Showing results 1 to 20 of 28
next >
Issue Date | Title | Author(s) | Text |
- | An active attack on protocols for server-aided RSA signature computation | Horng, G.; 洪國寶 | - |
- | An anonymous buyer-reseller watermarking protocol | Chen, T.H.; 洪國寶; Horng, G.; Tsai, D. | - |
- | Cheating in visual cryptography | Horng, G.; 洪國寶; Chen, T.; Tsai, D. | - |
- | Computing the modular inverses is as simple as computing the GCDs | Liu, C.L.; 洪國寶; Horng, G.; Liu, H.Y. | - |
- | Cryptanalysis of a key management scheme for secure multicast communications | Horng, G.; 洪國寶 | - |
- | Cryptanalysis of an efficient user identification scheme based on ID-based cryptosystem | Liu, C.L.; 洪國寶; Horng, G.; Liu, H.Y. | - |
- | AN EFFICIENT CONCEALED DATA AGGREGATION SCHEME FOR SENSOR NETWORKS BASED ON SECRET SHARING | Horng, G.; 洪國寶; Wang, C.L.; Chen, T.H. | - |
- | An efficient key-update scheme for wireless sensor networks | Wang, C.L.; 洪國寶; Horng, G.; Chen, Y.S.; Hong, T.P. | - |
- | Extended Relation Metadata for SCORM-based Learning Content Management Systems | Lu, E.J.L.; 呂瑞麟; Horng, G.; Yu, C.S.; Chou, L.Y. | - |
- | A Fast VQ Codebook Generation Algorithm Based on Otsu Histogram Threshold | Huang, C.C.; 洪國寶; Tsai, D.S.; Horng, G. | - |
- | Further refinement of pairing computation based on Miller's algorithm | Liu, C.L.; 洪國寶; Horng, G.; Chen, T.Y. | - |
- | A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKS | Wang, C.L.; 洪國寶; Hong, T.P.; Horng, G.; Wang, W.H. | - |
- | HYBRID GLOBAL/LOCAL SEARCH STRATEGIES FOR VQ CODEBOOK GENERATION BASED ON OTSU AND LBG ALGORITHM | Huang, C.C.; Tsai, D.S.; Horng, G. | - |
- | Identification scheme based on Shamir's 'RSA for paranoids' | Horng, G.; 洪國寶 | - |
- | MULTIPLE WATERMARKING BASED ON VISUAL SECRET SHARING | Chen, T.H.; 洪國寶; Hung, T.H.; Horng, G.; Chang, C.M. | - |
- | A NOVEL PRIVATE INFORMATION RETRIEVAL SCHEME WITH FAIR PRIVACY IN THE USER SIDE AND THE SERVER SIDE | Chen, C.H.; 洪國寶; Horng, G.; Hsu, C.H. | - |
- | A novel secret image sharing scheme for true-color images with size constraint | Tsai, D.S.; 洪國寶; Horng, G.; Chen, T.H.; Huang, Y.T. | - |
- | On generating meaningful shares in visual secret sharing scheme | Tsai, D.S.; 洪國寶; Chen, T.; Horng, G. | - |
- | Performance improvement for the GGM-construction of pseudorandom functions | Chen, Y.S.; 洪國寶; Horng, G.; Liu, C.L. | - |
- | A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME | Chen, Y.C.; Liu, C.L.; Horng, G.; Chen, K.C. | - |