Chang C‐c | National Chung Cheng Univ. Chiayi Twn
スポンサーリンク
概要
関連著者
-
Chang C‐c
National Chung Cheng Univ. Chiayi Twn
-
Hwang Shin-jia
Institute Of Computer And Information Science National Chiao Tung University
-
Hwang S‐j
The Department Of Information Management Chaoyang University Of Technology Wufeng
-
Yang W‐p
National Chiao Tung Univ. Hsinchu Twn
-
Wang C‐t
National Chin‐yi Inst. Of Technol. Taichung Twn
-
CHANG Chin-Chen
Institute of Computer Science and Information Engineering, National Chung Cheng University
-
Lin Chu-hsing
The Author Is With The Department Of Computer And Information Sciences Tunghai University
-
Yang Wei-pang
Institute Of Computer And Information Science National Chiao Tung University
-
Chang Chin-chen
Institute Of Computer Science And Information Engineering National Chung Cheng University
-
WANG Ching-Te
The author is with Center of General Education, National Chin-Yi Institute of Technology, Taichung
-
CHANG Chin-Chen
The author is with the Department of Computer Science and Information Engineering, National Chung Ch
-
LIN Chu-Hsing
The author is with the Department of Computer and Information Sciences, Tunghai University
-
WANG Ching-Te
Institute of Computer Science and Information Engineering, National Chung Cheng University
-
LIN Chu-Hsing
Department of Computer and Information Sciences, Tunghai University
-
Wang Ching-te
The Author Is With Center Of General Education National Chin-yi Institute Of Technology Taichung
-
CHANG Chin-Chen
the Institute of Computer Science and Information Engineering, National Chung Cheng University
-
HWANG Shin-Jia
the Institute of Computer and Information Science National Chiao Tung University
-
YANG Wei-Pang
the Institute of Computer and Information Science National Chiao Tung University
-
Chang Chin-chen
The Author Is With The Department Of Computer Science And Information Engineering National Chung Che
-
Chang Chin-chen
The Institute Of Computer Science And Information Engineering National Chung Cheng University
著作論文
- Generalization of Threshold Signature and Authenticated Encryption for Group Communications
- Conference Key Supervision in a Level-Based Hierarchy
- Two Efficient Server-Aided RSA Secret Computation Protocols Against Active Attacks
- An Efficient Dynamic Threshold Scheme