Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Current
Archives
Search
Search
Register
Login
Search
Search
, Taiwan, Province of China
Information Technology and Control Vol. 50 No. 2 (2021)
- Articles
Quantum-Resistant Network for Classical Client Compatibility
Abstract
PDF
Information Technology and Control Vol. 50 No. 2 (2021)
- Articles
Congestion-Preventing Routing and Charging Scheduling Mechanism for Electric Vehicles in Dense Urban Areas
Abstract
PDF
Information Technology and Control Vol. 51 No. 4 (2022)
- Articles
Revocable Certificateless Public Key Encryption with Equality Test
Abstract
PDF
Information Technology and Control Vol. 52 No. 4 (2023)
- Articles
CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKS
Abstract
PDF
Information Technology and Control Vol. 40 No. 1 (2011)
- Articles
AN AUTOMATIC CALIBRATION METHOD BASED ON FEATURE POINT MATCHING FOR THE COOPERATION OF WIDE-ANGLE AND PAN-TILT-ZOOM CAMERAS
Abstract
PDF
Information Technology and Control Vol. 40 No. 2 (2011)
- Articles
SECURE SMART CARD BASED PASSWORD AUTHENTICATION SCHEME WITH USER ANONYMITY
Abstract
PDF
Information Technology and Control Vol. 40 No. 3 (2011)
- Articles
A Novel Variance-Based Intra-Frame Rate Control Algorithm for H.264/AVC
Abstract
PDF
Information Technology and Control Vol. 40 No. 3 (2011)
- Articles
A Robust Remote User Authentication Scheme Using Smart Card
Abstract
PDF
Information Technology and Control Vol. 40 No. 3 (2011)
- Articles
An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem
Abstract
PDF
Information Technology and Control Vol. 41 No. 1 (2012)
- Articles
A VERIFIABLE PROXY SIGNATURE SCHEME BASED ON BILINEAR PAIRINGS WITH IDENTITY-BASED CRYPTOGRAPHIC APPROACHES
Abstract
PDF
Information Technology and Control Vol. 41 No. 2 (2012)
- Articles
Towards scalable key management for secure multicast communication
Abstract
PDF
Information Technology and Control Vol. 41 No. 3 (2012)
- Articles
An Improved Delegation-Based Authentication Protocol for PCSs
Abstract
PDF
Information Technology and Control Vol. 41 No. 3 (2012)
- Articles
A Novel Mutual Authentication Scheme for RFID conforming EPCglobal Class 1 Generation 2 Standards
Abstract
PDF
Information Technology and Control Vol. 41 No. 2 (2012)
- Articles
A New Approach to the Fault Detection Problem for Mobile P2P Network
Abstract
PDF
Information Technology and Control Vol. 41 No. 2 (2012)
- Articles
Simple and Efficient Signature-based Consensus Protocol in the Asynchronous Distributed System
Abstract
PDF
Information Technology and Control Vol. 41 No. 1 (2012)
- Articles
A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS
Abstract
PDF
Information Technology and Control Vol. 41 No. 1 (2012)
- Articles
A MORE SECURE AND EFFICIENT AUTHENTICATION SCHEME WITH ROAMING SERVICE AND USER ANONYMITY FOR MOBILE COMMUNICATIONS
Abstract
PDF
Information Technology and Control Vol. 41 No. 3 (2012)
- Articles
Application of a Chaotic Synchronization System to Secure Communication
Abstract
PDF
Information Technology and Control Vol. 42 No. 1 (2013)
- Articles
A New Group Signature Scheme Based on RSA Assumption
Abstract
PDF
Information Technology and Control Vol. 42 No. 2 (2013)
- Articles
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy
Abstract
PDF
Information Technology and Control Vol. 42 No. 2 (2013)
- Articles
Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech
Abstract
PDF
Information Technology and Control Vol. 42 No. 4 (2013)
- Articles
Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings
Abstract
PDF
Information Technology and Control Vol. 42 No. 4 (2013)
- Articles
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment
Abstract
PDF
Information Technology and Control Vol. 42 No. 2 (2013)
- Articles
Efficient Revocable Multi-Receiver ID-Based Encryption
Abstract
PDF
Information Technology and Control Vol. 42 No. 3 (2013)
- Articles
A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing
Abstract
PDF
Information Technology and Control Vol. 42 No. 3 (2013)
- Articles
Secure Universal Designated Verifier Signature and its Variant for Privacy Protection
Abstract
PDF
Information Technology and Control Vol. 43 No. 2 (2014)
- Articles
Enhanced Secure Authentication Scheme with Anonymity for Roaming in Mobility Networks
Abstract
PDF
Information Technology and Control Vol. 42 No. 4 (2013)
- Articles
Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET
Abstract
PDF
Information Technology and Control Vol. 43 No. 2 (2014)
- Articles
An Efficient Search Strategy for ACELP Algebraic Codebook by Means of Reduced Candidate Mechanism and Iteration-Free Pulse Replacement
Abstract
PDF
Information Technology and Control Vol. 43 No. 3 (2014)
- Articles
Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension
Abstract
PDF
Information Technology and Control Vol. 43 No. 3 (2014)
- Articles
Strongly Secure Revocable ID-based Signature without Random Oracles
Abstract
PDF
Information Technology and Control Vol. 43 No. 4 (2014)
- Articles
Design of Pairing-Based Proxy Signcryption System Model for Online Proxy Auctions
Abstract
PDF
Information Technology and Control Vol. 43 No. 3 (2014)
- Articles
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
Abstract
PDF
Information Technology and Control Vol. 44 No. 1 (2015)
- Articles
An Efficient Resource Allocation Framework for Cloud Federations
Abstract
PDF
Information Technology and Control Vol. 44 No. 2 (2015)
- Articles
An Anonymous and Lightweight Authentication Scheme for Mobile Devices
Abstract
PDF
Information Technology and Control Vol. 44 No. 3 (2015)
- Articles
Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs
Abstract
PDF
Information Technology and Control Vol. 38 No. 1 (2009)
- Articles
AN EXTENDED CERTIfiCATE-BASED AUTHENTICATION AND SECURITY PROTOCOL FOR MOBILE NETWORKS
Abstract
PDF
Information Technology and Control Vol. 37 No. 4 (2008)
- Articles
ON SECURITY OF A PRACTICAL THREE-PARTY KEY EXCHANGE PROTOCOL WITH ROUND EFfiCIENCY
Abstract
PDF
Information Technology and Control Vol. 39 No. 1 (2010)
- Articles
A KEY AGREEMENT SCHEME FOR SATELLITE COMMUNICATIONS
Abstract
PDF
Information Technology and Control Vol. 39 No. 1 (2010)
- Articles
WEAKNESSES AND IMPROVEMENT OF HSU-CHUANG’S USER IDENTIFICATION SCHEME
Abstract
PDF
Information Technology and Control Vol. 39 No. 2 (2010)
- Articles
A PARALLEL PASSWORD-AUTHENTICATED KEY EXCHANGE PROTOCOL FOR WIRELESS ENVIRONMENTS
Abstract
PDF
Information Technology and Control Vol. 39 No. 3 (2010)
- Articles
REAL UNDERSTANDING OF LPN-PROBLEM-BASED LIGHTWEIGHT AUTHENTICATION PROTOCOLS
Abstract
PDF
Information Technology and Control Vol. 39 No. 3 (2010)
- Articles
EAGLE-EYE: A DUAL-PTZ-CAMERA SYSTEM FOR TARGET TRACKING IN A LARGE OPEN AREA
Abstract
PDF
Information Technology and Control Vol. 45 No. 4 (2016)
- Articles
New Anatomy of Trustworthy Mobile Cloud Computing
Abstract
PDF
Information Technology and Control Vol. 45 No. 1 (2016)
- Articles
Secure Certificateless Two-Party Key Agreement with Short Message
Abstract
Information Technology and Control Vol. 45 No. 3 (2016)
- Articles
A Searchable Hierarchical Conditional Proxy Re-encryption Scheme for Cloud Storage Services
Abstract
PDF
Information Technology and Control Vol. 46 No. 2 (2017)
- Articles
Anonymous and Authentication Protocol For Multi-Server
Abstract
PDF
Information Technology and Control Vol. 46 No. 4 (2017)
- Articles
An Electronic Public Engineering Project Bidding Protocol via a Subliminal Channel
Abstract
PDF
Information Technology and Control Vol. 46 No. 4 (2017)
- Articles
PCMAE: A Proxy Convertible Multi-AE Scheme and Its Variant
Abstract
PDF
Information Technology and Control Vol. 47 No. 2 (2018)
- Articles
Leakage-Resilient Certificateless Signature Under Continual Leakage Model
Abstract
PDF
Information Technology and Control Vol. 47 No. 2 (2018)
- Articles
A Biometric-Based Authentication and Anonymity Scheme for Digital Rights Management System
Abstract
PDF
Information Technology and Control Vol. 48 No. 4 (2019)
- Articles
A Novel CCA-Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions
Abstract
PDF
Information Technology and Control Vol. 49 No. 2 (2020)
- Articles
Multiclass Membership Determination Integrating an ID-Bound Method with Bloom Filter
Abstract
PDF
Information Technology and Control Vol. 49 No. 4 (2020)
- Articles
Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server
Abstract
PDF
Information Technology and Control Vol. 45 No. 2 (2016)
- Regular Papers
Simultaneous and Anonymous Mobile Network Authentication Scheme Based on Chaotic Maps
Abstract
PDF
Information Technology and Control Vol. 44 No. 4 (2015)
- Articles
Efficient statistics-based algebraic codebook search algorithms derived from RCM for an ACELP speech coder
Abstract
PDF
Information Technology and Control Vol. 44 No. 2 (2015)
- Articles
Strong Designated Verifier Signature Scheme Resisting Replay Attack
Abstract
PDF
Information
For Readers
For Authors
For Librarians