Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Loang Shing Huang"'
Autor:
Loang-Shing Huang, Ren-Junn Hwang
Publikováno v:
Peer-to-Peer Networking and Applications. 7:655-664
This paper proposes an optimal method for large integer multiplication when implementing modern cryptographic applications on Peer-to-Peer ubiquitous networks. P2P ubiquitous networks are usually composed of smart low-end devices, which operate on th
Publikováno v:
Applied Mechanics and Materials. :2075-2079
This paper proposes a three-party authenticated key exchange protocol using two-factor including a password and a token. The proposed protocol allows two users to establish a session key through a trusted server with whom they both share a human-memo
Publikováno v:
Wireless Personal Communications. 42:213-223
In modern mobile communications, personal privacy and security are of top concern to mobile phone subscribers. Yet, owing to the limit of their processing capability, mainstream mobile manufacturers are still unable to apply advanced security protoco
Autor:
Loang-Shing Huang, 黃龍信
101
This thesis investigates how to accelerate the performance of modular exponen-tiation. As the requirement for secure communication over the Internet, 3G/4G cel-lular systems, vehicular communication networks and wireless sensor networks is g
This thesis investigates how to accelerate the performance of modular exponen-tiation. As the requirement for secure communication over the Internet, 3G/4G cel-lular systems, vehicular communication networks and wireless sensor networks is g
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/35211198184487770196
Autor:
Loang-Shing Huang, 黃龍信
94
This thesis presents a split method to accelerate the performance of multiprecision multiplication, which is based on the concept of divide-and-conquer and can be operated on word boundary in order to fit with the architecture of modern micro
This thesis presents a split method to accelerate the performance of multiprecision multiplication, which is based on the concept of divide-and-conquer and can be operated on word boundary in order to fit with the architecture of modern micro
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/37796408067696646928
Autor:
Loang-Shing, Huang.
Thesis (M.A.)--Tamkang University Dept. of Computer Science and Information Engineering.
Includes bibliographical references.
Includes bibliographical references.
Publikováno v:
IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
As the rapid progressing of mobile communication systems, personal communication systems have been brought new problems on the security aspects by the new communication technologies. Public-key cryptography technologies offer solutions to many of the
Publikováno v:
Proceedings of the IEEE 37th Annual 2003 International Carnahan Conference on Security Technology, 2003; 2003, p569-572, 4p
Publikováno v:
Wireless Personal Communications; Aug2007, Vol. 42 Issue 2, p213-223, 11p