Browsing by Author Chen, Rong-Jaye

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 27  next >
Issue DateTitleAuthor(s)
1-Jan-2017An asymptotically perfect secret sharing scheme based on the Chinese Remainder TheoremLiu, Yung-Hsiang; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
1-Sep-2015Cryptanalysis and Improvement of an Encoding Method for Private-Key Hidden Vector EncryptionsTseng, Fu-Kuo; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
2012Design for a Secure Interoperable Cloud-Based Personal Health Record ServiceHsieh, George; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
1-Mar-2008Distance-preserving and distance-increasing mappings from ternary vectors to permutationsLin, Jyh-Shyan; Chang, Jen-Chun; Chen, Rong-Jaye; Klove, Torleiv; 資訊工程學系; Department of Computer Science
2012An Efficient Fragile Watermarking Scheme for Pixel-wise Tamper DetectionLee, Yang-Kuo; Chang, Jen-Chun; Wu, Hsin-Lung; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
1-Sep-2006An efficient identity-based cryptosystem for end-to-end mobile securityHwu, Jing-Shyang; Chen, Rong-Jaye; Lin, Yi-Bing; 資訊工程學系; Department of Computer Science
2012Ensuring Correctness of Range Searches on Encrypted Cloud DataTseng, Fu-Kuo; Liu, Yung-Hsiang; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
2013iPEKS: Fast and Secure Cloud Data Retrieval from the Public-key Encryption with Keyword SearchTseng, Fu-Kuo; Chen, Rong-Jaye; Lin, Bao-Shuh Paul; 資訊工程學系; Department of Computer Science
31-Oct-2006New simple constructions of distance-increasing mappings from binary vectors to permutationsLin, Jyh-Shyan; Chang, Jen-Chun; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
1-Nov-2011A Secure Reed-Solomon Code Incentive Scheme for Commercial Ad Dissemination Over VANETsTseng, Fu-Kuo; Liu, Yung-Hsiang; Hwu, Jing-Shyang; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
Jan-2016Towards Position-Aware Symbol-Based Searches on Encrypted Data from Symmetric Predicate Encryption SchemesTseng, Fu-Kuo; Chen, Rong-Jaye; 資訊工程學系; Department of Computer Science
2017乙太坊與其共識演算法Casper陳聖豪; 陳榮傑; Chen, Shen-Haur; Chen, Rong-Jaye; 多媒體工程研究所
2010以無線感測器網路為基礎之數位實體互動系統朱峰儀; Chu, Feng-I; 曾煜棋; 陳榮傑; Tseng, Yu-Chee; Chen, Rong-Jaye; 資訊科學與工程研究所
2015依所需安全等級產生適用於雙線性配對之橢圓曲線張奕棠; Chang, Yi-Tang; 陳榮傑; Chen, Rong-Jaye; 資訊科學與工程研究所
2012公開金鑰可搜尋多關鍵字之加密系統謝嘉雯; Hsieh, Chai-Wen; 陳榮傑; Chen, Rong-Jaye; 資訊科學與工程研究所
2009利用複乘法產生質數點數之橢圓曲線蔡佩娟; Tsai, Pei-Chuan; 陳榮傑; Chen, Rong-Jaye; 資訊科學與工程研究所
2016基於中國餘數定理之階層式祕密分享劉用翔; 陳榮傑; Liu, Yung-Hsiang; Chen, Rong-Jaye; 資訊科學與工程研究所
2011基於動態資訊流動追蹤之預防權限欺騙之使用曾子建; Tseng, Tzu-Chien; 陳榮傑; Chen, Rong-Jaye; 網路工程研究所
2011多授權中心的屬性加密及其實現蔡禮鼎; Tsai, Li-Ting; 陳榮傑; Chen, Rong-Jaye; 資訊科學與工程研究所
2015屬性加密系統及其應用吳姿屏; Wu, Tzu-Ping; 陳榮傑; Chen, Rong-Jaye; 網路工程研究所