2018 |
劉兆樑(Chao-Liang Liu)、Wang-Jui Tsai、Ting-Yi Chang(Ting-Yi Chang)*、Ta-Ming Liu, Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments, Symmetry-Basel, vol.10 no.4 pp.84-108, 2018 |
2016 |
劉兆樑(Chao-Liang Liu)、Gwoboa Horng、Du-Shiau Tsai, Speeding up Pairing Computation Using Non-adjacent Form and ELM Method, International Journal of Network Security, vol.18 no.1 pp.108-115, 2016 |
2015 |
劉兆樑(Chao-Liang Liu)、Cheng-Jung Tsai、Ting-Yi Chang、Wang-Jui Tsai、Po-Kai Zhong, Implementing Multiple Biometric Features for a Recall-Based Graphical Keystroke Dynamics Authentication Systemon a Smart Phone, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, vol.53 pp.128-139, 2015 |
2015 |
劉兆樑(Chao-Liang Liu)、Wang-Jui Tsai、Ting-Yi Chang、Chun-Cheng Peng、Peng-Shiang Wong, Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion, COMPUTER JOURNAL, vol.58 no.7 pp.1598-1606, 2015 |
2014 |
Yu-Chi Chen、劉兆樑(Chao-Liang Liu)、Gwoboa Horng, Cryptanalysis of some user identification schemes for distributed computer networks, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, vol.27 no.11 pp.2909-2917, 2014 |
2014 |
Yu-Chi Chen、劉兆樑(Chao-Liang Liu)、Gwoboa Horng, Cryptanalysis of some user identification schemes for distributed computer networks, INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, vol.27 no.11 pp.2909-2917, 2014 |
2013 |
Yu-Chi Chen、Gwoboa Horng、劉兆樑(Chao-Liang Liu), Strong non-repudiation based on certificateless short signatures, IET Information Security, vol.7 no.3 pp.253-263, 2013 |
2012 |
劉兆樑(Chao-Liang Liu)、Ting-Yi Chang、Mao-Lun Chiang、Cheng-Jung Tsai, A Simple Keystroke Dynamics-Based Authentication System using Means and Standard Deviations, Journal of Internet Technology, vol.13 no.03 pp.439-444, 2012 |
2012 |
Yu-Chi Chen、Gwoboa Horng、劉兆樑(Chao-Liang Liu)、蔡淵裕(Yuan-Yu Tsai)、詹啟祥(Chi-Shiang Chan), Efficient Certificateless Aggregate Signature Scheme, Journal of Electronic Science and Technology, vol.10 no.03 pp.209-214, 2012 |
2012 |
詹啟祥(Chi-Shiang Chan)、蔡淵裕(Yuan-Yu Tsai)、劉兆樑(Chao-Liang Liu), An Image Authentication Method by Grouping Most Significant Bits, Journal of Electronic Science and Technology, vol.10 no.03, 2012 |
2011 |
Duc-Phong Le、劉兆樑(Chao-Liang Liu)*, Refinements of Miller's Algorithm over Weierstrass Curves Revisited, COMPUTER JOURNAL, vol.54 no.10 pp.1582-1591, 2011 |
2011 |
劉兆樑(Chao-Liang Liu), An Efficient Certificateless Aggregate Signature Scheme, FUNDAMENTA INFORMATICAE, 2011 |
2011 |
劉兆樑(Chao-Liang Liu), Girault's level-3 security in certificateless cryptography revisited, COMPUTERS & SECURITY, 2011 |
2011 |
Yu-Chi Chen、劉兆樑(Chao-Liang Liu)*、Gwoboa Horng、Kuo-Chang Chen, A provably secure certificateless proxy signature scheme, International Journal of Innovative Computing Information and Control, vol.7 no.9 pp.5557-5569, 2011 |
2008 |
劉兆樑(Chao-Liang Liu)、洪國寶(Gwoboa Horng)、劉欣喻(Hsin-Yu Liu), Computing the Modular Inverses Is as Simple as Computing the GCDs, FINITE FIELDS AND THEIR APPLICATIONS, vol.14 no.1 pp.65-75, 2008 |
2007 |
劉兆樑(Chao-Liang Liu), Further Refinement of Pairing Computation Based on Miller''s Algorithm, APPLIED MATHEMATICS AND COMPUTATION, vol.189 no.1 pp.395-409, 2007 |
2006 |
劉兆樑(Chao-Liang Liu), Performance Improvement for the GGM-Construction of Pseudorandom Functions, APPLIED MATHEMATICS AND COMPUTATION, vol.183 no.1 pp.486-490, 2006 |
2005 |
劉兆樑(Chao-Liang Liu), Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem, IEICE TRANSACTIONS ON COMMUNICATIONS, vol.E88-B no.5 pp.2171-2172, 2005 |
2004 |
劉兆樑(Chao-Liang Liu), Security Analysis of a Threshold Access Control Scheme Based on Smart Cards, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUT, vol.E87-A no.8 pp.2177-2179, 2004 |