Showing results 1 to 20 of 63
next >
Issue Date | Title | Author(s) | Text |
- | (18th IEEE International Conference on Advanced Information Networking and Applications:p133-p138)A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy | C. C. Chang; I. C. Lin; H. M. Tsai | |
- | (18th IEEE International Conference on Advanced Information Networking and Applications:p376-p379)A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies | C. C. Chang; I. C. Lin; H. M. Tsai; H. H. Wang | |
- | (2002 International Conference on Information Security:p082-p088)A Credit Card-based Mobile Payment System | K. F. Hwang; I. C. Lin; C. C. Chang | - |
- | (2003 IEEE International Conference on Natural Language Processing and Knowledge Engineering:p506-p511)An Efficient Placement of Chinese Phonetic Symbols for an Intellectual Chinese Phonetic Symbol Input System in Mobile Phones Using Genetic Algorithm | C. C. Chang; K. J. Shih; I. C. Lin | - |
- | (2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1367-p1370)A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization | I. C. Lin; C. C. Chang | |
- | (2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1537-p1540)An Efficient Proxy Signature for Realizing Generalized Proxy Signature Policy | C. C. Chang; I. C. Lin; J. H. Yang | |
- | (24th International Computer Software and Applications Conference:p113-p115)Security Enhancement for the Simple Authentication Key Agreement Algorithm | I. C. Lin; M. S. Hwang; C. C. Chang | |
- | (2nd international conference on Scalable information systems:p69)A Broadcast-Encryption-Based Key Management Scheme for Dynamic Multicast Communications | C. C. Chang; Y. W. Su; I. C. Lin | |
- | (9th Joint Conference on Information Sciences:p674-p677)A secure and efficient scheme for authenticating remote users using smart card | I. C. Lin; Y. B. Lin; C. M. Wang | |
- | (9th Joint Conference on Information Sciences:p697-p700)An Improvement on Secure E-mail Protocols Providing Perfect Forward Secrecy | I. C. Lin; Y. B. Lin; C. M. Wang | |
- | (ACM Operating Systems review,38(3):052-057)An Improvement of Delegated Multisignature Scheme with Document Decomposition | C. C. Chang; I. C. Lin | |
- | (ACM Operating Systems Review,38(3):091-100)Remarks on Fingerprint-based Remote User Authentication Scheme Using Smart Cards | C. C. Chang; I. C. Lin | |
- | (Computer Standards and Interfaces,25(2):131-139)Security Enhancement for the Anonymous Secure E-Voting over a Network | I. C. Lin; M. S. Hwang; C. C. Chang | |
- | (Computer Standards and Interfaces,25(5):501-513)The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture | C. C. Chang; I. C. Lin | |
- | (Computer Standards and Interfaces,26(5):423-433)Efficient Access Control and Key Management Schemes for Mobile Agents | I. C. Lin; H. H. Ou; M. S. Hwang | |
- | (Computer Standards and Interfaces,27(4):407-413)A Novel ID-based Multisignature Scheme without Reblocking and Predetermined Signing Order | C. C. Chang; I. C. Lin; K. Y. Lam | - |
- | (Computer Standards and Interfaces,31:458-464)Hiding Data in Spatial Domain Images with Distortion Tolerance | I. C. Lin; Y. B. Lin; C. M. Wang | |
- | (Computer Vision and Image Understanding,107(3):183-194)A New Steganographic Method for Color and Grayscale Image Hiding | Y. H. Yu; C. C. Chang; I. C. Lin | |
- | (Computing and Informatics,24(5):529-541)A (t,n) Threshold Secret Sharing System with Efficient Identification of Cheaters | I. C. Lin; C. C. Chang | - |
- | (Data & Knowledge Engineering,40(2):155-162)Adding Timestamps to the Secure Electronic Auction Protocol | M. S. Hwang; E. J. L. Lu; I. C. Lin | |