現在位置: 機構典藏 > 研究報告
現在位置: 機構典藏 >
您查詢的條件為:不限欄位=Security
排序:
  • 排序:   重新排序
  • 將所勾選項目:

    序號題名作者日期
    1An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc NetworksLi,Chun Ta
    Hwang,Min Shiang
    Liu,Chi Yu
    2A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy ...Li,Chun Ta
    Hwang,Min Shiang
    Chu,Yen Ping
    3An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc NetworksLi,Chun-Ta
    Hwang,Min-Shiang
    Liu, Chi-Yu
    4... the Security of A Secure Anonymous Routing Protocol with Authenticated Key Exchange for Ad Hoc ...Li,Chun-Ta
    Hwang,Min-Shiang
    Chu,Yen-Ping
    5authenticated path-key establishment scheme for secure communications in wireless sensor networks李俊達
    Chun-Ta Li
    Min-Shiang Hwang
    Yen-Ping Chu
    6An efficient biometrics-based remote user authentication scheme using smart cardsChun-Ta Li, Min-Shiang Hwang
    李俊達
    7An Efficient and Secure Communication Scheme for Trusted Computing Environments李俊達
    8A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over InsecChun-Ta Li1
    Cheng-Chi Lee
    Lian-Jun Wang
    9A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System李俊達
    10A Secure Trapdoor-Indistinguishable Public Encryption Scheme with Keyword Search for Cloud Storage ...李俊達
    李正吉
    邱詩婷
    11Security Enhancement on An RFID Ownership Transfer Protocol Based on Cloud李俊達
    Cheng-Chi Lee
    Shun-Der Chen
    Chung-Lun Cheng
    Yan-Ming Lai
    12An efficient online/offline ID-based short signature procedure using extended chaotic maps李俊達
    Chandrashekhar Meshram
    Sarita Gajbhiye Meshram
    13... Provably Secure Group Key Agreement Scheme with Privacy Preservation for Online Social Networks ...李俊達
    Tsu-Yang Wu
    Chien-Ming Chen
    14Robot Identification and Authentication in a Robot Cloud Service System李俊達
    Chin-Ling Chen
    Yan-Ting Li
    Yong-Yuan Deng
    15A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System李俊達
    李正吉
    陳致瑋
    賴彥銘
    16An Improved Group Key Agreement Scheme with Privacy Preserving Based on Chaotic Maps李俊達
    翁麒耀
    陳建銘
    李正吉
    17Eavesdropping Detection based on Power-Comparisons to Reconfigure Signature Keys in Optical Coding A陳見生
    楊朝欽
    Kai-Chun Lin
    黃振發
    18Cloud-Assisted Mutual Authentication and Privacy Preservation Protocol for Telecare Medical Informat李俊達
    施東河
    王浚丞
    19A Novel Three-party Password-based Authenticated Key Exchange Protocol with User Anonymity Based on李俊達
    陳金鈴
    李正吉
    翁麒耀
    陳建銘
    20A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things ...李俊達
    李正吉
    翁麒耀
  • 排序:   重新排序