期刊論文

學年期 標題 更新時間
095 / 2 Fast Firmware Implementation of RSA-Like Security Protocol for Mobile Devices 2014/07/01
097 / 1 Efficient and Secure Protocol in Fair Certified E-Mail Delivery 2010/08/10
089 / 1 A Digital Image Copyright Protection Scheme Based on Visual Cryptography 2016/11/21
093 / 1 An efficient signcryption scheme with forward secrecy based on elliptic curve 2016/12/21
094 / 1 A new efficient authentication protocol for mobile networks 2016/12/05
093 / 2 Information Hiding in Lossy Compression Gray Scale Image 2017/01/13
095 / 1 A new mobile payment scheme for roaming services 2014/06/30
094 / 2 A Wireless-based Authentication and Anonymous Channels for GSM System 2010/06/16
093 / 1 A new scheme to protect confidential Images 2016/12/05
094 / 1 Key Agreement in Ad Hoc Network 2017/01/17
095 / 1 Secure Key Management Scheme for Wireless LAN 2010/06/16
093 / 1 Cryptanalysis on stream ciphers for GSM networks 2017/01/03
095 / 2 An efficient modulo $P$ multiplication algorithm with moderate factors of P$+1 and $P$-1 2014/06/30
089 / 2 Hiding a picture in two pictures 2017/01/13
099 / 2 A Short Latency Inter-Domain Handover Authentication Protocol for Wireless Network 2015/01/07
099 / 1 An efficient secure data dissemination scheme for grid structure Wireless Sensor Networks 2015/01/22
099 / 1 Efficient Electronic Toll Collection Protocol for Intelligent System 2011/10/01
099 / 1 Privacy protection on Vehicular Ad hoc NETworks 2015/02/03
087 / 2 A Concept of Designing Cheater Identification Methods for Secret Sharing 2016/11/15
086 / 1 A simple picture hiding scheme 2011/10/05
085 / 1 An efficient cheater identification method for threshold scheme 2011/10/05
087 / 1 An improved threshold scheme based on modular arithmetic 2011/10/05
087 / 1 An on-line secret sharing scheme for multi-secrets 2013/12/09
081 / 1 Master keys for an M3 cryptoscheme 2012/03/26
096 / 1 Provably Efficient Authenticated Key Agreement Protocol for Multi-servers 2014/06/30
087 / 1 Sharing secret images using shadow codebooks 2013/12/09
087 / 2 A concept of designing cheater identification methods for secret sharing 2016/11/15
100 / 2 Two-factor authenticated key exchange protocol in the three-party setting 2013/03/19
101 / 1 An Identity-Based Secure Distributed Routing Protocol for Wireless Mesh Networks 2014/06/30
103 / 1 The Optimal Split Method of Large Integer Multiplication for Smart Low-End Devices on P2P Ubiquitous Networks 2015/11/19
101 / 2 A New Two-factor Dynamic ID-based Remote User Authentication Scheme 2016/12/05
080 / 2 Cryptographic key assignment scheme for access control in a hierarchy 2013/06/07
102 / 1 An Anonymous Distributed Routing Protocol in Mobile Ad-hoc Networks 2014/09/04
103 / 1 Anonymous Routing Protocol Based on Weil Pairing for Wireless Mesh Networks 2016/11/11