Author of the publication

Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems.

, and . IEEE Trans. Vehicular Technology, 51 (6): 1313-1315 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 428-442. Springer, (2003)Integrated production and Transportation Scheduling in supply Chain optimisation., and . SEAL, volume 2 of Advances in Natural Computation, page 406-425. World Scientific, (2002)Fast encryption for multimedia., , , and . IEEE Trans. Consumer Electronics, 47 (1): 101-107 (2001)Optical nonlinear effects on the performance of IP traffic over GMPLS-based DWDM networks., , and . Comput. Commun., 26 (12): 1330-1340 (2003)Fast Modular network implementation for support vector machines., , , and . IEEE Trans. Neural Networks, 16 (6): 1651-1663 (2005)Improving Object Oriented Analysis by Explicit Change Analysis., , , and . TOOLS (36), page 2-7. IEEE Computer Society, (2000)Optimal Chache Allocation and Probabilistic Caching for Local Loss Recovery in Reliable Multicast., , , and . ICC (3), page 1401-1405. IEEE, (2000)A secure conference scheme for mobile communications., , , and . IEEE Trans. Wirel. Commun., 2 (6): 1168-1177 (2003)ATM Traffic Control Using AI Techniques., , and . Applied Informatics, page 36-37. IASTED/ACTA Press, (1999)Extreme learning machine: Theory and applications., , and . Neurocomputing, 70 (1-3): 489-501 (2006)