-
81
المؤلفون: Ching-Nung Yang, Yu-qing Zhang, Lein Harn, Yanxiao Liu
المصدر: Journal of Systems and Software. 85:1325-1332
مصطلحات موضوعية: Discrete mathematics, Hardware and Architecture, Computer science, Feature (computer vision), Homomorphism, Verifiable secret sharing, Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION, Algorithm, Secret sharing, Software, Information Systems
-
82
المؤلفون: Hsiang-Wen Shih, Ching-Nung Yang, Lein Harn, Chih-Cheng Wu
المصدر: IEEE Transactions on Circuits and Systems for Video Technology. 22:799-810
مصطلحات موضوعية: Discrete mathematics, Authentication, Theoretical computer science, business.industry, Cryptography, Iterative reconstruction, Secret sharing, Visual cryptography, Image (mathematics), Scheme (mathematics), Shadow, Media Technology, Electrical and Electronic Engineering, business, Mathematics
-
83
المؤلفون: Ching-Nung Yang, Lein Harn, Jin-Fwu Ouyang
المصدر: Optics Communications. 285:1725-1735
مصطلحات موضوعية: Scheme (programming language), Authentication, Polynomial, Cover (telecommunications), Steganography, Computer science, business.industry, ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION, Image sharing, Data_CODINGANDINFORMATIONTHEORY, Atomic and Molecular Physics, and Optics, Electronic, Optical and Magnetic Materials, Image (mathematics), Optics, Electrical and Electronic Engineering, Physical and Theoretical Chemistry, Arithmetic, business, computer, Parity bit, computer.programming_language
-
84
المؤلفون: Lein Harn, Chin-Chen Chang, Changlu Lin, Chia-Yin Lee
المصدر: The Computer Journal. 54:1688-1699
مصطلحات موضوعية: Protocol (science), Correctness, General Computer Science, business.industry, Computer science, Cryptography, Computer security, computer.software_genre, Deniable encryption, Secure communication, Message authentication code, Confidentiality, Communication source, business, computer
-
85
المصدر: IEEE Transactions on Wireless Communications. 10:2372-2379
مصطلحات موضوعية: Key establishment, Public key certificate, Computer science, Security token, Self-signed certificate, Computer security, computer.software_genre, law.invention, Public-key cryptography, Certificate signing request, Digital signature, law, Certificate authority, Electrical and Electronic Engineering, Key management, Authentication, business.industry, Certificate policy, Applied Mathematics, Public key infrastructure, Cryptographic protocol, Computer Science Applications, Authorization certificate, Root certificate, Discrete logarithm, business, Cryptanalysis, computer, Implicit certificate, Computer network
-
86
المؤلفون: Chu-Hsing Lin, Lein Harn
المصدر: Computers & Electrical Engineering. 37:169-173
مصطلحات موضوعية: General Computer Science, business.industry, Cryptography, ElGamal signature scheme, Computer security, computer.software_genre, Signature (logic), Digital signature, Ring signature, Control and Systems Engineering, Discrete logarithm, Blind signature, Electrical and Electronic Engineering, business, computer, Schnorr signature, Computer Science::Cryptography and Security, Mathematics
-
87
المؤلفون: Chin-Chen Chang, Chia-Yin Lee, Lein Harn, Zhi-Hui Wang
المصدر: IEICE Transactions on Information and Systems. :2069-2076
مصطلحات موضوعية: Key-agreement protocol, Key generation, Computer science, Key distribution, Oakley protocol, Computer security, computer.software_genre, Secret sharing, Key authentication, Diffie–Hellman key exchange, Artificial Intelligence, Hardware and Architecture, Session key, Computer Vision and Pattern Recognition, Pre-shared key, Electrical and Electronic Engineering, Group Domain of Interpretation, computer, Software, Group key
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::baff43eae4a5ac1b24a4cb8ba84298b9
https://doi.org/10.1587/transinf.e94.d.2069 -
88
المؤلفون: Changlu Lin, Lein Harn
المصدر: Information Sciences. 180:3059-3064
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Scheme (programming language), Discrete mathematics, Homomorphic secret sharing, Information Systems and Management, Theoretical computer science, Proactive secret sharing, Secret sharing, Computer Science Applications, Theoretical Computer Science, Shamir's Secret Sharing, Artificial Intelligence, Control and Systems Engineering, Secure multi-party computation, Verifiable secret sharing, Hardware_REGISTER-TRANSFER-LEVELIMPLEMENTATION, computer, Software, Formal description, Mathematics, computer.programming_language
-
89
المؤلفون: Wen-Jung Hsin, Changlu Lin, Lein Harn
المصدر: The Computer Journal. 53:1478-1484
مصطلحات موضوعية: Theoretical computer science, General Computer Science, Collision attack, Merkle signature scheme, Ring signature, Computer science, SHA-2, Hash function, Hash chain, Trapdoor function, Data_CODINGANDINFORMATIONTHEORY, Double hashing
-
90
المؤلفون: Lein Harn, Jian Ren, Changlu Lin
المصدر: Journal of Systems and Software. 82:789-793
مصطلحات موضوعية: Provable security, Public key certificate, Merkle signature scheme, Computer science, business.industry, ElGamal signature scheme, Computer security, computer.software_genre, Random oracle, Public-key cryptography, Ring signature, Digital signature, Hardware and Architecture, Discrete logarithm, Blind signature, Cryptosystem, business, Threshold cryptosystem, computer, Software, Key escrow, Schnorr signature, Information Systems, Computer network