3

Using RSA with low exponent in a public network

Year:
1998
Language:
english
File:
PDF, 319 KB
english, 1998
18

A public verifiable copy protection technique for still images

Year:
2002
Language:
english
File:
PDF, 434 KB
english, 2002
20

Three ID-based information security functions

Year:
1997
Language:
english
File:
PDF, 774 KB
english, 1997
25

Improved self-certified group-oriented cryptosystem without a combiner

Year:
2006
Language:
english
File:
PDF, 128 KB
english, 2006
28

Taiwan: Focus on the information security market

Year:
2003
Language:
english
File:
PDF, 383 KB
english, 2003
34

Integrating authentication in public key distribution system

Year:
1996
Language:
english
File:
PDF, 282 KB
english, 1996
37

Authenticity of public keys in asymmetric cryptosystems

Year:
1998
Language:
english
File:
PDF, 426 KB
english, 1998
39

Authenticated encryption schemes with linkage between message blocks

Year:
1997
Language:
english
File:
PDF, 360 KB
english, 1997
45

A Portable DRM Scheme Using Smart Cards

Year:
2007
Language:
english
File:
PDF, 155 KB
english, 2007
47

Secure SAS-like password authentication schemes

Year:
2004
Language:
english
File:
PDF, 393 KB
english, 2004