230 results on '"Chien-Lung Hsu"'
Search Results
52. A Security and Privacy Preserving E-Prescription System Based on Smart Cards.
53. New identity-based key-insulated convertible multi-authenticated encryption scheme.
54. The Influences of National Images on Marketing Performance: A Mediated Model Link.
55. A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme.
56. A three-level authenticated conference key establishment protocol for UMTS networks.
57. Improved convertible authenticated encryption scheme with provable security.
58. Secure key management scheme for dynamic hierarchical access control based on ECC.
59. Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks.
60. Effect of Commitment and Trust towards Micro-blogs on Consumer Behavioral Intention: A Relationship Marketing Perspective.
61. Research on the Connections Between Corporate Social Responsibility and Corporation Image in the Risk Society: Take the Mobile Telecommunication Industry as an Example.
62. A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks.
63. HOW WILL THE LAND REVENUE POLICY REFORM AFFECT CHINA’S ECONOMY? A SIMULATION ANALYSIS BASED ON GENERAL EQUILIBRIUM
64. BIBLIOMETRIC ANALYSIS OF FINANCIAL CRISIS RESEARCH
65. Three-Factor UCSSO Scheme With Fast Authentication and Privacy Protection for Telecare Medicine Information Systems
66. Convertible multi-authenticated encryption scheme.
67. Recursive protocol for group-oriented authentication with key distribution.
68. Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification.
69. Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability.
70. New proxy multi-signature scheme.
71. Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem.
72. Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack.
73. A user friendly remote authentication scheme with smart cards against impersonation attacks.
74. Developing the 'Healthcare CEO App' for Patients with Type 1 Diabetes Transitioning from Adolescence to Young Adulthood: A Mixed-Methods Study (Preprint)
75. Efficient proxy signature schemes using self-certified public keys.
76. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks.
77. Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
78. Group-oriented signature scheme with distinguished signing authoritie.
79. Improvement of modified authenticated key agreement protocol.
80. Improvement of threshold proxy signature scheme.
81. Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
82. Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
83. Threshold signature scheme using self-certified public keys.
84. ID-based multisignatures with distinguished signing authorities for sequential and broadcasting architectures.
85. Improvements of generalization of threshold signature and authenticated encryption for group communications.
86. Convertible authenticated encryption scheme.
87. Electronic Commerce Research Profiles: Comparing E-Commerce and Information Systems Journals.
88. New nonrepudiable threshold proxy signature scheme with known signers.
89. A Delphi Study on the Healthcare Needs of Patients with Type 1 Diabetes during the Transition from Adolescence to Adulthood: Consensus among Patients, Primary Caregivers, and Healthcare Providers
90. Security of Chien et al.'s remote user authentication scheme using smart cards.
91. Evaluating Key Factors of Container Shipping Lines from the Perspective of High-tech Industry Shippers
92. FAIDM for Medical Privacy Protection in 5G Telemedicine Systems
93. Security of two remote user authentication schemes using smart cards.
94. Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems.
95. A Time Bound Dynamic Group key Distribution Scheme with Anonymous Three-factor Identification for IoT-Based Multi-Server Environments
96. Three-Factor Fast Authentication Scheme with Time Bound and User Anonymity for Multi-Server E-Health Systems in 5G-Based Wireless Sensor Networks
97. Cryptanalysis of elliptic curve cryptosystem on smart card access control with threshold scheme.
98. Does air pollution drive away tourists? A case study of the Sun Moon Lake National Scenic Area, Taiwan
99. Electronic Commerce Research Profiles: Comparing E-Commerce and Information Systems Journals
100. The effectiveness of a nurse-led exercise and health education informatics program on exercise capacity and quality of life among cancer survivors after esophagectomy: A randomized controlled trial
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.