Author of the publication

Attacks on Shieh-Lin-Yang-Sun digital multisignature schemes for authenticating delegates in mobile code systems.

, and . IEEE Trans. Vehicular Technology, 51 (6): 1313-1315 (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Modular network implementation for support vector machines., , , and . IEEE Trans. Neural Networks, 16 (6): 1651-1663 (2005)Integrated production and Transportation Scheduling in supply Chain optimisation., and . SEAL, volume 2 of Advances in Natural Computation, page 406-425. World Scientific, (2002)A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers., , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 428-442. Springer, (2003)Improving Object Oriented Analysis by Explicit Change Analysis., , , and . TOOLS (36), page 2-7. IEEE Computer Society, (2000)Optimal Chache Allocation and Probabilistic Caching for Local Loss Recovery in Reliable Multicast., , , and . ICC (3), page 1401-1405. IEEE, (2000)Real-time learning capability of neural networks., , and . IEEE Trans. Neural Networks, 17 (4): 863-878 (2006)ATM Traffic Control Using AI Techniques., , and . Applied Informatics, page 36-37. IASTED/ACTA Press, (1999)Scalable Distributed-FDPS Algorithm for QoS Provisioning., , , , and . INC, page 31-40. University of Plymouth, (2010)An Opportunistic Scheduling Algorithm for MPEG Video Over Shared Wireless Downlink., , and . ICC, page 872-877. IEEE, (2006)Software Agent-Mediated Confidential Information Gathering System., and . ICPADS, page 523-528. IEEE Computer Society, (2000)