271 |
100-2
|
教學計畫表
|
資工三:資訊安全導論 TEIXB3E2826 0P
|
272 |
99-1
|
論文指導
|
資工二碩士班 向胤澤
|
273 |
99-1
|
論文指導
|
資工二碩士班 紀仁富
|
274 |
99-1
|
論文指導
|
資工二碩士班 盧承毅
|
275 |
100-1
|
論文指導
|
資網二碩士班 陳冠良
|
276 |
100-1
|
論文指導
|
資網二碩士班 游政翰
|
277 |
85-2
|
會議論文
|
A time-stamped password authentication system
|
278 |
100-1
|
會議論文
|
A simple secret key distribution system
|
279 |
88-2
|
會議論文
|
A simple multi-proxy signature scheme
|
280 |
98-1
|
會議論文
|
A Ring Signature Scheme with Strong Designated Verifiers to Provide Singer Anonymity
|
281 |
89-1
|
會議論文
|
A proxy signature scheme without using one-way hash functions
|
282 |
97-1
|
會議論文
|
A Practical Anonymous Proxy Signature Scheme without Trusted Alias Issuing Authority
|
283 |
96-2
|
會議論文
|
A Practical Anonymous Proxy Signature Scheme with Trusted Alias Issuing Authority
|
284 |
83-1
|
會議論文
|
A new verification mechanism on the server-aided secret computation protocols for the modular exponentiation
|
285 |
89-2
|
會議論文
|
A New ID-Based Public Key Cryptosystem
|
286 |
98-1
|
會議論文
|
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks
|
287 |
80-1
|
會議論文
|
英漢字典壓縮研究
|
288 |
88-2
|
會議論文
|
The security analysis of two authenticated key agreement schemes
|
289 |
85-1
|
會議論文
|
The key distribution protocol for mobile communication systems with untrusted centers
|
290 |
88-1
|
會議論文
|
Specifiable proxy signature schemes
|
291 |
83-2
|
會議論文
|
Some active attacks on fast server-aided secret computation protocols for modular exponentiation
|
292 |
80-2
|
會議論文
|
Sharing a dynamic secret
|
293 |
80-1
|
會議論文
|
On the design of image databases for concurrent spatial match retrieval
|
294 |
87-2
|
會議論文
|
New multisignature scheme based on one-way function
|
295 |
92-1
|
會議論文
|
National Computer Symposium 2003
|
296 |
94-1
|
會議論文
|
Improvement of Lee-Chiu's Remote Authentication Scheme with Smart Cards (Lee-Chiu使用智慧卡之遠端身份認證法的改良)
|
297 |
84-2
|
會議論文
|
Dynamic secret sharing scheme with cheater detection
|
298 |
84-2
|
會議論文
|
A digitized signature linkage scheme
|
299 |
80-1
|
會議論文
|
Cryptographic authentication of passwords
|
300 |
98-2
|
會議論文
|
Concurrent Signature Schemes with Anonymity and Identification
|