-
1
-
-
43649102584
-
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games
-
Chan, M.-C., Hu, S.-Y., Jiang, J.-R.: An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games. Computer Networks 52(9), 1838-1845 (2008)
-
(2008)
Computer Networks
, vol.52
, Issue.9
, pp. 1838-1845
-
-
Chan, M.-C.1
Hu, S.-Y.2
Jiang, J.-R.3
-
2
-
-
33750962193
-
A seucre event agreement (SEA) protocol for peer-to-peer games
-
Corman, A., Douglas, S., Schachte, P., Teague, V.: A seucre event agreement (SEA) protocol for peer-to-peer games. In: The First International Conference on Availability, Reliability and Security (2006)
-
(2006)
The First International Conference on Availability, Reliability and Security
-
-
Corman, A.1
Douglas, S.2
Schachte, P.3
Teague, V.4
-
3
-
-
4544240978
-
Low lattency and cheat-proof event ordering for peer-to-peer games
-
Dickey, C., Zappala, D., Lo, V., Marr, J.: Low lattency and cheat-proof event ordering for peer-to-peer games. In: Proceedings of the ACM International Workshop on Network and Operating System Support for Digital Audio and Video, pp. 134-139 (2004)
-
(2004)
Proceedings of the ACM International Workshop on Network and Operating System Support for Digital Audio and Video
, pp. 134-139
-
-
Dickey, C.1
Zappala, D.2
Lo, V.3
Marr, J.4
-
4
-
-
57049115409
-
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
-
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments. Computer Communications 31(18), 4255-4258 (2008)
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4255-4258
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
5
-
-
46749099079
-
A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks
-
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: A Secure and Efficient Communication Scheme with Authenticated Key Establishment and Privacy Preserving for Vehicular Ad Hoc Networks. Computer Communications 31(12), 2803-2814 (2008)
-
(2008)
Computer Communications
, vol.31
, Issue.12
, pp. 2803-2814
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
6
-
-
44549085989
-
An electronic voting protocol with deniable authentication for mobile ad hoc networks
-
Li, C.-T., Hwang, M.-S., Liu, C.-Y.: An Electronic Voting Protocol with Deniable Authentication for Mobile Ad Hoc Networks. Computer Communications 31(10), 2534-2540 (2008)
-
(2008)
Computer Communications
, vol.31
, Issue.10
, pp. 2534-2540
-
-
Li, C.-T.1
Hwang, M.-S.2
Liu, C.-Y.3
-
7
-
-
49549085074
-
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks. International Journal of Computer Systems Science and Engineering 23(3), 227-234 (2008)
-
(2008)
International Journal of Computer Systems Science and Engineering
, vol.23
, Issue.3
, pp. 227-234
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
8
-
-
77951127152
-
A verifiable electronic voting scheme over the internet
-
Li, C.-T., Hwang, M.-S., Lai, Y.-C.: A Verifiable Electronic Voting Scheme Over the Internet. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 449-454 (2009)
-
(2009)
Proceedings of the 6th International Conference on Information Technology: New Generations
, pp. 449-454
-
-
Li, C.-T.1
Hwang, M.-S.2
Lai, Y.-C.3
-
10
-
-
77951134775
-
A secure billing protocol for grid computing
-
Wei, C.-H., Chin, Y.-H., Li, C.-T.: A Secure Billing Protocol for Grid Computing. In: Proceedings of the 6th International Conference on Information Technology: New Generations, pp. 320-325 (2009)
-
(2009)
Proceedings of the 6th International Conference on Information Technology: New Generations
, pp. 320-325
-
-
Wei, C.-H.1
Chin, Y.-H.2
Li, C.-T.3
-
11
-
-
70349788391
-
An enhanced remote user authentication scheme providing mutual authentication and key agreement with smart cards
-
Li, C.-T.: An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards. In: 5th International Conference on Information Assurance and Security, pp. 517-520 (2009)
-
(2009)
5th International Conference on Information Assurance and Security
, pp. 517-520
-
-
Li, C.-T.1
-
13
-
-
70349809938
-
Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks
-
Li, C.-T., Chu, Y.-P.: Cryptanalysis of threshold password authentication against guessing attacks in ad hoc networks. International Journal of Network Security 8(2), 166-168 (2009)
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 166-168
-
-
Li, C.-T.1
Chu, Y.-P.2
-
14
-
-
77952307259
-
An efficient and secure communication scheme for trusted computing environments
-
Li, C.-T.: An Efficient and Secure Communication Scheme for Trusted Computing Environments. Journal of Computers 20(3), 17-24 (2009)
-
(2009)
Journal of Computers
, vol.20
, Issue.3
, pp. 17-24
-
-
Li, C.-T.1
-
15
-
-
69949155644
-
An efficient sensor-to-sensor authenticated path-key establishment scheme for secure communications in wireless sensor networks
-
Li, C.-T., Hwang, M.-S., Chu, Y.-P.: An Efficient Sensor-To-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks. International Journal of Innovative Computing, Information and Control 5(8), 2107-2124 (2009)
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.8
, pp. 2107-2124
-
-
Li, C.-T.1
Hwang, M.-S.2
Chu, Y.-P.3
-
16
-
-
74349090986
-
A secure event update protocol for peer- to-peer massively multiplayer online games against masquerade attacks
-
Li, C.-T., Wei, C.-H., Chin, Y.-H.: A Secure Event Update Protocol for Peer- To-Peer Massively Multiplayer Online Games Against Masquerade Attacks. International Journal of Innovative Computing, Information and Control 5(12(A)), 4715-4723 (2009)
-
(2009)
International Journal of Innovative Computing, Information and Control
, vol.5
, Issue.12 A
, pp. 4715-4723
-
-
Li, C.-T.1
Wei, C.-H.2
Chin, Y.-H.3
-
17
-
-
77952308617
-
A two-factor user authentication scheme providing mutual authentication and key agreement over insecure channels
-
Li, C.-T., Lee, C.-C., Wang, L.-J.: A Two-Factor User Authentication Scheme Providing Mutual Authentication and Key Agreement over Insecure Channels. Journal of Information Assurance and Security 5(1), 201-208 (2010)
-
(2010)
Journal of Information Assurance and Security
, vol.5
, Issue.1
, pp. 201-208
-
-
Li, C.-T.1
Lee, C.-C.2
Wang, L.-J.3
-
18
-
-
77952307691
-
A secure and undeniable billing protocol among charged parties for grid computing environments
-
article in press
-
Li, C.-T., Wei, C.-H., Lee, C.-C., Chin, Y.-H., Wang, L.-J.: A Secure and Undeniable Billing Protocol among Charged Parties for Grid Computing Environments. International Journal of Innovative Computing, Information and Control (2010) (article in press)
-
(2010)
International Journal of Innovative Computing, Information and Control
-
-
Li, C.-T.1
Wei, C.-H.2
Lee, C.-C.3
Chin, Y.-H.4
Wang, L.-J.5
-
19
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
Li, C.-T., Hwang, M.-S.: An Efficient Biometrics-based Remote User Authentication Scheme Using Smart Cards. Journal of Network and Computer Applications 33(1), 1-5 (2010)
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.-T.1
Hwang, M.-S.2
-
21
-
-
38149034349
-
A new nonrepudiable threshold proxy signature scheme with valid delegation period
-
Gervasi, O., Gavrilova, M.L. (eds.) Springer, Heidelberg
-
Hwang, M.-S., Tzeng, S.-F., Li, C.-T.: A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part III. LNCS, vol.4707, pp. 273-284. Springer, Heidelberg (2007)
-
(2007)
ICCSA 2007, Part III. LNCS
, vol.4707
, pp. 273-284
-
-
Hwang, M.-S.1
Tzeng, S.-F.2
Li, C.-T.3
|