Basic Search / Search Result

  • Search Result: 9results Search Strategy: "Yuan-Cheng Lai".ecommittee (Phrase) and edept.raw="Department of Information Management" and ekeyword.raw="Anonymity" and edept.raw="Department of Information Management"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Anonymous Mobile Payment Protocol Using ECC-based Self-certified Public Key System

    2

    Fairness and Anonymous Account-based Mobile Payment Protocol
    • Department of Information Management /96/ Master
    • Author: Chung-yao Wang Advisor: Tzong-chen Wu
    • Along with the development of Information Technology, the portability and efficiency of mobile devi…
    • Clicks: 506Downloads: 3
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    3

    Smart Card-based Anonymous Authentication Mechanisms

    4

    Hash-based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks

    5

    rivacy-Preserving E-Invoicing in Physical Channels via Near Field Communication - An Example based on Taiwan’s Uniform E-Invoice System
    • Department of Information Management /102/ Master
    • Author: Chih-Teng Tseng Advisor: Shi-Cho Cha
    • Countries around the world promote e-invoices recently. To identify buyers of trans- actions, merch…
    • Clicks: 569Downloads: 0
    • Full text public date 2019/07/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    6

    An Anonymous Vehicle Authentication Protocol Based on Zero-Knowledge Proofs in Internet of Vehicles
    • Department of Information Management /112/ Master
    • Author: Kai-Shaing Zhang Advisor: Nai-Wei Lo
    • This paper aims to design a secure and reliable anonymous identity authentication protocol utilizin…
    • Clicks: 344Downloads: 0
    • Full text public date 2026/08/28 (Intranet public)
    • Full text public date 2026/08/28 (Internet public)
    • Full text public date 2026/08/28 (National library)

    7

    Anonymous Handover Authentication and Key Exchange Protocol for Mobile Wireless Network

    8

    Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks

    9

    Simulation Implementation and Performance Evaluation on HASR Protocol
    1