Browsing by Author 左瑞麟


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 21 to 40 of 128 < previous   next >
DateTitleAuthor(s)
9-Dec-2021Defense against N-pixel Attacks based on Image Reconstruction左瑞麟; Tso, Raylin; Liu, Zi-Yuan; Wang, Peter Shaojui; Hsiao, Shou-Ching
17-Apr-2015Design and analysis of &quot;flexible&quot; k-out-of-n signaturesTso, Ray-Lin;Yi, X.;Ito, T.;Okamoto, T.;Okamoto, E.; 左瑞麟
28-May-2015Design and implementation of digital forensic software for iPhoneChen, C.-N.;Tso, Ray-Lin;Yang, C.-H.; 左瑞麟
23-Dec-2021Designated-ciphertext searchable encryption左瑞麟; Tso, Raylin; Zi-YuanLiu; Yi-FanTseng; MasahiroMambo
1-Oct-2018ECQV自簽名憑證及其延伸應用之研究蘇勤文; Su, Ching-Wen
27-May-2010Efficient and Short Certificateless Signature左瑞麟
7-Aug-2014Efficient and short certificateless signatures secure against realistic adversaries左瑞麟; Tso,Raylin; Huang,Xinyi; Yi,Xun
27-May-2010Efficient convertible limited verifier signatures左瑞麟
10-Aug-2017Efficient public key encryption with user-friendly keywords search for searchable cloud storage左瑞麟; Chen, Kuo-Chang; Chen, Yu-Chi; Horng, Gwoboa; Tso, Raylin
26-Oct-2018Efficient quantum secret sharing based on special multi-dimensional GHZ stateQin, Huawang; Tso, Raylin; 左瑞麟
27-May-2010Efficient Short Signatures from Pairing左瑞麟
9-Aug-2017An empirical comparison between kelly criterion and vince`s optimal F左瑞麟; Wu, M.-E.; Wang, C.-H.; Chung, W.-H.; Tso, Raylin; Yang, I.-H.
26-Oct-2018Establishing rational networking using the DL04 quantum secure direct communication protocolQin, Huawang; Tang, Wallace K. S.; Tso, Raylin; 左瑞麟
10-Sep-2018Establishing rational networking using the DL04 quantum secure direct communication protocol.Tso, Raylin; 左瑞麟
23-Dec-2021Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing左瑞麟; Tso, Raylin; Huang, Kaibin; Chen, Yu-Chi; RAHMAN, SK MD MIZANUR; Wu, Tsu-Yang
25-Sep-2018High-capacity quantum secret sharing based on orbital angular momentumQin, Huawang;Tso, Raylin; 左瑞麟; Tso, Raylin
7-Aug-2014How to verify the threshold t of the Shamir’s (t,n)-threshold scheme左瑞麟; Tso,Raylin;Miao,Ying;Takeshi Okamoto;Eiji Okamoto
19-Oct-2015ID-based group password-authenticated key exchangeYi, X.;Tso, Ray Lin; 左瑞麟
10-Apr-2015Identity-based password-authenticated key exchange for client/server modelYi, X.;Tso, Ray-Lin;Okamoto, E.; 左瑞麟
8-Aug-2017An improved visual cryptography with cheating prevention左瑞麟; Chen, Yu-Chi; Lu, Kunhan; Tso, Raylin; Wu, Mu-En