Browsing by Author Horng, G.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 28  next >
Issue DateTitleAuthor(s)Text
-An active attack on protocols for server-aided RSA signature computationHorng, G.; 洪國寶-
-An anonymous buyer-reseller watermarking protocolChen, T.H.; 洪國寶; Horng, G.; Tsai, D.-
-Cheating in visual cryptographyHorng, G.; 洪國寶; Chen, T.; Tsai, D.-
-Computing the modular inverses is as simple as computing the GCDsLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
-Cryptanalysis of a key management scheme for secure multicast communicationsHorng, G.; 洪國寶-
-Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystemLiu, C.L.; 洪國寶; Horng, G.; Liu, H.Y.-
-AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARINGHorng, G.; 洪國寶; Wang, C.L.; Chen, T.H.-
-An efficient key-update scheme for wireless sensor networksWang, C.L.; 洪國寶; Horng, G.; Chen, Y.S.; Hong, T.P.-
-Extended Relation Metadata for SCORM-based Learning Content Management SystemsLu, E.J.L.; 呂瑞麟; Horng, G.; Yu, C.S.; Chou, L.Y.-
-A Fast VQ Codebook Generation Algorithm Based on Otsu Histogram ThresholdHuang, C.C.; 洪國寶; Tsai, D.S.; Horng, G.-
-Further refinement of pairing computation based on Miller's algorithmLiu, C.L.; 洪國寶; Horng, G.; Chen, T.Y.-
-A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKSWang, C.L.; 洪國寶; Hong, T.P.; Horng, G.; Wang, W.H.-
-HYBRID GLOBAL/LOCAL SEARCH STRATEGIES FOR VQ CODEBOOK GENERATION BASED ON OTSU AND LBG ALGORITHMHuang, C.C.; Tsai, D.S.; Horng, G.-
-Identification scheme based on Shamir's 'RSA for paranoids'Horng, G.; 洪國寶-
-MULTIPLE WATERMARKING BASED ON VISUAL SECRET SHARINGChen, T.H.; 洪國寶; Hung, T.H.; Horng, G.; Chang, C.M.-
-A NOVEL PRIVATE INFORMATION RETRIEVAL SCHEME WITH FAIR PRIVACY IN THE USER SIDE AND THE SERVER SIDEChen, C.H.; 洪國寶; Horng, G.; Hsu, C.H.-
-A novel secret image sharing scheme for true-color images with size constraintTsai, D.S.; 洪國寶; Horng, G.; Chen, T.H.; Huang, Y.T.-
-On generating meaningful shares in visual secret sharing schemeTsai, D.S.; 洪國寶; Chen, T.; Horng, G.-
-Performance improvement for the GGM-construction of pseudorandom functionsChen, Y.S.; 洪國寶; Horng, G.; Liu, C.L.-
-A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEMEChen, Y.C.; Liu, C.L.; Horng, G.; Chen, K.C.-