Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-3
|
Results: 3
PASSWORD AUTHENTICATIONS USING TRIANGLES AND STRAIGHT-LINES
Authors:
LIAW HT
Citation:
Ht. Liaw, PASSWORD AUTHENTICATIONS USING TRIANGLES AND STRAIGHT-LINES, Computers & mathematics with applications, 30(9), 1995, pp. 63-71
CRYPTANALYSIS ON AN ACCESS-CONTROL IN A HIERARCHY
Authors:
CHANG CC FAN SW LIAW HT CHIOU MY
Citation:
Cc. Chang et al., CRYPTANALYSIS ON AN ACCESS-CONTROL IN A HIERARCHY, Computers & mathematics with applications, 29(4), 1995, pp. 69-72
A DYNAMIC CRYPTOGRAPHIC KEY GENERATION AND INFORMATION BROADCASTING SCHEME IN INFORMATION-SYSTEMS
Authors:
LIAW HT
Citation:
Ht. Liaw, A DYNAMIC CRYPTOGRAPHIC KEY GENERATION AND INFORMATION BROADCASTING SCHEME IN INFORMATION-SYSTEMS, Computers & security, 13(7), 1994, pp. 601-610
Risultati:
1-3
|