Volumn(No.) | Journal | Authors | Date | Pages | Keywords
|
---|
9(4)
| A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem
| Chin-Chen Chang and Chung-Pu Chen
| 1986
| 383~390
| Access Control
|
14(3)
| An Efficient Access Control Scheme for Files Protection
| Chu-Hsing Lin, Chin-Chen Chang, and Richard Char-Tung Lee
| 1991
| 319~324
| Access Control
|
15(5)
| A New Scheme for ID-Based Cryptosystems and Signatures
| Chi-Sung Laih, Jau-Yien Lee, Chin-Hsing Chen, and Lein Harn
| 1992
| 605~610
| Cryptosystem
|
18(3)
| Cryptanalysis and Improvement on a Conference Key Distribution System
| Chin-Chen Chang, Wen-Bin Wu, and Tzong-Chen Wu
| 1995
| 391~396
| Conference Key
|
18(4)
| An Encryption/Signature Scheme with Low Message Expansion
| Shin-Jia Hwang, Chin-Chen Chang, and Wei-Pang Yang
| 1995
| 591~595
| Cryptosystems
|