Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Wen-Her Yang"'
Autor:
Wen-Her Yang, 楊文和
88
With rapid growth of the Internet, more and more people communicate with others through the Internet. In the past, most of the Internet applications were point-to-point connections. In recent years, the demand of the point-to-multipoint conne
With rapid growth of the Internet, more and more people communicate with others through the Internet. In the past, most of the Internet applications were point-to-point connections. In recent years, the demand of the point-to-multipoint conne
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/63629825476398050326
Autor:
Wen-Her Yang, 楊文和
83
In this thesis, two new authentication protocols are proposed. In the first part, we present a four-message protocol for initial authentication that supports subsequent authentication in two messages without contacting the authentication serv
In this thesis, two new authentication protocols are proposed. In the first part, we present a four-message protocol for initial authentication that supports subsequent authentication in two messages without contacting the authentication serv
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/68016475282562585921
Autor:
Wen-Her Yang, Shiuh-Pyng Shieh
Publikováno v:
Journal of Parallel and Distributed Computing. 64:191-200
Conventional access control mechanisms are rather insensitive to occurrences of context-dependent illegal accesses. Insensitivity to context-dependent accesses may lead to failure to protect network users and resources. Context-dependent illegal acce
Publikováno v:
International Journal of Network Management. 11:129-136
Autor:
Shiuh-Pyng Shieh, Wen-Her Yang
Publikováno v:
International Journal of Network Management. 11:365-374
A secure key agreement protocol for group communications is proposed in this paper, which ensures the authenticity of group members and the privacy of group messages, and provides the properties of perfect forward and backward privacy. In a group ses
Autor:
Wen-Her Yang, Shiuh-Pyng Shieh
Publikováno v:
Computers & Security. 18:727-733
In this paper, two password authentication schemes with smart cards are proposed. In the schemes, users can change their passwords freely, and the remote system does not need the directory of passwords or verification tables to authenticate users. On
Autor:
Shiuh-Pyng Shieh, Wen-Her Yang
Publikováno v:
ACM SIGOPS Operating Systems Review. 30:32-41
In this paper, we present a four-message protocol for initial authentication that supports subsequent authentication in two messages without contacting the authentication server or using synchronized clocks. This protocol has the property of using fe
Publikováno v:
IEEE Communications Letters. 1:87-89
A secure authentication protocol which supports both the privacy of messages and the authenticity of communicating parties is proposed. The trusted third party (key information center) is not needed once the secure network system is set up. Mutual au
Autor:
Wen Her Yang, 楊文和
84
Core-shell rubber(CSR) with styrene-butadiene rubber(SBR) as the core,acrylate as the shell were used for toughening the unsaturated polyester(UP).Effect of the type and the amount of the shell functional group,the CSR particle size,and the t
Core-shell rubber(CSR) with styrene-butadiene rubber(SBR) as the core,acrylate as the shell were used for toughening the unsaturated polyester(UP).Effect of the type and the amount of the shell functional group,the CSR particle size,and the t
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/49428702289796734029