| 南台科技大學 |
1996 |
On the security of Chang and Wu`s broadcasting cryptosystem for computer networks
|
李南逸; T. Hwang; N.Y. Lee; C.M. Li; C.C. Chang |
| 南台科技大學 |
1996-12 |
On the security of Chang et al. ‘s cryptographic key assignment scheme for access control in a hierarchy
|
李南逸; T. Hwang; N.Y. Lee; C.C. Chang |
| 南台科技大學 |
1999-01 |
On the security of fair blind signature scheme using oblivious transfer
|
李南逸; N.Y. Lee; T. Hwang |
| 國立彰化師範大學 |
2001 |
On the Security of Generalization of Threshold Signature and Authenticated Encryption
|
Tseng, Yuh-Min; JAN, J. K. ; CHIEN, H. Y . |
| 東海大學 |
2005-06-27 |
On the security of ID-based Password Authentication Scheme using Smart Cards and Fingerprints
|
林祝興; Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin and Yi-Yi Lai |
| 東海大學 |
2005-06-27 |
On the security of ID-based password authentication scheme using smart cards and fingerprints??
|
Lin, C.-H., Lin, T.-S., Lin, H.-H., Lai, Y.-Y. |
| 國立彰化師範大學 |
1996-12 |
On the Security of Image Encryption Method
|
Jan, Jinn-Ke; Tseng, Yuh-Min |
| 臺大學術典藏 |
2020-05-04T07:56:16Z |
On the Security of Intra-Car Wireless Sensor Networks.
|
HSIN-MU TSAI; Tonguz, Ozan K.; Lee, Hayan;Tsai, Hsin-Mu;Tonguz, Ozan K.; Lee, Hayan; Tsai, Hsin-Mu |
| 朝陽科技大學 |
2003 |
On the security of mutual authentication and key exchange for low power wireless communications
|
楊伏夷;陳榮靜 |
| 南台科技大學 |
1997-10 |
On the security of Park et al’s key distribution protocol for digital mobile communications
|
李南逸; N.Y. Lee; T. Hwang |
| 亞洲大學 |
2007-05 |
On the Security of Sehkar's Signature Schemes
|
;Lee, Cheng-Chi;Ku, Wei-Han;黃秀園;Huang, Shiow-Yuan |
| 亞洲大學 |
2011-04 |
On The Security Of Self-Certified Public Keys
|
黃明祥;Hwang, Min-Shiang |
| 國立暨南國際大學 |
2012 |
On the security of several Gen2-based protocols without modifying the standards
|
Chen, CS; Chen, CS |
| 國立暨南國際大學 |
2012 |
On the security of several Gen2-based protocols without modifying the standards
|
簡宏宇; Chien, HY |
| 國立成功大學 |
2012-06 |
On the security of several Gen2-based protocols without modifying the standards
|
Lee, Chin-Feng; Chien, Hung-Yu; Laih, Chi-Sung; Chen, Chi-Sheng |
| 國立成功大學 |
2003 |
On the security of some password authentication protocols
|
Hsieh, Bin-Tsan; Sun, Hung-Min; Hwang, Tzonelih |
| 國立成功大學 |
2005-02-01 |
On the security of some proxy blind signature schemes
|
Sun, Hung-Min; Hsieh, Bin-Tsan; Tseng, Shin-Mu |
| 元智大學 |
2003-12 |
On The Security of TETRA
|
周錫增; Yixian Yang; Xiao-Guang Zhou |
| 東海大學 |
2008 |
On the security of the full-band image watermark for copyright protection
|
Lin, Chu-Hsing , Jung-Chun Liu and Pei-Jean Han.; 林祝興 |
| 東海大學 |
2008-06-11 |
On the Security of the Full-Band Image Watermark for Copyright Protection
|
林祝興; Chu-Hsing Lin, Jung-Chun Liu, Pei-Jean Han |
| 東海大學 |
20080611-- |
On the security of the full-band image watermark for copyright protection
|
Lin, C.-H., Liu, J.-C., Han, P.-C. |
| 東海大學 |
2008-06-11 |
On the security of the full-band image watermark for copyright protection
|
Lin, C.-H., Liu, J.-C., Han, P.-C. |
| 南台科技大學 |
1999-11 |
On the security of the Lee-Chang group signature scheme and its derivatives
|
李南逸; M. Joye; N.Y. Lee; T. Hwang |
| 國立成功大學 |
1999 |
On the security of the Lee-Chang group signature scheme and its derivatives
|
Joye, Marc; Lee, Narn-Yih; Hwang, Tzonelih |
| 國立彰化師範大學 |
2006-05 |
On the Security of Two Group Key Agreement Protocols for Mobile Devices
|
Tseng, Yuh-Min |