-
1مؤتمر
المؤلفون: Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen
المصدر: 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers) Advanced information networking and applications Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on. 1:585-590 vol.1 2005
Relation: Proceedings. 19th International Conference on Advanced Information Networking and Applications
-
2مؤتمر
المؤلفون: Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen
المصدر: Proceedings 1998 International Conference on Parallel and Distributed Systems (Cat. No.98TB100250) Parallel and distributed systems Parallel and Distributed Systems, 1998. Proceedings. 1998 International Conference on. :469-477 1998
Relation: Proceedings of ICPADS'98 - International Conference on Parallel and Distributed Systems
-
3دورية أكاديمية
المؤلفون: Chin-Ching Chiu, Chung-Hsien Hsu, Yi-Shiung Yeh
المصدر: IEEE Transactions on Reliability IEEE Trans. Rel. Reliability, IEEE Transactions on. 55(1):105-117 Mar, 2006
-
4دورية أكاديمية
المؤلفون: I-Te Chen, Yi-Shiung Yeh
المصدر: IEEE Signal Processing Letters IEEE Signal Process. Lett. Signal Processing Letters, IEEE. 13(4):213-215 Apr, 2006
-
5
المؤلفون: Yi-Shiung Yeh, Chen-Yu Lee, Deng-Jyi Chen, Chu-Hsing Lin
المصدر: International Journal of Advancements in Computing Technology. 4:41-52
مصطلحات موضوعية: Discrete mathematics, Secure Hash Algorithm, Secure Hash Standard, General Computer Science, Computer science, SHA-2, Hash function, Hash buster, Hash chain, Rolling hash, Double hashing
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::1a4b26512d438edada634065556e26e3
https://doi.org/10.4156/ijact.vol4.issue7.5 -
6
المؤلفون: Han-Yu Lin, Yi-Shiung Yeh, Shih-Kun Huang, Tzong-Sun Wu
المصدر: Computers & Mathematics with Applications. 60(7):1850-1858
مصطلحات موضوعية: Delegate, Signcryption, Bilinear pairing, business.industry, Computer science, Warrant, Plaintext, Public key encryption, Computer security, computer.software_genre, Proxy, Random oracle, Public-key cryptography, Computational Mathematics, Computational Theory and Mathematics, Modeling and Simulation, Modelling and Simulation, Confidentiality, business, Proxy (statistics), Database transaction, computer
-
7
المؤلفون: Chuan-Chi Wang, Min-Chih Kao, Yi-Shiung Yeh
المصدر: Journal of Discrete Mathematical Sciences and Cryptography. 11:385-391
مصطلحات موضوعية: Algebra and Number Theory, Theoretical computer science, Computer science, business.industry, Applied Mathematics, Padding oracle attack, Data_CODINGANDINFORMATIONTHEORY, Encryption, Padding, Symmetric-key algorithm, Information leakage, business, Algorithm, Analysis, Optimal asymmetric encryption padding, Residual block termination, Block cipher
-
8
المؤلفون: Wei-Shen Lai, Min-Chih Kao, Yi-Shiung Yeh
المصدر: Journal of Discrete Mathematical Sciences and Cryptography. 11:375-384
مصطلحات موضوعية: Algebra and Number Theory, business.industry, Applied Mathematics, Authorization, E-commerce, Computer security, computer.software_genre, Signature (logic), Dual (category theory), Set (abstract data type), Blind signature, business, computer, Analysis, Mathematics
-
9
المؤلفون: Shih-Chin Chou, Ting-Yu Huang, I-Te Chen, Yi-Shiung Yeh
المصدر: Journal of Discrete Mathematical Sciences and Cryptography. 10:1-7
مصطلحات موضوعية: Schedule, Algebra and Number Theory, Theoretical computer science, Computer science, business.industry, Applied Mathematics, Hash function, Cryptography, Collision, Computer security, computer.software_genre, MD5, SHA-2, SHA-1, Message authentication code, business, computer, Analysis
-
10
المؤلفون: Ting-Yu Huang, I-Te Chen, Yi-Shiung Yeh, Chan-Chi Wang
المصدر: Journal of Discrete Mathematical Sciences and Cryptography. 9:321-330
مصطلحات موضوعية: Algebra and Number Theory, Theoretical computer science, Differential cryptanalysis, business.industry, Applied Mathematics, Cryptography, Data_CODINGANDINFORMATIONTHEORY, Permutation, Differential (infinitesimal), Slide attack, business, Time complexity, Algorithm, Analysis, Key size, Mathematics, Block cipher