AAAAAA

   
Results: 1-3 |
Results: 3

Authors: LIAW HT
Citation: Ht. Liaw, PASSWORD AUTHENTICATIONS USING TRIANGLES AND STRAIGHT-LINES, Computers & mathematics with applications, 30(9), 1995, pp. 63-71

Authors: CHANG CC FAN SW LIAW HT CHIOU MY
Citation: Cc. Chang et al., CRYPTANALYSIS ON AN ACCESS-CONTROL IN A HIERARCHY, Computers & mathematics with applications, 29(4), 1995, pp. 69-72

Authors: LIAW HT
Citation: Ht. Liaw, A DYNAMIC CRYPTOGRAPHIC KEY GENERATION AND INFORMATION BROADCASTING SCHEME IN INFORMATION-SYSTEMS, Computers & security, 13(7), 1994, pp. 601-610
Risultati: 1-3 |