Browsing by Author Jan, J.K.

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 49  next >
DateTitleAuthor(s)File
2009ADAPTIVE AUTHENTICATION SCHEMES FOR 3D MESH MODELSChen, T.Y.; 黃明祥; Hwang, M.S.; Jan, J.K.-
1999Anonymous conference key distribution systems based on the discrete logarithm problemTseng, Y.M.; Jan, J.K.-
1999Attacks on threshold signature schemes with traceable signersTseng, Y.M.; Jan, J.K.-
2003Authenticated encryption schemes with message linkages for message flowsTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
2000An automatic signature scheme using a compiler in distributed systemsLin, W.D.; Jan, J.K.-
2009BROADCAST YOURSELF SECURELY: ENHANCED TRANSMISSION SCHEME FOR SHARING DIGITAL CREATIONSLin, R.H.; Jan, J.K.-
2010A cocktail protocol with the Authentication and Key Agreement on the UMTSOu, H.H.; 黃明祥; Hwang, M.S.; Jan, J.K.-
2001Cryptanalysis of Liaw's broadcasting cryptosystemTseng, Y.M.; Jan, J.K.-
2004Cryptanalysis of log-in authentication based on circle propertyYang, F.Y.; Jan, J.K.-
2001Cryptanalysis on dynamic authentication protocol for personal communication systemChien, H.Y.; Chen, Y.H.; Jan, J.K.; Tseng, Y.M.-
2003Cryptanalysis on Mu-Varadharajan's e-voting schemesChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
2005Design of a fair proxy raffle protocol on the InternetChen, Y.Y.; Jan, J.K.; Chen, C.L.-
2004The design of a secure anonymous Internet voting systemChen, Y.Y.; Jan, J.K.; Chen, C.L.-
2011The design of RFID access control protocol using the strategy of indefinite-index and challenge-responseChen, Y.Y.; Tsai, M.L.; Jan, J.K.-
2002Digital signature with message recovery using self-certified public keys and its variantsTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
1999A displacement addressing method for letter-oriented keysWang, S.J.; Jan, J.K.-
2002An efficient and practical solution to remote authentication: Smart cardChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
2001An efficient anonymous channel protocol in wireless communicationsJan, J.K.; Lin, W.D.-
2001An efficient group-oriented (t,n) threshold signature scheme with message linkagePerng, C.Y.; Jan, J.K.; Tseng, Y.M.-
2005A fair and secure mobile billing systemChen, Y.Y.; Jan, J.K.; Chen, C.L.-