瀏覽 的方式: 作者 洪國寶

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1 到 20 筆資料,總共 244 筆  下一步 >
日期標題作者全文
20082G/3G GPRS網路GOA攻擊及防範之探討賈坤芳; Kun-Fang Jia; 孫宏民; 陳宗和; Hung-Min Sun; Zong-He Chen; 洪國寶; Guo-Bao Horng; 賴正祥; Lai, Cheng-Shiang; 中興大學-
1998An active attack on protocols for server-aided RSA signature computationHorng, G.; 洪國寶-
2007Ad Hoc無線網路中利用ID重置技術建構最小省電Connected Dominating Set的區域演算法黃胤傅; 楊東麟; 廖珗洲; 洪國寶; 賈坤芳; 陳俊榮; Chen, Jyun-Rong; 中興大學-
2005An anonymous buyer-reseller watermarking protocolChen, T.H.; 洪國寶; Horng, G.; Tsai, D.-
2006Cheating in visual cryptographyHorng, G.; 洪國寶; Chen, T.; Tsai, D.-
2001(The Computer Journal,44(5):463-470)An Efficient and Secure Protocol for Multi-party Key Establishment洪國寶; G. B. Horng; 洪國寶; G. B. Horng; 國立中興大學資訊科學與工程學系-
2008Computing the modular inverses is as simple as computing the GCDsLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
2002Cryptanalysis of a key management scheme for secure multicast communicationsHorng, G.; 洪國寶-
2005Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystemLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
2006(Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual Cryptography洪國寶; G. B. Horng; G. B. Horng; T. H. Chen; Dushiau Tsai; 國立中興大學資訊科學與工程學系-
2009AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARINGHorng, G.; 洪國寶; Wang, C.L.; Chen, T.H.-
2006An efficient key-update scheme for wireless sensor networksWang, C.L.; 洪國寶; Horng, G.; Chen, Y.S.; Hong, T.P.-
2009A Fast VQ Codebook Generation Algorithm Based on Otsu Histogram ThresholdHuang, C.C.; 洪國寶; Tsai, D.S.; Horng, G.-
2008(Finite Fields and Their Applications,14(1):065-075)Computing the Modular Inverses Is as Simple as Computing the GCDs洪國寶; G. B. Horng; G. B. Horng; C. L. Liu; H. Y. Liu; 國立中興大學資訊科學與工程學系-
2007Further refinement of pairing computation based on Miller's algorithmLiu, C.L.; 洪國寶; Horng, G.; Chen, T.Y.-
2009A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKSWang, C.L.; 洪國寶; Hong, T.P.; Horng, G.; Wang, W.H.-
2014Harn的群體認證協定之延伸洪國寶; 林顥桐; 資訊科學與工程學系-
1999Identification scheme based on Shamir's 'RSA for paranoids'Horng, G.; 洪國寶-
2007IEEE 802.11e無線區域網路中控制區段之輪詢排程演算法研究何英治; 羅文聰; 洪國寶; 王宗銘; 陳文賢; 廖志偉; Liao, Chih-Wei; 中興大學-
1998(Information Processing Letters,65(2):071-073)An active attack on protocols for server-aided RSA signature computationG. B. Horng; 洪國寶; 洪國寶; G. B. Horng; 國立中興大學資訊科學與工程學系-