| 2025-12 |
A Secure Sharing Framework for Time-Sensitive Personal Health Records Based on FHIR, IPFS, and Consortium Blockchain |
conference |
說明頁(28) |
| 2025-12 |
COMPASS: A Compact PASS-Lineage Accumulator with Succinct Proofs |
conference |
說明頁(34) |
| 2025-12 |
Design of a Secure Cryptographic Protocol for Digital Evidence Chain for Intelligent Transportation Systems with Internet of Medical Things |
conference |
說明頁(30) |
| 2025-12 |
A Layered Trust Architecture for Global Healthcare Services: Integrating WHO and EU Digital Identity Frameworks |
conference |
說明頁(30) |
| 2025-11 |
A Study on Metaverse Identity Authentication Design Based on FIDO and Kerberos |
conference |
說明頁(35) |
| 2024-12 |
Quantum-Resistant Updatable Public Keys: Enhancing the Quisquis Protocol with LWE-Based Security |
conference |
說明頁(74) |
| 2023-11 |
基於ECDH和短簽名的群組密鑰機制之分析與改良 |
conference |
pdf(3) |
| 2022-08 |
Quantum-resistant 1-out-of-N Oblivious Signatures from Lattices |
conference |
說明頁(568) |
| 2022-05 |
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation |
conference |
說明頁(648) |
| 2021-02 |
Partially Blind ECDSA Scheme and Its Application to Bitcoin |
conference |
pdf(738) |
| 2020-10 |
Defense against N-pixel Attacks based on Image Reconstruction |
conference |
pdf(617) |
| 2020-08 |
An Enhanced Mondrian Anonymization Model based on Self-Organizing Map |
conference |
pdf(563) |
| 2020-08 |
A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism |
conference |
pdf(658) |
| 2020-08 |
Multi-value Private Information Retrieval using Homomorphic Encryption |
conference |
pdf(632) |
| 2020-07 |
Practical Predicate Encryption for Inner Product |
conference |
pdf(703) |
| 2019-04 |
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications |
conference |
pdf(630) |
| 2018-02 |
Policy-Controlled Signature from NTRU Lattice |
conference |
說明頁(728) |
| 2017-08 |
A survey of secret sharing schemes based on Latin squares |
conference |
說明頁(1120) |
| 2017-05 |
An off-line mobile payment protocol providing double-spending detection |
conference |
說明頁(1239) |
| 2016-12 |
NFC-based Mobile Payment Protocol with User Anonymity |
conference |
說明頁(1029) |
| 2016-10 |
Security analysis of a NTRU-based mutual authentication scheme |
conference |
說明頁(970) |
| 2016 |
Two-in-one oblivious signatures secure in the random oracle model |
conference |
pdf(890) |
| 2015-12 |
An empirical comparison between kelly criterion and vince`s optimal F |
conference |
說明頁(943) |
| 2015-08 |
An adaptive Kelly betting strategy for finite repeated games |
conference |
pdf(835) |
| 2015-08 |
Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments |
conference |
pdf(764) |