Browsing by Author 左瑞麟


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 25 to 44 of 128 < previous   next >
DateTitleAuthor(s)
1-Oct-2018ECQV自簽名憑證及其延伸應用之研究蘇勤文; Su, Ching-Wen
27-May-2010Efficient and Short Certificateless Signature左瑞麟
7-Aug-2014Efficient and short certificateless signatures secure against realistic adversaries左瑞麟; Tso,Raylin; Huang,Xinyi; Yi,Xun
27-May-2010Efficient convertible limited verifier signatures左瑞麟
10-Aug-2017Efficient public key encryption with user-friendly keywords search for searchable cloud storage左瑞麟; Chen, Kuo-Chang; Chen, Yu-Chi; Horng, Gwoboa; Tso, Raylin
26-Oct-2018Efficient quantum secret sharing based on special multi-dimensional GHZ stateQin, Huawang; Tso, Raylin; 左瑞麟
27-May-2010Efficient Short Signatures from Pairing左瑞麟
9-Aug-2017An empirical comparison between kelly criterion and vince`s optimal F左瑞麟; Wu, M.-E.; Wang, C.-H.; Chung, W.-H.; Tso, Raylin; Yang, I.-H.
26-Oct-2018Establishing rational networking using the DL04 quantum secure direct communication protocolQin, Huawang; Tang, Wallace K. S.; Tso, Raylin; 左瑞麟
10-Sep-2018Establishing rational networking using the DL04 quantum secure direct communication protocol.Tso, Raylin; 左瑞麟
23-Dec-2021Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing左瑞麟; Tso, Raylin; Huang, Kaibin; Chen, Yu-Chi; RAHMAN, SK MD MIZANUR; Wu, Tsu-Yang
25-Sep-2018High-capacity quantum secret sharing based on orbital angular momentumQin, Huawang;Tso, Raylin; 左瑞麟; Tso, Raylin
7-Aug-2014How to verify the threshold t of the Shamir’s (t,n)-threshold scheme左瑞麟; Tso,Raylin;Miao,Ying;Takeshi Okamoto;Eiji Okamoto
19-Oct-2015ID-based group password-authenticated key exchangeYi, X.;Tso, Ray Lin; 左瑞麟
10-Apr-2015Identity-based password-authenticated key exchange for client/server modelYi, X.;Tso, Ray-Lin;Okamoto, E.; 左瑞麟
8-Aug-2017An improved visual cryptography with cheating prevention左瑞麟; Chen, Yu-Chi; Lu, Kunhan; Tso, Raylin; Wu, Mu-En
16-Aug-2017An incremental algorithm for maintaining the built FUSP trees based on the pre-large concepts左瑞麟; Lin, Chun-Wei
23-Dec-2021Intelligence-led response: turning theory into law enforcement practice in cyber security incidents左瑞麟; Tso, Raylin; Kao, Da-Yu; Hsiao, Shou-Ching
2-Nov-2015ISMS與PIMS整合導入之研究 -以國防部全球資訊網站系統為例孫天貴; Sun, Tien Kuei
10-Apr-2015Message from UIPM-12 workshop chairsWang, S.-J.;Kwak, J.;Liu, J.;Wang, W.-J.;Desell, T.;Su, P.-C.;Chang, C.-L.;Chen, C.-C.;Chen, Y.-L.;Cheng, H.-Y.;Huang, C.-W.;Kumar, S.;Huang, L.;Huang, S.-H.;Kim, C.;Kim, C.;Kim, J.W.;Sheu, R.-K.;Song, H.;Tsai, M.-F.;Tso, H.-K.;Tso, Ray-Lin;Varela, C.A.;Yang, C.-H.;Yu, C.-C.;Yuan, S.-M.; 左瑞麟