X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (38) 38
security (20) 20
physics (14) 14
computer science, information systems (13) 13
digital signature (12) 12
engineering, electrical & electronic (11) 11
calculating (9) 9
computer science, hardware & architecture (9) 9
computing (9) 9
counting (9) 9
cryptanalysis (9) 9
access control (8) 8
authentication (6) 6
computer science, software engineering (6) 6
electric digital data processing (6) 6
human necessities (6) 6
mathematics, applied (6) 6
telecommunications (6) 6
digital signatures (5) 5
servers (5) 5
untraceability (5) 5
user authentication (5) 5
blind signature (4) 4
electric communication technique (4) 4
electricity (4) 4
electronics (4) 4
information security (4) 4
lagrange interpolating polynomial (4) 4
performing operations (4) 4
protocol (4) 4
protocols (4) 4
research (4) 4
smart card (4) 4
subliminal channel (4) 4
transporting (4) 4
密碼學 (4) 4
computer science, interdisciplinary applications (3) 3
computer science, theory & methods (3) 3
data processing systems or methods, specially adapted foradministrative, commercial, financial, managerial, supervisoryor forecasting purposes (3) 3
encryption (3) 3
hygiene (3) 3
internet (3) 3
medical or veterinary science (3) 3
physics, mathematical (3) 3
protection (3) 3
scheme (3) 3
signalling (3) 3
systems or methods specially adapted for administrative,commercial, financial, managerial, supervisory or forecastingpurposes, not otherwise provided for (3) 3
user hierarchy (3) 3
access structure (2) 2
aeroplanes (2) 2
aircraft (2) 2
alarm systems (2) 2
armour (2) 2
armoured or armed vehicles (2) 2
armoured turrets (2) 2
astronomy & astrophysics (2) 2
aviation (2) 2
blasting (2) 2
cloud computing (2) 2
computer network protocols (2) 2
conjoint control of vehicle sub-units of different type ordifferent function (2) 2
control systems (2) 2
control systems specially adapted for hybrid vehicles (2) 2
cosmonautics (2) 2
cryptographic protocols (2) 2
data security (2) 2
diagnosis (2) 2
discrete logarithm (2) 2
group signatures (2) 2
hats (2) 2
head coverings (2) 2
headwear (2) 2
heating (2) 2
helicopters (2) 2
horology (2) 2
identification (2) 2
information management (2) 2
jamming of communication (2) 2
key exchange (2) 2
lighting (2) 2
malware (2) 2
means of attack or defence, e.g. camouflage, in general (2) 2
mechanical engineering (2) 2
metering scheme (2) 2
modification attack (2) 2
non-repudiation (2) 2
order telegraphs (2) 2
password (2) 2
physics, nuclear (2) 2
physics, particles & fields (2) 2
privacy (2) 2
public key (2) 2
quantum cryptography (2) 2
road vehicle drive control systems for purposes not related tothe control of a particular sub-unit (2) 2
secret communication (2) 2
semi-quantum (2) 2
sicherheit (2) 2
signalling or calling systems (2) 2
smart cards (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Modern Physics Letters A, ISSN 0217-7323, 11/2019, Volume 34, Issue 34, p. 1950281
Classical users can share a secret key with a quantum user by using a semi-quantum key distribution (SQKD) protocol. Allowing two classical users to share a... 
ATTACKS | mediated key distribution protocol | Trojan-horse attack | ASTRONOMY & ASTROPHYSICS | single photon | SECURITY | PROOF | PHYSICS, NUCLEAR | Semi-quantum | untrusted third party | PHYSICS, MATHEMATICAL | PHYSICS, PARTICLES & FIELDS
Journal Article
Modern Physics Letters A, ISSN 0217-7323, 09/2019, Volume 34, Issue 27, p. 1950213
Quantum secret sharing protocol, which lets a master share a secret with his/her agents and the agents can recover the master’s secret when they collaborate,... 
entanglement state | GROVER ALGORITHM | INFORMATION | ENTANGLEMENT | W-state | PHYSICS, NUCLEAR | PHYSICS, MATHEMATICAL | SCHEME | ASTRONOMY & ASTROPHYSICS | SECURITY | semi-quantum | quantum secret sharing | PHYSICS, PARTICLES & FIELDS
Journal Article
Computer Standards & Interfaces, ISSN 0920-5489, 2005, Volume 27, Issue 2, pp. 177 - 180
In 2003, Wu and Chieu proposed a user-friendly remote authentication scheme with smart card. In the scheme, a user can freely choose and change his/her... 
Smart card | Cryptography | Remote authentication | Password | COMPUTER SCIENCE, SOFTWARE ENGINEERING | password | GEOMETRIC APPROACH | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | cryptography | smart card | remote authentication | PASSWORD AUTHENTICATION
Journal Article
Computers and Electrical Engineering, ISSN 0045-7906, 2008, Volume 34, Issue 1, pp. 12 - 20
Journal Article
2011 IEEE 17th International Conference on Parallel and Distributed Systems, ISSN 1521-9097, 12/2011, pp. 638 - 645
In recent years, cloud computing has gradually become the mainstream of Internet services. When cloud computing environments become more perfect, the business... 
archival storage | Cloud computing | Protocols | Memory | hybrid cryptosystem | information security | provable data possession | Encryption | storage | Servers | PDP | Hybrid cryptosystem | Storage | Information security | Archival storage | Provable data possession
Conference Proceeding
International Journal of Modern Physics C, ISSN 0129-1831, 04/2008, Volume 19, Issue 4, pp. 625 - 635
Journal Article
Applied Mathematics and Computation, ISSN 0096-3003, 2005, Volume 161, Issue 3, pp. 807 - 812
In 1996, Mambo et al. first introduced the concept of a proxy signature scheme, and discussed the delegation of the signing capability to a proxy signer. In... 
Digital signature | Proxy signature | Privacy protection | Cryptography | Security | MATHEMATICS, APPLIED | cryptography | security | digital signature | privacy protection | proxy signature
Journal Article
Operating Systems Review (ACM), ISSN 0163-5980, 10/2004, Volume 38, Issue 4, pp. 70 - 73
Conference Proceeding
IEEE TRANS CONSUM ELECTRON, ISSN 0098-3063, 11/2000, Volume 46, Issue 4, pp. 980 - 985
Zhou-Lam in 1999 proposed a fair Pay-Per View (PPV) protocol for Web-based video service. Their protocol allows lows viewers to freely choose the video... 
Journal Article
IEEE TRANS CONSUM ELECTRON, ISSN 0098-3063, 11/2000, Volume 46, Issue 4, pp. 943 - 948
Jan and Tseng in 1998 proposed two integrated schemes of user authentication and access control which can be used to implement a protection system in... 
Journal Article
Applied Mathematics and Computation, ISSN 0096-3003, 2005, Volume 171, Issue 1, pp. 573 - 580
Simmons first introduced the concept of subliminal channel in 1984. After that, many researches of digital signature with subliminal channels have been... 
Access control | Digital signature | Cryptography | Subliminal channel | User hierarchy | MATHEMATICS, APPLIED | digital signature | user hierarchy | cryptography | access control | subliminal channel | HIERARCHY
Journal Article
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, ISSN 0916-8508, 02/2004, Volume E87-A, Issue 2, pp. 511 - 512
Journal Article
Applied Mathematics and Computation, ISSN 0096-3003, 2004, Volume 157, Issue 3, pp. 729 - 733
In 2003, Hsu et al. showed that the Ku-Wang modified authentication key agreement scheme is vulnerable to the modification attack and further proposed an... 
User authentication | Cryptography | Security | Authenticated key agreement | Modification attack | MATHEMATICS, APPLIED | modification attack | security | authenticated key agreement | user authentication | PROTOCOL | cryptography
Journal Article
Applied Mathematics and Computation, ISSN 0096-3003, 2004, Volume 158, Issue 1, pp. 169 - 175
The concept of subliminal channel was first proposed in 1983. After that, many subliminal channel schemes based on digital signatures are proposed. A... 
Digital signature | Convertible undeniable signature | Cryptography | Security | Subliminal channel | SCHEME | MATHEMATICS, APPLIED | security | digital signature | convertible undeniable signature | cryptography | subliminal channel
Journal Article
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, ISSN 0916-8508, 11/2003, Volume E86-A, Issue 11, pp. 2901 - 2902
Journal Article
Operating Systems Review (ACM), ISSN 0163-5980, 04/2004, Volume 38, Issue 2, pp. 85 - 92
Conference Proceeding
IEEE Transactions on Consumer Electronics, ISSN 0098-3063, 11/2003, Volume 49, Issue 4, pp. 1240 - 1242
Journal Article
IEICE transactions on communications, ISSN 0916-8516, 09/2005, Volume 88, Issue 9, pp. 3765 - 3767
In 2002, Yeh, Shen, and Hwang proposed a one-time password authentication scheme using smart cards. However, Tsuji et al. and Ku et al. showed that it is... 
Smart card | One-time password | User authentication | Cryptography | Security | security | one-time password | user authentication | cryptography | SECURE | smart card | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEICE transactions on fundamentals of electronics, communications and computer sciences, ISSN 0916-8508, 10/2002, Volume 85, Issue 10, pp. 2364 - 2367
Journal Article
2018 IEEE International Conference on Applied System Invention (ICASI), 04/2018, pp. 1046 - 1051
According to the Taiwan Ministry of Education statistics, about one million graduates each year, some of them will go to countries, high schools or tertiary... 
Technological innovation | hyperledger | Conferences | blockchain | Distributed databases | Companies | hashing | Contracts | Certification | digital certificate
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.