Browsing by Author Horng, G.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 28  next >
DateTitleAuthor(s)File
1998An active attack on protocols for server-aided RSA signature computationHorng, G.; 洪國寶-
2005An anonymous buyer-reseller watermarking protocolChen, T.H.; 洪國寶; Horng, G.; Tsai, D.-
2006Cheating in visual cryptographyHorng, G.; 洪國寶; Chen, T.; Tsai, D.-
2008Computing the modular inverses is as simple as computing the GCDsLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
2002Cryptanalysis of a key management scheme for secure multicast communicationsHorng, G.; 洪國寶-
2005Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystemLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
2009AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARINGHorng, G.; 洪國寶; Wang, C.L.; Chen, T.H.-
2006An efficient key-update scheme for wireless sensor networksWang, C.L.; 洪國寶; Horng, G.; Chen, Y.S.; Hong, T.P.-
2010Extended Relation Metadata for SCORM-based Learning Content Management SystemsLu, E.J.L.; 呂瑞麟; Horng, G.; Yu, C.S.; Chou, L.Y.-
2009A Fast VQ Codebook Generation Algorithm Based on Otsu Histogram ThresholdHuang, C.C.; 洪國寶; Tsai, D.S.; Horng, G.-
2007Further refinement of pairing computation based on Miller's algorithmLiu, C.L.; 洪國寶; Horng, G.; Chen, T.Y.-
2009A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKSWang, C.L.; 洪國寶; Hong, T.P.; Horng, G.; Wang, W.H.-
2010HYBRID GLOBAL/LOCAL SEARCH STRATEGIES FOR VQ CODEBOOK GENERATION BASED ON OTSU AND LBG ALGORITHMHuang, C.C.; Tsai, D.S.; Horng, G.-
1999Identification scheme based on Shamir's 'RSA for paranoids'Horng, G.; 洪國寶-
2008MULTIPLE WATERMARKING BASED ON VISUAL SECRET SHARINGChen, T.H.; 洪國寶; Hung, T.H.; Horng, G.; Chang, C.M.-
2009A NOVEL PRIVATE INFORMATION RETRIEVAL SCHEME WITH FAIR PRIVACY IN THE USER SIDE AND THE SERVER SIDEChen, C.H.; 洪國寶; Horng, G.; Hsu, C.H.-
2009A novel secret image sharing scheme for true-color images with size constraintTsai, D.S.; 洪國寶; Horng, G.; Chen, T.H.; Huang, Y.T.-
2008On generating meaningful shares in visual secret sharing schemeTsai, D.S.; 洪國寶; Chen, T.; Horng, G.-
2006Performance improvement for the GGM-construction of pseudorandom functionsChen, Y.S.; 洪國寶; Horng, G.; Liu, C.L.-
2011A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEMEChen, Y.C.; Liu, C.L.; Horng, G.; Chen, K.C.-