Ku Wei-chi | Department Of Computer Science And Information Engineering Fu Jen Catholic University
スポンサーリンク
概要
- KU Wei-Chiの詳細を見る
- 同名の論文著者
- Department Of Computer Science And Information Engineering Fu Jen Catholic Universityの論文著者
関連著者
-
Ku Wei-chi
Department Of Computer Science And Information Engineering Fu Jen Catholic University
-
Chiang Min-hung
Department Of Computer Science And Information Engineering Fu Jen Catholic University
-
Chen C‐m
National Sun Yat‐set Univ. Kaohsiung Twn
-
Lee Hui-lung
Department Of Computer Science And Information Engineering Fu Jen Catholic University
-
KU Wei-Chi
Department of Computer Science and Information Engineering, Fu Jen Catholic University
-
CHEN Chien-Ming
Department of Computer Science and Information Engineering, Fu Jen Catholic University
-
Ku W‐c
Department Of Computer Science And Information Engineering Fu Jen Catholic University
-
Tsaur Maw-jinn
Graduate Institute Of Applied Science And Engineering Fu Jen Catholic University
-
CHUANG Hsiu-Mei
Department of Computer Science and Information Engineering, Fu Jen Catholic University
-
Chuang Hsiu-mei
Department Of Computer Science And Information Engineering Fu Jen Catholic University
-
Tsai Hao-chuan
Department Of Computer Science And Information Engineering Fu Jen Catholic University
-
TSAUR Maw-Jinn
Graduate Institute of Applied Science and Engineering, Fu Jen Catholic University
-
CHANG Shen-Tien
Department of Computer Science and Information Engineering, Fu Jen Catholic University
-
CHIANG Min-Hung
Department of Computer Science and Information Engineering, Fu Jen Catholic University
-
Chang Shen-tien
Department Of Computer Science And Information Engineering Fu Jen Catholic University
-
Chiang Min‐hung
Fu Jen Catholic Univ. Taipei Twn
-
Chuang Hsiu‐mei
Department Of Computer Science And Information Engineering Fu Jen Catholic University
著作論文
- Reflection Attack on a Generalized Key Agreement and Password Authentication Protocol(Fundamental Theories)
- Cryptanalysis of a Variant of Peyravian-Zunic's Password Authentication Scheme (Fundamental Theories)
- Stolen-Verifier Attack on an Efficient Smartcard-Based One-Time Password Authentication Scheme(Fundamental Theories)
- Weaknesses of a Remote User Authentication Scheme Using Smart Cards for Multi-Server Architecture(Fundamental Theories for Communications)
- Vulnerabilities of Wu-Chieu's Improved Password Authentication Scheme Using Smart Cards(Information Security)
- Cryptanalysis of a Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards(Information Security)
- Weaknesses of Two SAS-Like Password Authentication Schemes(Fundamental Theories for Communications)