教學課程
資訊保密與安全 (東海2006. 9月)
上一頁
日期
授課內容
2005-11-16
2005_Security Analysis and Improvement of the Efficient Password-based.ppt
2005-11-16
Further cryptanalysis of fingerprint-based remote user authentication scheme.ppt
2005-11-16
Remarks on a new key authentication scheme based on discrete logarithms.ppt
2005-11-23
2_A new efficient (t,n) verifiable.ppt
2005-11-23
A new efficient (t,n) verifiable.ppt
2005-11-23
Cryptanalysis of Lee-Lee authenticated key agreement scheme.ppt
2005-11-23
Improving Lamport One-time Signature Scheme.ppt
2005-11-30
2005-11-30_Efficient three-party key exchange using smart cards.ppt
2005-11-30
2_Improvement of Fan et al
2005-11-30
Improvement of Fan et al
2005-11-30
Newest.ppt
2005-11-30
Provably secure three-party password-based authenticated key exchange protocol.ppt
2005-11-9
An improvement on efficient anonymous auction protocols.ppt
2005-11-9
Breaking an Improved Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks.ppt
2005-11-9
Identity oriented signature scheme based on quadratic residues.ppt
2005-12-14
1.ppt
2005-12-14
An efficient threshold RSA digital signature scheme.ppt
2005-12-14
Security of Hsu-Wu.ppt
2005-12-21
OSPA.ppt
2005-12-21
Security of a multisignature scheme for specified group.ppt
2005-12-28
Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption.ppt
2005-12-28
Improvement of efficient proxy signature schemes using self-certified1.ppt
2005-12-28
Security of conference key distribution system.ppt
2005-12-7
2005-12-05 Cryptanalysis of Li-Tzeng-Hwang
2005-12-7
Cryptanalysis of and improvement.ppt
2005-12-7
Improvement of Chien et alls remote user authentication scheme using smart cards.ppt
2005-2-1
chapter4(signature).ppt
2005-2-1
chapter7.ppt
2005-9-28
2_Chapter5.ppt
2005-9-28
Chapter 6.ppt
2005-9-28
Chapter3.rar
2005-9-28
chapter1-1.ppt
2005-9-28
chapter2.ppt
2006-1-3
Analysis of Host Authentication Mechanism in Current POD Copy Protection System.ppt
2006-11-10
Design of a fair proxy raffle protocol on the Internet.ppt
2006-11-10
paper list.doc
2006-11-15
20061115-A traceable threshold signature scheme with multiple signing policies.ppt
2006-11-15
Efficient verifier-based key agreement protocol for three parties without server
2006-11-15
Efficient verifier-based key agreement protocol for three parties.ppt
2006-11-15
KieuTheDuc2.ppt
2006-11-22
1.ppt
2006-11-22
2_Efficient fair digital-signature exchange based on misbehaviour penalisation.ppt
2006-11-22
2_Weakness and Solution of Yang et al
2006-11-22
Efficient fair digital-signature exchange based on misbehaviour penalisation.ppt
2006-11-22
Security.ppt
2006-11-22
T7.ppt
2006-11-22
Weakness and Solution of Yang et al
2006-11-29
A new ring signature scheme with signer-admission property.ppt
2006-11-29
Offline.ppt
2006-11-29
Security(NEW).ppt
2006-11-29
Security.ppt
2006-11-8
paper list.doc
2006-12-13
Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme.ppt
2006-12-13
Cryptanalysis of the improved authenticated key agreement protocol.ppt
2006-12-13
Cryptanalysis of tripartite and multi-party authenticated.ppt
2006-12-16
An improved signature scheme.ppt
2006-12-20
A novel proxy key generation protocol and its application.ppt
2006-12-20
A secure on-line software transaction scheme.ppt
2006-12-27
An ID-Based Broadcast Encryption Scheme for Key Distribution(pengyuan).ppt
2006-12-27
An ID-Based Broadcast Encryption Scheme for Key Distribution.ppt
2006-12-27
Cryptanalysis of the End-to-End Security Protocol.ppt
2006-12-27
Identity-based deniable authentication protocol.PPTX
2006-12-6
2_Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.ppt
2006-12-6
An improved signature scheme(update).ppt
2006-12-6
Breaking a Remote User Authentication Scheme for Multi-Server Architecture.ppt
2006-12-6
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.ppt
2006-2-1
Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.ppt
2006-9-26
chapter2.ppt
2006-9-26
chapter3-2.ppt
2006-9-26
chapter4(signature).ppt
2006-9-26
chapter5.ppt
2006-9-26
chapter6.ppt
2006-9-26
chapter7.ppt
2006-9-27
chapter1.ppt
2006-9-27
chapter3-1.ppt
2007-1-3
A Weakness in the.pdf
2007-1-3
Analysis of Host Authentication Mechanism in Current POD Copy Protection System.ppt
2007-1-3
Cryptanalysis of a Suite of Deniable Authentication Protocols.ppt
2007-1-3
Dynamic security analysis of group key agreement protocol.ppt