-
1
المؤلفون: Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang
المصدر: Informatica. :199-222
مصطلحات موضوعية: Applied Mathematics, General Medicine, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8470768ebd8ba4462185a796082aef3fTest
https://doi.org/10.15388/22-infor506Test -
2
المؤلفون: Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Yun-Hsin Chuang, Ying-Hao Hung
المصدر: Informatica. :151-179
مصطلحات موضوعية: Applied Mathematics, Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::6c4559e1ddfebfef3fcda03fb492820aTest
https://doi.org/10.15388/22-infor474Test -
3
المؤلفون: Sen-Shan Huang, Tung-Tso Tsai, Jui-Di Wu, Yuh-Min Tseng
المصدر: Informatica. :597-620
مصطلحات موضوعية: Revocation, business.industry, Computer science, Applied Mathematics, Cloud computing, Leakage resilience, Computer security, computer.software_genre, Signature (logic), Identity (object-oriented programming), Side channel attack, business, computer, Information Systems, Leakage (electronics)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::5a040fa2309e456caebca5c7bd0f7aa1Test
https://doi.org/10.15388/20-infor406Test -
4
المؤلفون: Jui-Di Wu, Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang
المصدر: Informatica. 30:595-612
مصطلحات موضوعية: Theoretical computer science, Computer science, Applied Mathematics, Key (cryptography), Certificate, Signature (logic), Information Systems
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::dc43d06210eb182eea488dec1419b419Test
https://doi.org/10.15388Test/informatica .2019.220 -
5
المؤلفون: Jui Di Wu, Wei Chieh Chou, Sen-Shan Huang, Yuh-Min Tseng
المصدر: Informatica. 29:125-155
مصطلحات موضوعية: Computer science, business.industry, Applied Mathematics, 0102 computer and information sciences, 02 engineering and technology, Leakage resilience, 01 natural sciences, 010201 computation theory & mathematics, Embedded system, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Side channel attack, Key encapsulation, business, Information Systems, Leakage (electronics)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::a9195ee56668d90f2377b1d2ee503aa6Test
https://doi.org/10.15388Test/informatica .2018.161 -
6
المؤلفون: Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai
المصدر: Informatica. 28:193-214
مصطلحات موضوعية: Authentication, Computer science, business.industry, Applied Mathematics, 020208 electrical & electronic engineering, Resource constrained, Cloud computing, 02 engineering and technology, Computer security, computer.software_genre, Separable space, 0202 electrical engineering, electronic engineering, information engineering, Identity (object-oriented programming), 020201 artificial intelligence & image processing, Confidentiality, business, computer, Information Systems, Signcryption
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::c3505a81d1113c5bf0c0fec72f69969aTest
https://doi.org/10.15388Test/informatica .2017.126 -
7
المؤلفون: Yuh-Min Tseng, Ying Hao Hung, Sen-Shan Huang
المصدر: Informatica. 27:549-572
مصطلحات موضوعية: Scheme (programming language), Authentication, Computer science, business.industry, Applied Mathematics, 05 social sciences, 050801 communication & media studies, 02 engineering and technology, Short signature, 0508 media and communications, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, business, computer, Information Systems, Computer network, computer.programming_language
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::045446e41ce0722e3202ba0f47582d40Test
https://doi.org/10.15388Test/informatica .2016.99 -
8
المؤلفون: Tung Tso Tsai, Sen-Shan Huang, Ying Hao Hung, Yuh-Min Tseng
المصدر: Informatica. 26:663-684
مصطلحات موضوعية: Scheme (programming language), Theoretical computer science, business.industry, Applied Mathematics, Hash function, Cryptography, Computer security model, Computer security, computer.software_genre, Oracle, Signature (logic), business, computer, Key escrow, Information Systems, Standard model (cryptography), computer.programming_language, Mathematics
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::371f5f4b1e2343affd0ef9a56fb1663fTest
https://doi.org/10.15388Test/informatica .2015.70 -
9
المؤلفون: Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang
المصدر: Informatica. 25:505-521
مصطلحات موضوعية: Hardware_MEMORYSTRUCTURES, Theoretical computer science, business.industry, Applied Mathematics, Hash function, Bilinear interpolation, Cryptography, Bilinear pairing, business, Signature (logic), Information Systems, Mathematics, Standard model (cryptography)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::abe28c5a43eed43a58cc6251c499295fTest
https://doi.org/10.15388Test/informatica .2014.26 -
10دورية أكاديمية
المؤلفون: Jui-Di WU, Yuh-Min TSENG, Sen-Shan HUANG, Tung-Tso TSAI
المصدر: Informatica; 2020, Vol. 31 Issue 3, p597-620, 24p
مصطلحات موضوعية: REVOCATION, AUTHORITY, CRYPTOGRAPHY