Browsing by Author Jan, J.K.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 49  next >
Issue DateTitleAuthor(s)Text
-ADAPTIVE AUTHENTICATION SCHEMES FOR 3D MESH MODELSChen, T.Y.; 黃明祥; Hwang, M.S.; Jan, J.K.-
-Anonymous conference key distribution systems based on the discrete logarithm problemTseng, Y.M.; Jan, J.K.-
-Attacks on threshold signature schemes with traceable signersTseng, Y.M.; Jan, J.K.-
-Authenticated encryption schemes with message linkages for message flowsTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
-An automatic signature scheme using a compiler in distributed systemsLin, W.D.; Jan, J.K.-
-BROADCAST YOURSELF SECURELY: ENHANCED TRANSMISSION SCHEME FOR SHARING DIGITAL CREATIONSLin, R.H.; Jan, J.K.-
-A cocktail protocol with the Authentication and Key Agreement on the UMTSOu, H.H.; 黃明祥; Hwang, M.S.; Jan, J.K.-
-Cryptanalysis of Liaw's broadcasting cryptosystemTseng, Y.M.; Jan, J.K.-
-Cryptanalysis of log-in authentication based on circle propertyYang, F.Y.; Jan, J.K.-
-Cryptanalysis on dynamic authentication protocol for personal communication systemChien, H.Y.; Chen, Y.H.; Jan, J.K.; Tseng, Y.M.-
-Cryptanalysis on Mu-Varadharajan's e-voting schemesChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-Design of a fair proxy raffle protocol on the InternetChen, Y.Y.; Jan, J.K.; Chen, C.L.-
-The design of a secure anonymous Internet voting systemChen, Y.Y.; Jan, J.K.; Chen, C.L.-
-The design of RFID access control protocol using the strategy of indefinite-index and challenge-responseChen, Y.Y.; Tsai, M.L.; Jan, J.K.-
-Digital signature with message recovery using self-certified public keys and its variantsTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
-A displacement addressing method for letter-oriented keysWang, S.J.; Jan, J.K.-
-An efficient and practical solution to remote authentication: Smart cardChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-An efficient anonymous channel protocol in wireless communicationsJan, J.K.; Lin, W.D.-
-An efficient group-oriented (t,n) threshold signature scheme with message linkagePerng, C.Y.; Jan, J.K.; Tseng, Y.M.-
-A fair and secure mobile billing systemChen, Y.Y.; Jan, J.K.; Chen, C.L.-