Author of the publication

On the security of Wu and Yeh's conference key distribution system.

, , , and . Computer Communications, 18 (12): 978-981 (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem., , and . Informatica, Lith. Acad. Sci., 18 (1): 61-66 (2007)(T, N) Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders., , , and . Cryptologia, 24 (3): 250-268 (2000)Remark on the Threshold RSA Signature Scheme., , and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 413-420. Springer, (1993)On the security of Wu and Yeh's conference key distribution system., , , and . Computer Communications, 18 (12): 978-981 (1995)Improved remote authentication scheme with smart card., and . Computer Standards & Interfaces, 27 (2): 177-180 (2005)Further improvement on the modified authenticated key agreement scheme., and . Applied Mathematics and Computation, 157 (3): 729-733 (2004)The design of integrating subliminal channel with access control., and . Applied Mathematics and Computation, 171 (1): 573-580 (2005)Web Metering Scheme Based on the Bilinear Pairings., and . IEICE Transactions, 90-D (3): 688-691 (2007)Conspiracy Attacks on the Threshold RSA Signature Scheme., , and . Cryptologia, 18 (4): 372-380 (1994)A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy., and . J. Inf. Sci. Eng., 10 (4): 601-610 (1994)