝興; Chu-Hsing Lin, and C. Y. Lee |
| 亞洲大學 |
2002-05-16 |
Cryptanalysis of A New Multi-Proxy Multi-Signature Scheme
|
孫宏民;謝濱燦;林宸堂 |
| 國立臺灣科技大學 |
1995 |
Cryptanalysis of a password authentication scheme using quadratic residues
|
Chang, C.C;Wu, T.C;Laih, C.S |
| 國立政治大學 |
2013 |
Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme
|
Tso, Ray-Lin; 左瑞麟; Chen, Y.-C.; Horng, G. |
| 國立成功大學 |
2001-02 |
Cryptanalysis of a public-key cryptosystem based on generalized inverses of matrices
|
Sun, Hung-Min |
| 亞洲大學 |
2003 |
Cryptanalysis of a Remote User Authentication Scheme Based on Smart Cards
|
劉兆樑;Liu, Chao-Liang |
| 朝陽科技大學 |
2010 |
Cryptanalysis of a remote user authentication scheme without using smart card
|
楊伏夷;江承軒 |
| 朝陽科技大學 |
2010-04-23 |
Cryptanalysis of a remote user authentication scheme without using smart cards
|
楊伏夷;江承軒 |
| 淡江大學 |
2012-11 |
Cryptanalysis of a Robust and Efficient Smart Card Oriented Remote User Authentication Protocol
|
Horng, Wen-Bing; Peng, Jian-Wen; Liu, Chao-Sheng; Chiu, Ying-Ching |
| 國立勤益科技大學 |
2012-12 |
Cryptanalysis of a secure and efficient authentication protocol for anonymous channel in wireless communications
|
林宗宏 |
| 國立交通大學 |
2014-12-08T15:30:24Z |
Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves
|
Mohammad, Zeyad; Hsu, Chien-Lung; Chen, Yaw-Chung; Lo, Chi-Chun |
| 亞洲大學 |
2009-12 |
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2009.12 |
Cryptanalysis of a Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
|
黃明祥;Hwang, Min-Shiang |
| 南台科技大學 |
2004 |
Cryptanalysis of a Threshold Proxy Signature Scheme
|
楊政達; Cheng-Ta Yang; Hung-Min Sun; Bin-Tsan Hsieh |
| 朝陽科技大學 |
2005 |
Cryptanalysis of a threshold proxy signature with known signers
|
楊伏夷 |
| 朝陽科技大學 |
2004 |
Cryptanalysis of a Threshold Proxy Signature with Known Signers
|
楊伏夷;詹進科;鄭偉駿 |
| 亞洲大學 |
2004-06 |
Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2004.06 |
Cryptanalysis of A User Friendly Remote Authentication Scheme with Smart Card
|
黃明祥;Hwang, Min-Shiang |
| 朝陽科技大學 |
2004 |
Cryptanalysis of an Anonymous user Identification and Key Distribution Scheme
|
楊伏夷 |
| 亞洲大學 |
2005 |
Cryptanalysis of an Authenticated Encryption Scheme Using Self-Certified Public Keys
|
黃明祥;Hwang, Min-Shiang |
| 朝陽科技大學 |
2010 |
Cryptanalysis of an efficient biometrics-based remote user authentication scheme using smart cards
|
楊伏夷;王建森 |
| 國立臺灣科技大學 |
2010 |
Cryptanalysis of an efficient remote user authentication scheme with smart cards
|
Yeh K.-H.; Lo N.W.; Winata E. |
| 亞洲大學 |
2004-10 |
Cryptanalysis of an Efficient Secure Group Signature Scheme
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2005-06 |
Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
|
劉兆樑;Liu, Chao-Liang |
| 國立高雄師範大學 |
2004 |
Cryptanalysis of an ElGamal-Like Cryptosystem for Enciphering Large Messages
|
吳明倫; Yuh-Dauh Lyuu;Ming-Luen Wu |
| 臺大學術典藏 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen; Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 臺大學術典藏 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Yuh-Dauh Lyuu; Ming-Luen Wu; Yuh-Dauh Lyuu; Ming-Luen Wu |
| 國立臺灣大學 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立臺灣大學 |
2004 |
Cryptanalysis of an ElGamal-like Cryptosystem for Enciphering Large Messages
|
Yuh-Dauh Lyuu; Ming-Luen Wu |
| 朝陽科技大學 |
2004 |
Cryptanalysis of an Enhanced Authentication Key Exchange Protocol
|
楊伏夷;詹進科 |
| 亞洲大學 |
2019-03 |
Cryptanalysis of an ID-based Deniable Threshold Ring Authentication
|
Lin, Tzu-Chun;Lin, Tzu-Chun;Yeh, Ting-Yi;Yeh, Ting-Yi;黃明祥;Hwang, Min-Shiang |
| 朝陽科技大學 |
2017-04 |
Cryptanalysis of an innovative electronic group-buying system
|
Chin-Ling Chen, Yong-Yuan Deng and Yun-Ciao Wang |
| 國立中山大學 |
1994 |
Cryptanalysis of an Intractable Trapdoor One-way Function Based on Quadratic Residue
|
Chun-I Fan ; Chin-Laung Lei ; Wen-Shenq Juang |
| 國立臺灣大學 |
1994 |
Cryptanalysis of an Intractable Trapdoor One-Way Function Based on Quadratic Residue
|
Fan, C. I.; Lei, C. L.; Juang, W. S. |