教學課程
資訊保密與安全 (東海2006. 9月)
上一頁
日期授課內容
2005-11-162005_Security Analysis and Improvement of the Efficient Password-based.ppt
2005-11-16Further cryptanalysis of fingerprint-based remote user authentication scheme.ppt
2005-11-16Remarks on a new key authentication scheme based on discrete logarithms.ppt
2005-11-232_A new efficient (t,n) verifiable.ppt
2005-11-23A new efficient (t,n) verifiable.ppt
2005-11-23Cryptanalysis of Lee-Lee authenticated key agreement scheme.ppt
2005-11-23Improving Lamport One-time Signature Scheme.ppt
2005-11-302005-11-30_Efficient three-party key exchange using smart cards.ppt
2005-11-302_Improvement of Fan et al
2005-11-30Improvement of Fan et al
2005-11-30Newest.ppt
2005-11-30Provably secure three-party password-based authenticated key exchange protocol.ppt
2005-11-9An improvement on efficient anonymous auction protocols.ppt
2005-11-9Breaking an Improved Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks.ppt
2005-11-9Identity oriented signature scheme based on quadratic residues.ppt
2005-12-141.ppt
2005-12-14An efficient threshold RSA digital signature scheme.ppt
2005-12-14Security of Hsu-Wu.ppt
2005-12-21OSPA.ppt
2005-12-21Security of a multisignature scheme for specified group.ppt
2005-12-28Authenticated Diffie-Hellman key agreement protocol using a single cryptographic assumption.ppt
2005-12-28Improvement of efficient proxy signature schemes using self-certified1.ppt
2005-12-28Security of conference key distribution system.ppt
2005-12-72005-12-05 Cryptanalysis of Li-Tzeng-Hwang
2005-12-7Cryptanalysis of and improvement.ppt
2005-12-7Improvement of Chien et alls remote user authentication scheme using smart cards.ppt
2005-2-1chapter4(signature).ppt
2005-2-1chapter7.ppt
2005-9-282_Chapter5.ppt
2005-9-28Chapter 6.ppt
2005-9-28Chapter3.rar
2005-9-28chapter1-1.ppt
2005-9-28chapter2.ppt
2006-1-3Analysis of Host Authentication Mechanism in Current POD Copy Protection System.ppt
2006-11-10Design of a fair proxy raffle protocol on the Internet.ppt
2006-11-10paper list.doc
2006-11-1520061115-A traceable threshold signature scheme with multiple signing policies.ppt
2006-11-15Efficient verifier-based key agreement protocol for three parties without server
2006-11-15Efficient verifier-based key agreement protocol for three parties.ppt
2006-11-15KieuTheDuc2.ppt
2006-11-221.ppt
2006-11-222_Efficient fair digital-signature exchange based on misbehaviour penalisation.ppt
2006-11-222_Weakness and Solution of Yang et al
2006-11-22Efficient fair digital-signature exchange based on misbehaviour penalisation.ppt
2006-11-22Security.ppt
2006-11-22T7.ppt
2006-11-22Weakness and Solution of Yang et al
2006-11-29A new ring signature scheme with signer-admission property.ppt
2006-11-29Offline.ppt
2006-11-29Security(NEW).ppt
2006-11-29Security.ppt
2006-11-8paper list.doc
2006-12-13Cryptanalysis of Lee-Kim-Yoo password-based key agreement scheme.ppt
2006-12-13Cryptanalysis of the improved authenticated key agreement protocol.ppt
2006-12-13Cryptanalysis of tripartite and multi-party authenticated.ppt
2006-12-16An improved signature scheme.ppt
2006-12-20A novel proxy key generation protocol and its application.ppt
2006-12-20A secure on-line software transaction scheme.ppt
2006-12-27An ID-Based Broadcast Encryption Scheme for Key Distribution(pengyuan).ppt
2006-12-27An ID-Based Broadcast Encryption Scheme for Key Distribution.ppt
2006-12-27Cryptanalysis of the End-to-End Security Protocol.ppt
2006-12-27Identity-based deniable authentication protocol.PPTX
2006-12-62_Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.ppt
2006-12-6An improved signature scheme(update).ppt
2006-12-6Breaking a Remote User Authentication Scheme for Multi-Server Architecture.ppt
2006-12-6Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.ppt
2006-2-1Cryptanalysis and improvement on batch verifying multiple RSA digital signatures.ppt
2006-9-26chapter2.ppt
2006-9-26chapter3-2.ppt
2006-9-26chapter4(signature).ppt
2006-9-26chapter5.ppt
2006-9-26chapter6.ppt
2006-9-26chapter7.ppt
2006-9-27chapter1.ppt
2006-9-27chapter3-1.ppt
2007-1-3A Weakness in the.pdf
2007-1-3Analysis of Host Authentication Mechanism in Current POD Copy Protection System.ppt
2007-1-3Cryptanalysis of a Suite of Deniable Authentication Protocols.ppt
2007-1-3Dynamic security analysis of group key agreement protocol.ppt