|
Search the dblp DataBase
Chuan-Ming Li:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
Remark on the Threshold RSA Signature Scheme. [Citation Graph (0, 0)][DBLP] CRYPTO, 1993, pp:413-420 [Conf]
- Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1994, pp:194-204 [Conf]
- Tzonelih Hwang, Narn-Yih Lee, Chuan-Ming Li, Ming-Yung Ko, Yung-Hsiang Chen
Two Attacks on Neuman-Stubblebine Authentication Protocols. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1995, v:53, n:2, pp:103-107 [Journal]
- Narn-Yih Lee, Tzonelih Hwang, Chuan-Ming Li
(t, n) Threshold Untraceable Signatures. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2000, v:16, n:6, pp:835-846 [Journal]
- Chuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:61-66 [Journal]
- Tzonelih Hwang, Kuo-Chang Lee, Chuan-Ming Li
Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:1, pp:71-80 [Journal]
Search in 0.001secs, Finished in 0.001secs
|