現在位置: 機構典藏 > 研究報告
現在位置: 機構典藏 >
您查詢的條件為:不限欄位=Attack
排序:
  • 排序:   重新排序
  • 將所勾選項目:

    序號題名作者日期
    1Improving the Security of A Secure Anonymous Routing Protocol with Authenticated Key Exchange for AdLi,Chun-Ta
    Hwang,Min-Shiang
    Chu,Yen-Ping
    2An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications李俊達
    Chun-Ta Li
    Min-Shiang Hwang
    Yen-Ping Chu
    3A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over InsecChun-Ta Li1
    Cheng-Chi Lee
    Lian-Jun Wang
    4Security Enhancement on An RFID Ownership Transfer Protocol Based on Cloud李俊達
    Cheng-Chi Lee
    Shun-Der Chen
    Chung-Lun Cheng
    Yan-Ming Lai
    5An efficient online/offline ID-based short signature procedure using extended chaotic maps李俊達
    Chandrashekhar Meshram
    Sarita Gajbhiye Meshram
    6Robot Identification and Authentication in a Robot Cloud Service System李俊達
    Chin-Ling Chen
    Yan-Ting Li
    Yong-Yuan Deng
    7An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps李俊達
    翁麒耀
    陳建銘
    李正吉
    8An Enhanced Network Admission and Communication Scheme for Internet of Things Based Body Area Networ李俊達
    施東河
    王浚丞
    9Eavesdropping Detection based on Power-Comparisons to Reconfigure Signature Keys in Optical Coding A陳見生
    楊朝欽
    Kai-Chun Lin
    黃振發
    10A Novel Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity Based on李俊達
    陳金鈴
    李正吉
    翁麒耀
    陳建銘
    11Towards secure authenticating of cache in the reader for RFID-based IoT systems李俊達
    李正吉
    翁麒耀
    陳建銘
    12A Chaotic Maps Based Key Agreement and User Anonymity Protocol without Using Smart Cards and Symmetr李俊達
    李正吉
    翁麒耀
    13Anonymous and Authentication Protocol For Multi-Server黃玉枝
    Wen-Chung Kuo
    Po-Wei Shih
    Lih-Chyau Wuu
    14A Provable Secure Private Data Delegation Scheme for Mountaineering Events in Emergency System李俊達
    Chien-Ming Chen
    Shuai Liu
    Tsu-Yang Wu
    Jeng-Shyang Pan
    15A Secure Chaotic Maps Based Privacy-protection Scheme for Multi-server Environments李俊達
    16A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architectu李俊達
    李正吉
    翁麒耀
    范俊逸
    17Binary power data hiding scheme黃玉枝
    Wen-Chung Kuo
    Chun-Cheng Wang
    18An Undetectable On-line Password Guessing Attack on Nam et al.'s Three-party Key Exchange Protocol李俊達
    19Traceable and Private Satellite Communication for Emergency Notification in VANET李俊達
    陳金鈴
    Jin-Xin Hu
    鄧永源
    Shunzhi Zhu
    20Secure User Authentication and User Anonymity Scheme based on Quadratic Residues for Integrated EPRI李俊達
    翁麒耀
    李正吉
    王浚丞
  • 排序:   重新排序