透過您的圖書館登入
IP:52.14.126.74

並列摘要


In 2000, Lee and Chang proposed a user identification scheme with key distribution preserving anonymity for distributed computer networks. Recently, Wu and Hsu pointed out that there are two weaknesses in the Lee-Chang scheme. They further not only proposed a new scheme to remedy the security leaks of the Lee-Chang scheme, but also reduced computation complexities and communication cost as compared with the Lee-Chang scheme. However, in this article we show that there are two attacks in their scheme.

被引用紀錄


Chen, I. X. (2009). 異質語意網資源建構與整合之研究 [doctoral dissertation, Yuan Ze University]. Airiti Library. https://doi.org/10.6838/YZU.2009.00325
Peng, S. Y. (2014). 小鼠與豬羊水幹細胞之細胞治療及命運之研究 [doctoral dissertation, National Taiwan University]. Airiti Library. https://doi.org/10.6342/NTU.2014.11029
楊名慧(2008)。氮化銦鎵奈米碟在氮化鎵奈米柱上之光學性質研究〔碩士論文,國立中央大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0031-0207200917352617
Li, Y. T. (2008). 軟體無線電數位電視廣播接收器通道估測的改善 [master's thesis, National Taipei University of Technology]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0006-1407200816023700
林惠君(2008)。傳染性疾病傳播之空間分析與時空分析之適切性比較:以2002年底特律之西尼羅病毒疫情為例〔碩士論文,亞洲大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0118-0807200916271816

延伸閱讀