Browsing by Author Jan, J.K.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 34 to 49 of 49 < previous 
Issue DateTitleAuthor(s)Text
-On the security of generalization of threshold signature and authenticated encryptionTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
-Partially blind threshold signature based on RSAChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-A practical (t, n) multi-secret sharing schemeChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-A Provable Billing Protocol on the Current UMTSOu, H.H.; 黃明祥; Hwang, M.S.; Jan, J.K.-
-A provable secure access control using smart cardsYang, F.Y.; Jan, J.K.-
-Robust and simple authentication protocolChien, H.Y.; Jan, J.K.-
-A scheme and concept for limited inheritance of privileges in a user hierarchyTseng, Y.M.; Jan, J.K.-
-A secure anonymous voting protocol with a complete supervisionJan, J.K.; Chen, Y.Y.-
-Security of digital signature with one-time pair of keysTseng, Y.M.; Jan, J.K.; Chien, H.Y.-
-A simple mobile communication billing system among charged partiesOu, H.H.; Hwang, M.S.; Jan, J.K.-
-Solving the invalid signer-verified signature problem and comments on Xia-You group signatureChien, H.Y.; Jan, J.K.; Tseng, Y.M.-
-TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS林詠章; Ou, H.H.; Lin, I.C.; Hwang, M.S.; Jan, J.K.-
-A tree-based scheme for security of many-to-many communicationsLin, R.H.; Jan, J.K.-
-Two integrated schemes of user authentication and access control in a distributed computer networkJan, J.K.; Tseng, Y.M.-
-The UMTS-AKA Protocols for Intelligent Transportation SystemsOu, H.H.; 黃明祥; Hwang, M.S.; Jan, J.K.-
-A unified approach to secret sharing schemes with low distribution costChien, H.Y.; Jan, J.K.; Tseng, Y.M.-