Search

Your search keyword '"Jan, Jinn-Ke"' showing total 29 results

Search Constraints

Start Over You searched for: Author "Jan, Jinn-Ke" Remove constraint Author: "Jan, Jinn-Ke" Search Limiters Full Text Remove constraint Search Limiters: Full Text
29 results on '"Jan, Jinn-Ke"'

Search Results

2. A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping

7. A hybrid authentication protocol for large mobile network

8. Authenticated encryption schemes with message linkages for message flows

12. Cryptanalysis of log-in authentication based on circle property

13. A provable secure access control using smart cards

14. New hierarchical assignment without public key cryptography

15. An efficient and practical solution to remote authentication: smart card

16. The UMTS-AKA Protocols for Intelligent Transportation Systems

17. Forgery attacks on 'multisignature schemes for authenticating mobile code delegates'

28. On the Security of Methods for Protecting Password Transmission

29. A scheme and concept for limited inheritance of privileges in a user hierarchy.

Catalog

Books, media, physical & digital resources