61 results on '"Wu, Chuan-Kun"'
Search Results
2. A Comprehensive Set of Security Measures for IoT
3. Internet of Things Security
4. IoT Network Layer Security
5. RFID System Security
6. Privacy Protection in IoT Applications
7. IoT Security Architecture
8. On the IT Security and the OT Security in IoT
9. IoT Perception Layer Security
10. Introduction
11. Architectures of the Internet of Things
12. Fundamentals of Cryptography
13. IoT Processing Layer Security
14. An information transmission scheme based on secure QR code in IoT
15. On the Existence of Multiple RSA Private Keys
16. Double iterative learning-based polynomial based-RBFNNs driven by the aid of support vector-based kernel fuzzy clustering and least absolute shrinkage deviations
17. A privacy-preserving group encryption scheme with identity exposure
18. A hybrid encryption transmission scheme for industrial control systems
19. Fuzzy clustering-based neural networks modelling reinforced with the aid of support vectors-based clustering and regularization technique
20. Independence of Boolean Functions of Their Variables
21. Boolean Functions and Their Walsh Transforms
22. Algebraic Immunity of Boolean Functions
23. Boolean Functions and Their Applications in Cryptography
24. Cryptographic Applications of Boolean Functions
25. Boolean Function Representation of S-Boxes and Boolean Permutations
26. Nonlinearity Measures of Boolean Functions
27. The Symmetric Property of Boolean Functions
28. Correlation Immunity of Boolean Functions
29. Security in Cellular Networks and Communications
30. Key Management
31. Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting
32. Authenticated Group Key Agreement for Multicast
33. The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function
34. Fair Exchange of Digital Signatures with Offline Trusted Third Party
35. Construction of correlation immune Boolean functions
36. On construction of resilient functions
37. Differential Factoring for Integers
38. Key Management
39. Research the Several Organic Inhibitors Influence on Jamesonite and Marmatite
40. Cryptographic Properties of BOMM
41. Cube Attack on Grain
42. Cryptographic Properties of Several Classes of Rotation Symmetric Boolean Functions
43. Backward Unlinkability and Verifier-Local Revocation Group Signature Scheme with Lower Cost
44. A general compiler for password-authenticated group key exchange protocol
45. Secure Computation Protocol for Testing the Inclusion Relation of Sets
46. Efficient Long-Lived Self-Healing Key Distribution Scheme
47. Hash Functions Based on Block Ciphers
48. Security of the redefined Liaw’s broadcasting cryptosystem
49. The alignment problem of visual cryptography schemes
50. Many-to-one encryption and authentication scheme and its application
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.