Search

Your search keyword '"Yuh-Min Tseng"' showing total 181 results

Search Constraints

Start Over You searched for: Author "Yuh-Min Tseng" Remove constraint Author: "Yuh-Min Tseng"
181 results on '"Yuh-Min Tseng"'

Search Results

151. Partially Blind Threshold Signature Based on RSA

152. Authenticated encryption schemes with message linkages for message flows

153. A unified approach to secret sharing schemes with low distribution cost

154. An Efficient and Practical Solution to Remote Authentication: Smart Card

155. Efficient anonymous multi-receiver ID-based encryption with constant decryption cost

156. Cryptanalysis of Chang–Wu's group-oriented authentication and key exchange protocols

157. Cryptanalysis of Liaw's broadcasting Cryptosystem

158. A modified remote login authentication scheme based on geometric approach

159. An efficient group‐oriented (t,n) threshold signature scheme with message linkage

160. Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks

161. A scheme and concept for limited inheritance of privileges in a user hierarchy

162. Revocable ID-based Signature Scheme with Batch Verifications

163. CCA-secure Anonymous Multi-receiver ID-based Encryption

164. An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.

165. An efficient authentication protocol for integrating WLAN and cellular networks

166. New digital signature with subliminal channels based on the discrete logarithm problem

167. ID-based cryptographic schemes using a non-interactive public-key distribution system

168. RSA-based partially blind signature with low computation

169. GPRS∕UMTS-aided authentication protocol for wireless LANs

171. On the Security of an Efficient ID-based Partially Blind Signature Scheme.

172. Cryptanalysis on dynamic authentication protocol for personal communication system

173. Impersonation attack on Tan-Zhu's remote login scheme

174. Comment: Security of digital signature with one-time pair of keys

175. Weakness in simple authenticated key agreement protocol

176. Comment: Improved group signature scheme based on discrete logarithm problem

177. Improved group signature scheme based on discrete logarithm problem

179. Two integrated schemes of user authentication and access control in a distributed computer network

180. Improvement of Chikazawa-Yamagishi ID-based key sharing system

181. Forgery Attacks on an ID-based Partially Blind Signature Scheme.

Catalog

Books, media, physical & digital resources