期刊論文

學年期 標題 Sdgs 更新時間
095 / 2 Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices 2014-07-01
097 / 1 Efficient and Secure Protocol in Fair Certified E-Mail Delivery 2010-08-10
089 / 1 A Digital Image Copyright Protection Scheme Based on Visual Cryptography 2016-11-21
093 / 1 An efficient signcryption scheme with forward secrecy based on elliptic curve 2016-12-21
094 / 1 A new efficient authentication protocol for mobile networks 2016-12-05
093 / 2 Information Hiding in Lossy Compression Gray Scale Image 2017-01-13
095 / 1 A new mobile payment scheme for roaming services 2014-06-30
094 / 2 A Wireless-based Authentication and Anonymous Channels for GSM System 2010-06-16
093 / 1 A new scheme to protect confidential Images 2016-12-05
094 / 1 Key Agreement in Ad Hoc Network 2017-01-17
095 / 1 Secure Key Management Scheme for Wireless LAN 2010-06-16
093 / 1 Cryptanalysis on stream ciphers for GSM networks 2017-01-03
095 / 2 An efficient modulo $P$ multiplication algorithm with moderate factors of P$+1 and $P$-1 2014-06-30
089 / 2 Hiding a picture in two pictures 2017-01-13
099 / 2 A Short Latency Inter-Domain Handover Authentication Protocol for Wireless Network 2015-01-07
099 / 1 An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks 2015-01-22
099 / 1 Efficient Electronic Toll Collection Protocol for Intelligent System 2011-10-01
099 / 1 Privacy protection on Vehicular Ad hoc NETworks 2015-02-03
087 / 2 A Concept of Designing Cheater Identification Methods for Secret Sharing 2016-11-15
086 / 1 A simple picture hiding scheme 2011-10-05
085 / 1 An efficient cheater identification method for threshold scheme 2011-10-05
087 / 1 An improved threshold scheme based on modular arithmetic 2011-10-05
087 / 1 An on-line secret sharing scheme for multi-secrets 2013-12-09
081 / 1 Master keys for an M3 cryptoscheme 2012-03-26
096 / 1 Provably Efficient Authenticated Key Agreement Protocol for Multi-servers 2024-01-18
087 / 1 Sharing secret images using shadow codebooks 2013-12-09
087 / 2 A concept of designing cheater identification methods for secret sharing 2016-11-15
100 / 2 Two-factor authenticated key exchange protocol in the three-party setting 2013-03-19
101 / 1 An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks 2014-06-30
103 / 1 The Optimal Split Method of Large Integer Multiplication for Smart Low-End Devices on P2P Ubiquitous Networks 2015-11-19
101 / 2 A New Two-factor Dynamic ID-based Remote User Authentication Scheme 2016-12-05
080 / 2 Cryptographic key assignment scheme for access control in a hierarchy 2013-06-07
102 / 1 An Anonymous Distributed Routing Protocol in Mobile Ad-hoc Networks 2014-09-04
103 / 1 Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks 2016-11-11