| 臺大學術典藏 |
2018-07-05T01:26:47Z |
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes
|
Wu, Ming-Luen; Lyuu, Yuh-Dauh; Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立臺灣大學 |
2004 |
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立臺灣大學 |
2005 |
Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立彰化師範大學 |
2001-10 |
Cryptanalysis of Chang-Wu's Group-oriented Authentication and Key Exchange Protocols
|
Chien, Hung-Yu; Wu, Tzong-Chen; Jan, Jinn-Ke; Tseng, Yuh-Min |
| 國立臺灣科技大學 |
2001 |
Cryptanalysis of Chang-Wu’s group-oriented authentication and key exchange protocols
|
Chien, H.Y;Wu, T.C;Jan, J.K;Tseng, Y.M |
| 國立臺灣科技大學 |
2003 |
Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems
|
Wu, T.C;Hsu, C.L |
| 國立成功大學 |
2002-01-03 |
Cryptanalysis of enhancement for simple authentication key agreement algorithm
|
Hsieh, Bin-Tsan; Sun, Hung-Min; Hwang, Tzonelih |
| 國立政治大學 |
2012 |
Cryptanalysis of exhaustive search on attacking RSA
|
Wu, M.-E.;Tso, R.;Sun, H.-M.; 左瑞麟 |
| 臺大學術典藏 |
2021-03-04T06:45:05Z |
Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines
|
Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI |
| 南台科技大學 |
1999-10 |
Cryptanalysis of group signature scheme using self-certified public keys
|
陳炳彰; H.M. Sun; B.C. Chen; and T. Hwang |
| 國立成功大學 |
1999-10-28 |
Cryptanalysis of group signature scheme using self-certified public keys
|
Sun, Hung-Min; Chen, Biing-Jang; Hwang, Tzonelih |
| 佛光大學 |
2004-09-01 |
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers
|
吳宗杉;Hsu C.L |
| 國立臺灣科技大學 |
2011 |
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
|
Yeh, K.H.;Lo, N.W.;Li, Y.J. |
| 國立成功大學 |
2004-02-15 |
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
|
Wang, Shyh-Yih; Laih, Chi-Sung |
| 國立高雄師範大學 |
2005-02-15 |
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
|
王釋毅; Shyh-Yih Wang;Chi-Sung Laih |
| 亞洲大學 |
2008-11 |
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
|
Yang, J. H.;Chang, C. C |
| 國立臺灣科技大學 |
1999 |
Cryptanalysis of Lee and Chang’s ID-based information security functions
|
He, W.H;Wu, T.C |
| 輔英科技大學 |
2009-02-01 |
Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme
|
Fan, Chun-I;Guan, D.J.;Wang, Chih-I;Lin, Dai-Rui |
| 國立中山大學 |
2008 |
Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme
|
Chun-I Fan;D.J. Guan;Chih-I Wang;Dai-Rui Lin |
| 國立中山大學 |
2009 |
Cryptanalysis of Lee-Hwang-Yang Blind Signature Scheme
|
C.I. Fan;D.J. Guan;C.I. Wang.D.R. Lin |
| 國立彰化師範大學 |
2001-06 |
Cryptanalysis of Liaw's Broadcasting Cryptosystem
|
Tseng, Yuh-Min; Jan, Jinn-Ke |
| 朝陽科技大學 |
2004 |
Cryptanalysis of Log-in Authentication Based on Circle Property
|
楊伏夷;詹進科 |
| 臺大學術典藏 |
2000-10 |
Cryptanalysis of modified authenticated key agreement protocol
|
Ku, Wei-Chi; Wang, Sheng-De; Ku, Wei-Chi; Wang, Sheng-De |
| 國立臺灣大學 |
2000-10 |
Cryptanalysis of modified authenticated key agreement protocol
|
Ku, Wei-Chi; Wang, Sheng-De |
| 淡江大學 |
2002-05 |
Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers
|
Hwang, Shin-Jia; Chen, Chiu-Chin |