|
Search the dblp DataBase
Chun-Li Lin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tian-Fu Lee, Tzonelih Hwang, Chun-Li Lin
Enhanced three-party encrypted key exchange without server public keys. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:7, pp:571-577 [Journal]
- Chun-Li Lin, Tzonelih Hwang
A password authentication scheme with secure password updating. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:1, pp:68-72 [Journal]
- Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang
Provably secure authenticated key exchange protocols for low power computing clients. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:2, pp:106-113 [Journal]
- Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang
Three-party Encrypted Key Exchange: Attacks and A Solution. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2000, v:34, n:4, pp:12-20 [Journal]
- Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang
Efficient and Practical DHEKE Protocols. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2001, v:35, n:1, pp:41-47 [Journal]
- Chun-Li Lin, Huey-Er Lee, Chau-Hsiang Wang, Keng-Hua Chang
Integration of CT, CAD system and finite element method to investigate interfacial stresses of resin-bonded prosthesis. [Citation Graph (0, 0)][DBLP] Computer Methods and Programs in Biomedicine, 2003, v:72, n:1, pp:55-64 [Journal]
- Yu-Chuan Liu, Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang
Proxy-protected signature secure against the undelegated proxy signature attack. [Citation Graph (0, 0)][DBLP] Computers & Electrical Engineering, 2007, v:33, n:3, pp:177-185 [Journal]
Masquerade on One-Time Password Authentication Scheme. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|