| 國立交通大學 |
2014-12-08T15:41:48Z |
Cryptanalysis of the Hwang-Shi proxy signature scheme
|
Hwang, MS; Lee, CC; Hwang, SJ |
| 淡江大學 |
2002-11 |
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
|
Hwang, Min-shiang; Lee, Cheng-ch; Hwang, Shin-jia |
| 亞洲大學 |
2001-05 |
Cryptanalysis of The Hwang-Shi Proxy Signature Scheme
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
- |
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
|
李正吉;Lee, Cheng-Chi |
| 亞洲大學 |
2001.05 |
Cryptanalysis of The Hwang-Shi Proxy Signature Scheme
|
黃明祥;Hwang, Min-Shiang |
| 國立交通大學 |
2014-12-08T15:17:52Z |
Cryptanalysis of the improved authenticated key agreement protocol
|
Chang, TY; Yang, CC; Yang, YW |
| 亞洲大學 |
2005-03 |
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach
|
Chang, C. C. ; Lin, I. C |
| 亞洲大學 |
2019-01 |
Cryptanalysis of the Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications
|
Chio, Shu-Fen;Chiou, Shu-Fen;Hsieh-Tsen, P;Pan, Hsieh-Tsen;Ca, Eko Fajar;Cahyadi, Eko Fajar;黃明祥;Hwang, Min-Shiang |
| 國立東華大學 |
2004 |
Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System without using One-way Hash Function
|
Yang, W. P.; Chang, T. Y.; Hwang, M. S. |
| 東海大學 |
2009-03 |
Cryptanalysis of threshold password authentication against guessing attakcs in Ad Hoc networks
|
Li, Chun-Ta; Chu, Yen-Ping; 朱延平 |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Chung-Huei Ling,;Shih-Ming Chen;黃明祥(Min-Shiang Hwang)* |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 亞洲大學 |
2016-05 |
Cryptanalysis of Tseng-Wu Group Key Exchange Protocol
|
Ling, C. H.;Ling, Chung-Huei;Chen, S. M.;Chen, Shih-Ming;黃明祥* |
| 淡江大學 |
2013-09 |
Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy
|
Peng, Jian-Wen; Horng, Wen-Bing; Chiu, Ying-Ching; Liu, Chao-Sheng |
| 南台科技大學 |
1999-11 |
Cryptanalysis of two group signature schemes
|
李南逸; M. Joye; S. Kim; N.Y. Lee |
| 國立臺灣科技大學 |
2009 |
Cryptanalysis of two three-party encrypted key exchange protocols
|
Lo N.W.; Yeh K.-H. |
| 國立臺灣大學 |
2006 |
Cryptanalysis of Variants of UOV
|
Hu, Yuh-Hua; Chou, Chun-Yen; Wang, Lih-Chung; Lai, Feipei |
| 國立東華大學 |
2006 |
Cryptanalysis of Variants of UOV.
|
Wang, Lih-Chung; Hu, Yuh-Hua; Chou, Chun-Yen; Lai, Feipei |
| 淡江大學 |
2013-09 |
Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards
|
Shieh, Wen-Gong; Horng, Wen-Bing |
| 朝陽科技大學 |
2015-10 |
Cryptanalysis of Yeh et al.’s timestamp based scheme using smart card
|
Chen, Chin-Ling;Deng, Yong-Yuan |
| 朝陽科技大學 |
2016-06 |
Cryptanalysis of Yeh et al.’s timestamp based scheme using smart card
|
Chin-Ling Chen, Yong-Yuan Deng |
| 國立臺灣科技大學 |
2014 |
Cryptanalysis on a Portable Privacy-Preserving Authentication and Access Control Protocol in VANETs
|
Horng, S.-J.;Tzeng, S.-F.;Wang, X.;Qiao, S.;Gong, X.;Khan, M.K. |
| 朝陽科技大學 |
2006 |
Cryptanalysis on an Algorithm for Efficient Digital Signatures
|
楊伏夷 |
| 中華大學 |
2008 |
Cryptanalysis on Chen-Qiu-Zheng Blind Signature Scheme
|
吳林全; Wu, Lin-Chuan |
| 國立中山大學 |
2008 |
Cryptanalysis on Chen-Qiu-Zheng Blind Signature Scheme
|
Chun-I Fan;Lin-Chuan Wu;Vincent Shi-Ming Huang |