Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("I-Te Chen"). Showing records 1 – 13 of 13 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Chen, Wei-Hao. Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

 Cloud computing is one of the most unprecedented techniques in rapidly developing industries. Protecting sensitive files stored on the clouds from being tampered by malicious… (more)

Subjects/Keywords: The Standard Model; Key-Aggregate Cryptosystem; Access Control; Cloud Computing; Proxy Re-Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, W. (2017). Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-175956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Wei-Hao. “Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds.” 2017. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-175956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Wei-Hao. “Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds.” 2017. Web. 18 Feb 2019.

Vancouver:

Chen W. Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-175956.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen W. Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-175956

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. YANG, QILIANG. Lattice-Based Group Authentication Scheme.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

 Authentication has been adopted in many areas. But most of these authentication schemes are built on traditional cryptographic primitives. It is widely believed that such… (more)

Subjects/Keywords: Authentication; Quantum Attacks; Lattice-Based Cryptography; Quantum-Resistant Primitive; Group

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

YANG, Q. (2017). Lattice-Based Group Authentication Scheme. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

YANG, QILIANG. “Lattice-Based Group Authentication Scheme.” 2017. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

YANG, QILIANG. “Lattice-Based Group Authentication Scheme.” 2017. Web. 18 Feb 2019.

Vancouver:

YANG Q. Lattice-Based Group Authentication Scheme. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

YANG Q. Lattice-Based Group Authentication Scheme. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-184627

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Lin, Chih-Wen. Attribute-based Encryption from Identity-based Encryption.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers… (more)

Subjects/Keywords: Wildcard; Identity-based Encryption; Attribute-based Encryption; Constantsize Ciphertexts/keys; Hidden Access Policies

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, C. (2016). Attribute-based Encryption from Identity-based Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Chih-Wen. “Attribute-based Encryption from Identity-based Encryption.” 2016. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Chih-Wen. “Attribute-based Encryption from Identity-based Encryption.” 2016. Web. 18 Feb 2019.

Vancouver:

Lin C. Attribute-based Encryption from Identity-based Encryption. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin C. Attribute-based Encryption from Identity-based Encryption. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0722116-022138

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Chuang, Yu-Lun. An Efficient Algorithm for the Shortest Vector Problem.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Lattice is widely used in cryptography since it has potential for defending quantum attacks. One of the significant problems in such cryptography is the shortest… (more)

Subjects/Keywords: Lattice; Algorithm Analysis; Optimization Theory; Lattice-Based Cryptography; Shortest Vector Problem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chuang, Y. (2016). An Efficient Algorithm for the Shortest Vector Problem. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chuang, Yu-Lun. “An Efficient Algorithm for the Shortest Vector Problem.” 2016. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chuang, Yu-Lun. “An Efficient Algorithm for the Shortest Vector Problem.” 2016. Web. 18 Feb 2019.

Vancouver:

Chuang Y. An Efficient Algorithm for the Shortest Vector Problem. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chuang Y. An Efficient Algorithm for the Shortest Vector Problem. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Gao, Han. Anonymous Fair P2P-Lending Scheme.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 P2P-Lending (P2PL) is a new kind of private lending with the feature like loan interest rate marketlized and distributed borrowers/lenders, etc. The development of lending… (more)

Subjects/Keywords: Fairness; Traceable; Electronic Contract; Proxy Signature; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, H. (2015). Anonymous Fair P2P-Lending Scheme. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gao, Han. “Anonymous Fair P2P-Lending Scheme.” 2015. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gao, Han. “Anonymous Fair P2P-Lending Scheme.” 2015. Web. 18 Feb 2019.

Vancouver:

Gao H. Anonymous Fair P2P-Lending Scheme. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gao H. Anonymous Fair P2P-Lending Scheme. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Lin, Yi-Hui. Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In smart gird environment, the power usage will be monitored and managed by an operation center that will also dynamically adjust the supply and demand… (more)

Subjects/Keywords: Smart Grid; Paillier Cryptosystem; Super-increasing Sequence; Data Aggregation; Privacy-Preserving

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2015). Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yi-Hui. “Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid.” 2015. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yi-Hui. “Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid.” 2015. Web. 18 Feb 2019.

Vancouver:

Lin Y. Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Chu, Huan-Kai. Mutually Anonymous Fair Exchange Protocol with Offline Third Party.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 With the rapid development of e-commerce, fair exchange has become an important and issue worthy of further discussion. Additionally, owing to rising awareness of privacy… (more)

Subjects/Keywords: fairness; off-line third party; mutually anonymous; fair exchange

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chu, H. (2015). Mutually Anonymous Fair Exchange Protocol with Offline Third Party. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chu, Huan-Kai. “Mutually Anonymous Fair Exchange Protocol with Offline Third Party.” 2015. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chu, Huan-Kai. “Mutually Anonymous Fair Exchange Protocol with Offline Third Party.” 2015. Web. 18 Feb 2019.

Vancouver:

Chu H. Mutually Anonymous Fair Exchange Protocol with Offline Third Party. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chu H. Mutually Anonymous Fair Exchange Protocol with Offline Third Party. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Chen, Shih-fen. Multi-Receiver Predicate Encryption for Online Social Networks.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 Among the applications of the internet and cloud computing, OSNs is the most popular one. Since lots of personal information will be stored on the… (more)

Subjects/Keywords: Predicate Encryption; Inner Product Encryption; Online Social Networks; Multi-Receiver; Bilinear Groups of Composite Order

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, S. (2015). Multi-Receiver Predicate Encryption for Online Social Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Shih-fen. “Multi-Receiver Predicate Encryption for Online Social Networks.” 2015. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Shih-fen. “Multi-Receiver Predicate Encryption for Online Social Networks.” 2015. Web. 18 Feb 2019.

Vancouver:

Chen S. Multi-Receiver Predicate Encryption for Online Social Networks. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen S. Multi-Receiver Predicate Encryption for Online Social Networks. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Chen, Chih-Yu. Secure Reusable Garbled Random Access Machine.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In 1980s, Yao proposed a secure computation which can allow two parties, one of which has a function f(â) and the other one has data… (more)

Subjects/Keywords: Garbled Circuits; Malicious Model; Garbled RAM; Secure Computation

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, C. (2015). Secure Reusable Garbled Random Access Machine. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-113647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Chih-Yu. “Secure Reusable Garbled Random Access Machine.” 2015. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-113647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Chih-Yu. “Secure Reusable Garbled Random Access Machine.” 2015. Web. 18 Feb 2019.

Vancouver:

Chen C. Secure Reusable Garbled Random Access Machine. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-113647.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen C. Secure Reusable Garbled Random Access Machine. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718115-113647

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Zhang , Si-Yuan. Dynamic Blockchain Storage Scheme Based on Sidechains.

Degree: Master, Computer Science and Engineering, 2018, NSYSU

 Due to the development of network technique, the cloud storages become more and more popular. Traditional physical memories are expansive, and with limited usable storage… (more)

Subjects/Keywords: Decentralization; Chameleon-Hash; Blockchain; Cloud Storage; Sidechain; Public Auditing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhang , S. (2018). Dynamic Blockchain Storage Scheme Based on Sidechains. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723118-125308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhang , Si-Yuan. “Dynamic Blockchain Storage Scheme Based on Sidechains.” 2018. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723118-125308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhang , Si-Yuan. “Dynamic Blockchain Storage Scheme Based on Sidechains.” 2018. Web. 18 Feb 2019.

Vancouver:

Zhang S. Dynamic Blockchain Storage Scheme Based on Sidechains. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723118-125308.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhang S. Dynamic Blockchain Storage Scheme Based on Sidechains. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723118-125308

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Chiu, Wan-Ru. Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System.

Degree: Master, Institute Of Computer Science And Engineering, 2018, NSYSU

 The 5th Generation Mobile Network (or 5th Generation Wireless System, 5G) is an extension of 4G. The major difference between other generations communication networks is… (more)

Subjects/Keywords: Authentication; 5G; Network Slicing; Edge Computing; Low-latency

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiu, W. (2018). Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiu, Wan-Ru. “Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System.” 2018. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiu, Wan-Ru. “Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System.” 2018. Web. 18 Feb 2019.

Vancouver:

Chiu W. Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiu W. Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0728118-231935

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Cheng, Yun-Chun. Attribute Hiding Access Control with Anonymous Sharing Using Predicate Encryption.

Degree: Master, Computer Science and Engineering, 2018, NSYSU

 In modern society we rely greatly on cloud servers to provide storage and service. However, through our usage of cloud services, privacy may come as… (more)

Subjects/Keywords: Anonymity; Attribute Hiding; Predicate Encryption; Access Control; Anonymous Sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2018). Attribute Hiding Access Control with Anonymous Sharing Using Predicate Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719118-134048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yun-Chun. “Attribute Hiding Access Control with Anonymous Sharing Using Predicate Encryption.” 2018. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719118-134048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yun-Chun. “Attribute Hiding Access Control with Anonymous Sharing Using Predicate Encryption.” 2018. Web. 18 Feb 2019.

Vancouver:

Cheng Y. Attribute Hiding Access Control with Anonymous Sharing Using Predicate Encryption. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719118-134048.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. Attribute Hiding Access Control with Anonymous Sharing Using Predicate Encryption. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719118-134048

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Su, Hui-Po. Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks.

Degree: Master, Institute Of Computer Science And Engineering, 2018, NSYSU

 As the rising popularity of Bitcoin, people tend to use Bitcoin wallets to managing the keys for spending or receiving funds. Instead of generating pairs… (more)

Subjects/Keywords: Privilege escalation attacks; Schnorr signature; Bitcoin; HD wallets; Trapdoor hash function; BIP032

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Su, H. (2018). Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-184442

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Su, Hui-Po. “Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks.” 2018. Thesis, NSYSU. Accessed February 18, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-184442.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Su, Hui-Po. “Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks.” 2018. Web. 18 Feb 2019.

Vancouver:

Su H. Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. [Internet] [Thesis]. NSYSU; 2018. [cited 2019 Feb 18]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-184442.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Su H. Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. [Thesis]. NSYSU; 2018. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721118-184442

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.