Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Current
Archives
Search
Search
Register
Login
Search
Search
, Asia University, Taiwan, Province of China
Information Technology and Control Vol. 43 No. 3 (2014)
- Articles
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
Abstract
PDF
Information Technology and Control Vol. 38 No. 1 (2009)
- Articles
AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS
Abstract
PDF
Information Technology and Control Vol. 37 No. 4 (2008)
- Articles
ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY
Abstract
PDF
Information Technology and Control Vol. 39 No. 1 (2010)
- Articles
A KEY AGREEMENT SCHEME FOR SATELLITE COMMUNICATIONS
Abstract
PDF
Information Technology and Control Vol. 42 No. 1 (2013)
- Articles
A New Group Signature Scheme Based on RSA Assumption
Abstract
PDF
Information Technology and Control Vol. 42 No. 3 (2013)
- Articles
A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing
Abstract
PDF
Information
For Readers
For Authors
For Librarians