Browsing by Author Jan, J.K.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 12 to 31 of 49 < previous   next >
Issue DateTitleAuthor(s)Text
-Design of a fair proxy raffle protocol on the InternetChen, Y.Y.; Jan, J.K.; Chen, C.L.-
-The design of a secure anonymous Internet voting systemChen, Y.Y.; Jan, J.K.; Chen, C.L.-
-The design of RFID access control protocol using the strategy of indefinite-index and challenge-responseChen, Y.Y.; Tsai, M.L.; Jan, J.K.-
-Digital signature with message recovery using self-certified public keys and its variantsTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
-A displacement addressing method for letter-oriented keysWang, S.J.; Jan, J.K.-
-An efficient and practical solution to remote authentication: Smart cardChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-An efficient anonymous channel protocol in wireless communicationsJan, J.K.; Lin, W.D.-
-An efficient group-oriented (t,n) threshold signature scheme with message linkagePerng, C.Y.; Jan, J.K.; Tseng, Y.M.-
-A fair and secure mobile billing systemChen, Y.Y.; Jan, J.K.; Chen, C.L.-
-Forgery attacks on &quot;Multisignature, schemes for authenticating mobile code delegates&quot;Chien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-HIDING INFORMATION IN BINARY IMAGES WITH COMPLETE REVERSIBILITY AND HIGH EMBEDDING CAPACITYWang, C.C.; 黃穎聰; Hwang, Y.T.; Chang, C.C.; Jan, J.K.-
-A hybrid authentication protocol for large mobile networkChien, H.Y.; Jan, J.K.-
-Impersonation attack on Tan-Zhu's remote login schemeChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-Improved authenticated multiple-key agreement protocol without using conventional one-way functionChien, H.Y.; Jan, J.K.-
-Improved group signature scheme based on discrete logarithm problemTseng, Y.M.; Jan, J.K.-
-Improvement of Chikazawa-Yamagishi ID-based key sharing systemTseng, Y.M.; Jan, J.K.-
-An innovative revocation scheme for one-to-many E-servicesLin, R.H.; Jan, J.K.-
-A mobile ticket system based on personal trusted deviceChen, Y.Y.; Chen, C.L.; Jan, J.K.-
-A modified remote login authentication scheme based on geometric approachChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-New hierarchical assignment without public key cryptographyChien, H.Y.; Jan, J.K.-