Browsing by Author 洪國寶


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 244  next >
Issue DateTitleAuthor(s)Text
-2G/3G GPRS網路GOA攻擊及防範之探討賴正祥; Lai, Cheng-Shiang-
-An active attack on protocols for server-aided RSA signature computationHorng, G.; 洪國寶-
-Ad Hoc無線網路中利用ID重置技術建構最小省電Connected Dominating Set的區域演算法陳俊榮 ; Chen, Jyun-Rong -
-An anonymous buyer-reseller watermarking protocolChen, T.H.; 洪國寶; Horng, G.; Tsai, D.-
-Cheating in visual cryptographyHorng, G.; 洪國寶; Chen, T.; Tsai, D.-
-(The Computer Journal,44(5):463-470)An Efficient and Secure Protocol for Multi-party Key Establishment洪國寶; G. B. Horng-
-Computing the modular inverses is as simple as computing the GCDsLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
-Cryptanalysis of a key management scheme for secure multicast communicationsHorng, G.; 洪國寶-
-Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystemLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
-(Designs, Codes and Cryptography,38(2):219-236)Cheating in Visual CryptographyG. B. Horng; T. H. Chen; Dushiau Tsai-
-AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARINGHorng, G.; 洪國寶; Wang, C.L.; Chen, T.H.-
-An efficient key-update scheme for wireless sensor networksWang, C.L.; 洪國寶; Horng, G.; Chen, Y.S.; Hong, T.P.-
-A Fast VQ Codebook Generation Algorithm Based on Otsu Histogram ThresholdHuang, C.C.; 洪國寶; Tsai, D.S.; Horng, G.-
-(Finite Fields and Their Applications,14(1):065-075)Computing the Modular Inverses Is as Simple as Computing the GCDsG. B. Horng; C. L. Liu; H. Y. Liu-
-Further refinement of pairing computation based on Miller's algorithmLiu, C.L.; 洪國寶; Horng, G.; Chen, T.Y.-
-A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKSWang, C.L.; 洪國寶; Hong, T.P.; Horng, G.; Wang, W.H.-
-Harn的群體認證協定之延伸林顥桐
-Identification scheme based on Shamir's 'RSA for paranoids'Horng, G.; 洪國寶-
-IEEE 802.11e無線區域網路中控制區段之輪詢排程演算法研究廖志偉 ; Liao, Chih-Wei -
-(Information Processing Letters,65(2):071-073)An active attack on protocols for server-aided RSA signature computation洪國寶; G. B. Horng-