-
1
-
-
0003855464
-
-
Second Edition, John Wiley & Sons, Inc.
-
B. Shneier, "Applied Cryptography Second Edition," John Wiley & Sons, Inc., 1996.
-
(1996)
Applied Cryptography
-
-
Shneier, B.1
-
2
-
-
0004192381
-
-
CRC Press, New York
-
A.J. Menezes, P.C. Oorschot, and S.A. Vanstone, "Handbook of Applied Cryptograph," CRC Press, New York, 1997.
-
(1997)
Handbook of Applied Cryptograph
-
-
Menezes, A.J.1
Oorschot, P.C.2
Vanstone, S.A.3
-
8
-
-
0002839106
-
Refinement and Extension of Encrypted Key Exchange
-
M. Steiner, G. Tsudik, and M. Waidner, "Refinement and Extension of Encrypted Key Exchange," ACM Operating Systems Review, vol. 29, no. 3, pp. 22-30, 1995.
-
(1995)
ACM Operating Systems Review
, vol.29
, Issue.3
, pp. 22-30
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
9
-
-
0008145442
-
Three-party Encrypted Key Exchange: Attacks and a Solution
-
C. Lin, H. Sun, and T. Hwang, "Three-party Encrypted Key Exchange: Attacks and a Solution," ACM Operating Systems Review, vol. 34, no. 4, pp. 12-20, 2000.
-
(2000)
ACM Operating Systems Review
, vol.34
, Issue.4
, pp. 12-20
-
-
Lin, C.1
Sun, H.2
Hwang, T.3
-
10
-
-
0035701459
-
Three-party Encrypted Key Exchange Without Server Public-Keys
-
C. Lin, H. Sun, M. Steiner, and T. Hwang, "Three-party Encrypted Key Exchange Without Server Public-Keys," IEEE Communication Letters, vol. 5, no. 12, pp. 497-499, 2001.
-
(2001)
IEEE Communication Letters
, vol.5
, Issue.12
, pp. 497-499
-
-
Lin, C.1
Sun, H.2
Steiner, M.3
Hwang, T.4
-
11
-
-
4043095653
-
Efficient Three-Party Key Exchange using Smart Cards
-
May
-
W.S. Juang, "Efficient Three-Party Key Exchange using Smart Cards," IEEE Transactions on Consumer Electronics, vol. 50, no. 2, pp. 619-624, May 2004
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.2
, pp. 619-624
-
-
Juang, W.S.1
-
12
-
-
0031381717
-
An Adaptable and Reliable Authentication Protocol for Communication Networks
-
T. Kwon, M. Kang, and J. Song, "An Adaptable and Reliable Authentication Protocol for Communication Networks," Proc. of IEEE INFOCOM'97, pp. 737-744, 1997.
-
(1997)
Proc. of IEEE INFOCOM'97
, pp. 737-744
-
-
Kwon, T.1
Kang, M.2
Song, J.3
-
13
-
-
2342566530
-
A Novel Three-party Encrypted Key Exchange Protocol
-
September
-
C. Chang and Y. Chang, "A Novel Three-party Encrypted Key Exchange Protocol," Computer Standards & Interfaces, vol. 26, no. 5, pp. 471-476, September 2004.
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 471-476
-
-
Chang, C.1
Chang, Y.2
-
14
-
-
42449101136
-
Genetic Watermarking for Zerotree-Based Applications
-
Apr.
-
S. C. Chu, H. C. Huang, Y. Shi, S. Y. Wu, and C. S. Shieh, "Genetic Watermarking for Zerotree-Based Applications," Circuits, Systems, and Signal Processing, vol. 27, no. 2, pp. 171-182, Apr. 2008.
-
(2008)
Circuits, Systems, and Signal Processing
, vol.27
, Issue.2
, pp. 171-182
-
-
Chu, S.C.1
Huang, H.C.2
Shi, Y.3
Wu, S.Y.4
Shieh, C.S.5
-
15
-
-
55549110391
-
Genetic Fingerprinting for Copyright Protection of Multicast Media
-
Feb.
-
H. C. Huang and Y. H. Chen, "Genetic Fingerprinting for Copyright Protection of Multicast Media," Soft Computing, vol. 13, no. 4, pp. 383-391, Feb. 2009.
-
(2009)
Soft Computing
, vol.13
, Issue.4
, pp. 383-391
-
-
Huang, H.C.1
Chen, Y.H.2
-
16
-
-
37549069962
-
Progressive Watermarking Techniques Using Genetic Algorithms
-
Oct.
-
H. C. Huang, J. S. Pan, Y. H. Huang, F. H. Wang, and K. C. Huang, "Progressive Watermarking Techniques Using Genetic Algorithms," Circuits, Systems, and Signal Processing, vol. 26, no. 5, pp. 671-687, Oct. 2007.
-
(2007)
Circuits, Systems, and Signal Processing
, vol.26
, Issue.5
, pp. 671-687
-
-
Huang, H.C.1
Pan, J.S.2
Huang, Y.H.3
Wang, F.H.4
Huang, K.C.5
|