搜尋:encryption

符合的藏品

An Integration Design of Compr...

壓縮 心電圖 加密 醫學影像 遠距醫療 Compression ECG Encryption Medical images Telemedicine SPIHT AES 國家圖書館 20021200.....more

16/82

Image Encryption and Camouflag...

Data hiding Steganography Image camouflage Image encryption Image compression Vector quantization 影.....more

17/82

A Provable Secure Scheme for C...

可轉換認證式加密法 數位簽章 簽章加密法 Convertible authenticated encryption scheme Digital signature Signcryption 國家圖.....more

18/82

On the Security of a Variation...

Cryptology Security Public-key cryptosystem Encryption Cryptanalysis 國家圖書館 20020100 期刊論文 孫宏民(Sun.....more

19/82

Security of a New Necryption A...

Image encryption Image security Vector quantization Image cryptosystem 國家圖書館 20030600 期刊論文 陳宗和(Chen.....more

20/82

A Pairing-Based Proxy Authenti...

 Proxy authenticated encryption scheme Self-certified public key cryptosystem Mobile agent 國家圖書館.....more

21/82

資料保密措施與密碼概論

資訊系統安全 資料保密 密碼 編密 Data encryption 國家圖書館 19971000 期刊論文 黃力堯 資料保密措施與密碼概論 臺灣期刊論文索引系統 來源期刊:光碟月刊 卷期:41 民.....more

22/82

The Design of a Novel E-cash S...

Electronic cash Fair exchange Verifiable encryption Electronic commerce Wireless communications 國家圖.....more

23/82

Self-Certified Multi-Authentic...

20101200 期刊論文 Tsai, Jia-lun Wu, Tzong-chen Tsai, Kuo-yu Self-Certified Multi-Authenticated Encryption.....more

24/82

An IND-CCA2 Secure Key-Policy ...

Attribute-based encryption Key encapsulation mechanisms Key-policy attribute-based key.....more

25/82

Secure Many-to-Many Multicast ...

Heterogeneous network Many-to-many group communication Identity-based proxy encryption 國家圖書館.....more

26/82

Efficient Cellular Automata Ba...

Finite field multiplication Canonical basis Programmable cellular automata VLSI Encryption 國家圖書館.....more

27/82

Remarks on Using RSA With Low ...

RSA Public key system Low exponent attack Encryption key Lower boundary 國家圖書館 20020300 期刊論文 何煒華(He.....more

28/82

A Note on Efficient Color Visu...

Encryption 臺灣期刊論文索引系統 來源期刊:Journal of Information Science and Engineering 卷期:18:3 民91.05 頁次:頁367-372.....more

29/82

On the Design of RSA with Shor...

Data encryption and cryptography RSA Short secret exponent Continued fraction Lattice basis.....more

30/82
上一頁
第 2 頁
共 6 頁
下一頁