Browsing by Author Jan, J.K.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 21 to 40 of 49 < previous   next >
Issue DateTitleAuthor(s)Text
-Forgery attacks on &quot;Multisignature, schemes for authenticating mobile code delegates&quot;Chien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-HIDING INFORMATION IN BINARY IMAGES WITH COMPLETE REVERSIBILITY AND HIGH EMBEDDING CAPACITYWang, C.C.; 黃穎聰; Hwang, Y.T.; Chang, C.C.; Jan, J.K.-
-A hybrid authentication protocol for large mobile networkChien, H.Y.; Jan, J.K.-
-Impersonation attack on Tan-Zhu's remote login schemeChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-Improved authenticated multiple-key agreement protocol without using conventional one-way functionChien, H.Y.; Jan, J.K.-
-Improved group signature scheme based on discrete logarithm problemTseng, Y.M.; Jan, J.K.-
-Improvement of Chikazawa-Yamagishi ID-based key sharing systemTseng, Y.M.; Jan, J.K.-
-An innovative revocation scheme for one-to-many E-servicesLin, R.H.; Jan, J.K.-
-A mobile ticket system based on personal trusted deviceChen, Y.Y.; Chen, C.L.; Jan, J.K.-
-A modified remote login authentication scheme based on geometric approachChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-New hierarchical assignment without public key cryptographyChien, H.Y.; Jan, J.K.-
-A novel ID-based group signatureTseng, Y.I.M.; Jan, J.K.-
-Novel Watermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel PatternsWang, C.C.; Chang, C.C.; Jan, J.K.-
-On the security of generalization of threshold signature and authenticated encryptionTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
-Partially blind threshold signature based on RSAChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-A practical (t, n) multi-secret sharing schemeChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-A Provable Billing Protocol on the Current UMTSOu, H.H.; 黃明祥; Hwang, M.S.; Jan, J.K.-
-A provable secure access control using smart cardsYang, F.Y.; Jan, J.K.-
-Robust and simple authentication protocolChien, H.Y.; Jan, J.K.-
-A scheme and concept for limited inheritance of privileges in a user hierarchyTseng, Y.M.; Jan, J.K.-