Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Wen-Sheng Juang"). Showing records 1 – 10 of 10 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


NSYSU

1. Cho, Yan-Fu. Authenticated Re-Encryption Scheme for Named Data Network.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IPâs architecture has limitations… (more)

Subjects/Keywords: Authentication; Secure Transfer Protocol; Named Data Network; Proxy Re-Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, Y. (2014). Authenticated Re-Encryption Scheme for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Web. 19 Jun 2019.

Vancouver:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Zhong, Min-Zhe. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Due to the rising number of mobile devices and the increasing demand for better quality of service (QoS), issues related to the next generation of… (more)

Subjects/Keywords: handover; authentication; privacy preserving; active revocation; 5G mobile communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, M. (2014). Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Web. 19 Jun 2019.

Vancouver:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Kuo, Chia-Hsiu. Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 The development of the Internet, especially the rise of cloud computing, is providing more and more users (individuals as well as enterprises) access to cloud… (more)

Subjects/Keywords: Access Control; Data De-Duplication; Data Privacy; Cloud Computing; Attribute-Based Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, C. (2013). Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Chia-Hsiu. “Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data.” 2013. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Chia-Hsiu. “Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data.” 2013. Web. 19 Jun 2019.

Vancouver:

Kuo C. Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo C. Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Cheng, Chen-Kai. Secure File Transfer Procotol for Named Data Network.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 In traditional TCP/IP network architecture, computer systems communicate with each other based on IP address; Because of usersâ network flow requirement and usage amount nowadays,… (more)

Subjects/Keywords: Secure Transfer Protocol; Authorization; Proxy Re-Encryption; Named Data Network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, C. (2013). Secure File Transfer Procotol for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Chen-Kai. “Secure File Transfer Procotol for Named Data Network.” 2013. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Chen-Kai. “Secure File Transfer Procotol for Named Data Network.” 2013. Web. 19 Jun 2019.

Vancouver:

Cheng C. Secure File Transfer Procotol for Named Data Network. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng C. Secure File Transfer Procotol for Named Data Network. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Hsu, Jen-Chun. Anonymous Credential Scheme Supporting Active Revocation.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 With the rapid development of electronic commerce, digital credentials are used with increasing frequency. Today users employing digital credentials not only com- plete the identity… (more)

Subjects/Keywords: Revocation; Cryptography; Privacy; Anonymity; Digital Credential

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, J. (2013). Anonymous Credential Scheme Supporting Active Revocation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Jen-Chun. “Anonymous Credential Scheme Supporting Active Revocation.” 2013. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Jen-Chun. “Anonymous Credential Scheme Supporting Active Revocation.” 2013. Web. 19 Jun 2019.

Vancouver:

Hsu J. Anonymous Credential Scheme Supporting Active Revocation. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu J. Anonymous Credential Scheme Supporting Active Revocation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Chen, Yen-hao. A Verifiable Payment Mechanism with Privacy-Preserving in Smart Grid.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Smart grids have become a future trend due to the development of technology and increased energy demand and consumption. In smart grids, usersâ electricity consumption… (more)

Subjects/Keywords: Blind Signature; Privacy-Preserving; Electronic Cash; Data Aggregation; Smart Grid

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2016). A Verifiable Payment Mechanism with Privacy-Preserving in Smart Grid. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-101030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yen-hao. “A Verifiable Payment Mechanism with Privacy-Preserving in Smart Grid.” 2016. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-101030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yen-hao. “A Verifiable Payment Mechanism with Privacy-Preserving in Smart Grid.” 2016. Web. 19 Jun 2019.

Vancouver:

Chen Y. A Verifiable Payment Mechanism with Privacy-Preserving in Smart Grid. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-101030.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. A Verifiable Payment Mechanism with Privacy-Preserving in Smart Grid. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-101030

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Chuang, Yu-Lun. An Efficient Algorithm for the Shortest Vector Problem.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Lattice is widely used in cryptography since it has potential for defending quantum attacks. One of the significant problems in such cryptography is the shortest… (more)

Subjects/Keywords: Lattice; Algorithm Analysis; Optimization Theory; Lattice-Based Cryptography; Shortest Vector Problem

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chuang, Y. (2016). An Efficient Algorithm for the Shortest Vector Problem. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chuang, Yu-Lun. “An Efficient Algorithm for the Shortest Vector Problem.” 2016. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chuang, Yu-Lun. “An Efficient Algorithm for the Shortest Vector Problem.” 2016. Web. 19 Jun 2019.

Vancouver:

Chuang Y. An Efficient Algorithm for the Shortest Vector Problem. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chuang Y. An Efficient Algorithm for the Shortest Vector Problem. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-132326

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Feng, Cheng-Chun. Efficient Attribute-Based Encryption with Dynamic Membership.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 Attribute-based encryption (ABE) is an access control mechanism where a sender can encrypt a secret message according to an attribute set for multiple receivers. In… (more)

Subjects/Keywords: Bilinear pairing; Ciphertext-policy attribute-based encryption; Access control; Linear secret sharing scheme; Dynamic membership

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Feng, C. (2015). Efficient Attribute-Based Encryption with Dynamic Membership. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Feng, Cheng-Chun. “Efficient Attribute-Based Encryption with Dynamic Membership.” 2015. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Feng, Cheng-Chun. “Efficient Attribute-Based Encryption with Dynamic Membership.” 2015. Web. 19 Jun 2019.

Vancouver:

Feng C. Efficient Attribute-Based Encryption with Dynamic Membership. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Feng C. Efficient Attribute-Based Encryption with Dynamic Membership. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Huang, Shi-Yuan. Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage.

Degree: PhD, Institute of Computer Science and Engineering, 2013, NSYSU

 In traditional public-key encryption, a receiver generates a pair of keys, a private key SK and a corresponding public key PK. A sender obtains the… (more)

Subjects/Keywords: Cloud Storage; Cloud Computing; Search; Predicate Encryption; Privacy Preserving

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, S. (2013). Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0330113-121409

Chicago Manual of Style (16th Edition):

Huang, Shi-Yuan. “Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage.” 2013. Doctoral Dissertation, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0330113-121409.

MLA Handbook (7th Edition):

Huang, Shi-Yuan. “Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage.” 2013. Web. 19 Jun 2019.

Vancouver:

Huang S. Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage. [Internet] [Doctoral dissertation]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0330113-121409.

Council of Science Editors:

Huang S. Controllable Predicate Encryption Schemes for Privacy Preserving Search in Cloud Storage. [Doctoral Dissertation]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0330113-121409


NSYSU

10. Wu, Chien-nan. On-the-fly Signature Schemes with Unlinkability.

Degree: PhD, Computer Science and Engineering, 2013, NSYSU

 Privacy is an essential requirement for users of these services and applications on the Internet; however, protecting the privacy of individuals or sensitive information is… (more)

Subjects/Keywords: Partially Blind Signature; On-line/Off-line Signature; Anonymous Credential System; Chameleon Hash Function; Unlinkability; Elliptic Curve

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, C. (2013). On-the-fly Signature Schemes with Unlinkability. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0409113-192629

Chicago Manual of Style (16th Edition):

Wu, Chien-nan. “On-the-fly Signature Schemes with Unlinkability.” 2013. Doctoral Dissertation, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0409113-192629.

MLA Handbook (7th Edition):

Wu, Chien-nan. “On-the-fly Signature Schemes with Unlinkability.” 2013. Web. 19 Jun 2019.

Vancouver:

Wu C. On-the-fly Signature Schemes with Unlinkability. [Internet] [Doctoral dissertation]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0409113-192629.

Council of Science Editors:

Wu C. On-the-fly Signature Schemes with Unlinkability. [Doctoral Dissertation]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0409113-192629

.