Showing results 25 to 44 of 128
< previous
next >
Date | Title | Author(s) |
1-Oct-2018 | ECQV自簽名憑證及其延伸應用之研究 | 蘇勤文; Su, Ching-Wen |
27-May-2010 | Efficient and Short Certificateless Signature | 左瑞麟 |
7-Aug-2014 | Efficient and short certificateless signatures secure against realistic adversaries | 左瑞麟; Tso,Raylin; Huang,Xinyi; Yi,Xun |
27-May-2010 | Efficient convertible limited verifier signatures | 左瑞麟 |
10-Aug-2017 | Efficient public key encryption with user-friendly keywords search for searchable cloud storage | 左瑞麟; Chen, Kuo-Chang; Chen, Yu-Chi; Horng, Gwoboa; Tso, Raylin |
26-Oct-2018 | Efficient quantum secret sharing based on special multi-dimensional GHZ state | Qin, Huawang; Tso, Raylin; 左瑞麟 |
27-May-2010 | Efficient Short Signatures from Pairing | 左瑞麟 |
9-Aug-2017 | An empirical comparison between kelly criterion and vince`s optimal F | 左瑞麟; Wu, M.-E.; Wang, C.-H.; Chung, W.-H.; Tso, Raylin; Yang, I.-H. |
26-Oct-2018 | Establishing rational networking using the DL04 quantum secure direct communication protocol | Qin, Huawang; Tang, Wallace K. S.; Tso, Raylin; 左瑞麟 |
10-Sep-2018 | Establishing rational networking using the DL04 quantum secure direct communication protocol. | Tso, Raylin; 左瑞麟 |
23-Dec-2021 | Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing | 左瑞麟; Tso, Raylin; Huang, Kaibin; Chen, Yu-Chi; RAHMAN, SK MD MIZANUR; Wu, Tsu-Yang |
25-Sep-2018 | High-capacity quantum secret sharing based on orbital angular momentum | Qin, Huawang;Tso, Raylin; 左瑞麟; Tso, Raylin |
7-Aug-2014 | How to verify the threshold t of the Shamir’s (t,n)-threshold scheme | 左瑞麟; Tso,Raylin;Miao,Ying;Takeshi Okamoto;Eiji Okamoto |
19-Oct-2015 | ID-based group password-authenticated key exchange | Yi, X.;Tso, Ray Lin; 左瑞麟 |
10-Apr-2015 | Identity-based password-authenticated key exchange for client/server model | Yi, X.;Tso, Ray-Lin;Okamoto, E.; 左瑞麟 |
8-Aug-2017 | An improved visual cryptography with cheating prevention | 左瑞麟; Chen, Yu-Chi; Lu, Kunhan; Tso, Raylin; Wu, Mu-En |
16-Aug-2017 | An incremental algorithm for maintaining the built FUSP trees based on the pre-large concepts | 左瑞麟; Lin, Chun-Wei |
23-Dec-2021 | Intelligence-led response: turning theory into law enforcement practice in cyber security incidents | 左瑞麟; Tso, Raylin; Kao, Da-Yu; Hsiao, Shou-Ching |
2-Nov-2015 | ISMS與PIMS整合導入之研究 -以國防部全球資訊網站系統為例 | 孫天貴; Sun, Tien Kuei |
10-Apr-2015 | Message from UIPM-12 workshop chairs | Wang, S.-J.;Kwak, J.;Liu, J.;Wang, W.-J.;Desell, T.;Su, P.-C.;Chang, C.-L.;Chen, C.-C.;Chen, Y.-L.;Cheng, H.-Y.;Huang, C.-W.;Kumar, S.;Huang, L.;Huang, S.-H.;Kim, C.;Kim, C.;Kim, J.W.;Sheu, R.-K.;Song, H.;Tsai, M.-F.;Tso, H.-K.;Tso, Ray-Lin;Varela, C.A.;Yang, C.-H.;Yu, C.-C.;Yuan, S.-M.; 左瑞麟 |