241 |
100-2
|
會議論文
|
Security Flaws in Zhang and Xu Improved Concurrent Signature Scheme
|
242 |
100-2
|
會議論文
|
Comments on Micorpayment Schemes for Multi-Merchants with Anonymity and Untraceability
|
243 |
99-2
|
期刊論文
|
A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity
|
244 |
98-2
|
獲獎榮譽
|
第二十屆資訊安全會議最佳論文獎候選
|
245 |
97-2
|
獲獎榮譽
|
第十九屆資訊安全會議最佳論文佳作獎
|
246 |
98-1
|
獲獎榮譽
|
2009 National Computer Symposium, 最佳學生論文獎
|
247 |
99-1
|
論文指導
|
資工二碩士班 向胤澤
|
248 |
99-1
|
論文指導
|
資工二碩士班 紀仁富
|
249 |
99-1
|
論文指導
|
資工二碩士班 盧承毅
|
250 |
100-1
|
論文指導
|
資網二碩士班 陳冠良
|
251 |
100-1
|
論文指導
|
資網二碩士班 游政翰
|
252 |
85-2
|
會議論文
|
A time-stamped password authentication system
|
253 |
100-1
|
會議論文
|
A simple secret key distribution system
|
254 |
88-2
|
會議論文
|
A simple multi-proxy signature scheme
|
255 |
97-1
|
會議論文
|
A Secure Dynamic Conference Scheme with Anonymity for Mobile Communications
|
256 |
98-1
|
會議論文
|
A Ring Signature Scheme with Strong Designated Verifiers to Provide Singer Anonymity
|
257 |
89-1
|
會議論文
|
A proxy signature scheme without using one-way hash functions
|
258 |
93-2
|
會議論文
|
A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection
|
259 |
97-1
|
會議論文
|
A Practical Anonymous Proxy Signature Scheme without Trusted Alias Issuing Authority
|
260 |
96-2
|
會議論文
|
A Practical Anonymous Proxy Signature Scheme with Trusted Alias Issuing Authority
|
261 |
83-1
|
會議論文
|
A new verification mechanism on the server-aided secret computation protocols for the modular exponentiation
|
262 |
89-2
|
會議論文
|
A New ID-Based Public Key Cryptosystem
|
263 |
98-1
|
會議論文
|
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks
|
264 |
80-1
|
會議論文
|
英漢字典壓縮研究
|
265 |
88-2
|
會議論文
|
The security analysis of two authenticated key agreement schemes
|
266 |
85-1
|
會議論文
|
The key distribution protocol for mobile communication systems with untrusted centers
|
267 |
88-1
|
會議論文
|
Specifiable proxy signature schemes
|
268 |
83-2
|
會議論文
|
Some active attacks on fast server-aided secret computation protocols for modular exponentiation
|
269 |
80-2
|
會議論文
|
Sharing a dynamic secret
|
270 |
80-1
|
會議論文
|
On the design of image databases for concurrent spatial match retrieval
|