Jinn-Ke Jan

From MaRDI portal
(Redirected from Person:214604)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The design of speedy seamless safe messaging mechanism in VANET
International Journal of Computer Mathematics
2014-01-29Paper
A simple mobile communication billing system among charged parties
Applied Mathematics and Computation
2010-09-01Paper
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns
Fundamenta Informaticae
2009-05-22Paper
A secure session key distribution scheme for group communications
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
A novel proxy deposit protocol for e-cash systems
Applied Mathematics and Computation
2005-05-04Paper
Authenticated encryption schemes with message linkages for message flows
Computers and Electrical Engineering
2004-05-27Paper
scientific article; zbMATH DE number 2063045 (Why is no real title available?)2004-03-29Paper
Improved authenticated multiple-key agreement protocol without using conventional one-way function.
Applied Mathematics and Computation
2003-11-25Paper
Robust and Simple Authentication Protocol
The Computer Journal
2003-10-29Paper
Cryptanalysis on Mu-Varadharajan's e-voting schemes
Applied Mathematics and Computation
2003-09-09Paper
Digital signature with message recovery using self-certified public keys and its variants
Applied Mathematics and Computation
2003-01-28Paper
Attacks on threshold signature schemes with traceable signers
Information Processing Letters
2002-07-25Paper
Cryptanalysis of Liaw's broadcasting cryptosystem
Computers & Mathematics with Applications
2001-11-12Paper
On the security of methods for protecting password transmission
Informatica (Vilnius)
2001-01-01Paper
A novel ID-based group signature
Information Sciences
2000-07-25Paper
A scheme and concept for limited inheritance of privileges in a user hierarchy
Information Sciences
2000-02-02Paper
On the security of image encryption method
Information Processing Letters
1997-02-28Paper
A dynamic access control scheme based upon the knapsack problem
Computers & Mathematics with Applications
1994-06-23Paper
A single-key access control scheme in information protection systems
Information Sciences
1990-01-01Paper


Research outcomes over time


This page was built for person: Jinn-Ke Jan