<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Rasheed Gbenga Jimoh</style></author><author><style face="normal" font="default" size="100%">Olayinka Olufunmilayo Olusanya</style></author><author><style face="normal" font="default" size="100%">Joseph Bamidele Awotunde</style></author><author><style face="normal" font="default" size="100%">Agbotiname Lucky Imoize</style></author><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Identification of Risk Factors Using ANFIS-Based Security Risk Assessment Model for SDLC Phases</style></title><secondary-title><style face="normal" font="default" size="100%">Future Internet</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2022</style></year></dates><volume><style face="normal" font="default" size="100%">14</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">305</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">I-En Liao</style></author><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security Enhancement for a Dynamic ID-Based Remote User Authentication Scheme</style></title><secondary-title><style face="normal" font="default" size="100%">International Conference on Next Generation Web Services Practices</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2005</style></date></pub-dates></dates><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author><author><style face="normal" font="default" size="100%">Yan-Chi Lai</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Untraceable Blind Signature Scheme</style></title><secondary-title><style face="normal" font="default" size="100%">IEICE Transactions on Foundations </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><volume><style face="normal" font="default" size="100%">7</style></volume><pages><style face="normal" font="default" size="100%">1902-1906</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Wei-Peng Yang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Flexible Remote User Authentication Scheme with Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Operating System Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">36</style></volume><pages><style face="normal" font="default" size="100%">46-52</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">3</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author><author><style face="normal" font="default" size="100%">Li-Hua Li</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Remote User Authentication Scheme Using Hash Functions</style></title><secondary-title><style face="normal" font="default" size="100%">ACM SIGOPS Operating Systems Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">October 2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">36</style></volume><pages><style face="normal" font="default" size="100%">23-29</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author><author><style face="normal" font="default" size="100%">Li-Hua Li</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Remote User Authentication Scheme Using Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Operating Systems Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">36</style></volume><pages><style face="normal" font="default" size="100%">23-29</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Yuan-Liang Tang</style></author><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">A Simple Remote User Authentication Scheme</style></title><secondary-title><style face="normal" font="default" size="100%">Mathematical and Computer Modelling</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2002</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">36</style></volume><pages><style face="normal" font="default" size="100%">103-107</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Min-Shiang Hwang</style></author><author><style face="normal" font="default" size="100%">Yan-Chi Lai</style></author><author><style face="normal" font="default" size="100%">Cheng-Chi Lee</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Traceability on Low-Computation Partially Blind Signatures for Electronic Cash</style></title><secondary-title><style face="normal" font="default" size="100%">IEICE Fundamentals on Electronics, Communications and Computer Sciences E85-A</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2002</style></year></dates><volume><style face="normal" font="default" size="100%">5</style></volume><pages><style face="normal" font="default" size="100%">1181-1182</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>