<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hung-Min Sun</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Efficient Remote User Authentication Scheme Using Smart Cards</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Transactions on Consumer Electronics</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year><pub-dates><date><style  face="normal" font="default" size="100%">November 2000</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">46</style></volume><pages><style face="normal" font="default" size="100%">958-961</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Chun-Li Lin</style></author><author><style face="normal" font="default" size="100%">Tzonelih Hwang</style></author><author><style face="normal" font="default" size="100%">Hung-Min Sun</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Three-Party Encrypted Key Exchange: Attacks and a Solution</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Operating Systems Review</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">12-20</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">4</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hung-Min Sun</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Communications</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">717-722</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">8</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hung-Min Sun</style></author><author><style face="normal" font="default" size="100%">Tzonelih Hwang</style></author><author><style face="normal" font="default" size="100%">Narn-Yih Lee</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Nonrepudiable Threshold Proxy Signatures</style></title><secondary-title><style face="normal" font="default" size="100%">9th National Conference on Information Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><pub-location><style face="normal" font="default" size="100%">Taiwan</style></pub-location><pages><style face="normal" font="default" size="100%">254-261</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hung-Min Sun</style></author><author><style face="normal" font="default" size="100%">B.-T. Hsieh</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Remark on Two Nonrepudiable Proxy Signature Schemes</style></title><secondary-title><style face="normal" font="default" size="100%">9th National Conference on Information Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><pub-location><style face="normal" font="default" size="100%">Taiwan</style></pub-location><pages><style face="normal" font="default" size="100%">241-246</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hung-Min Sun</style></author><author><style face="normal" font="default" size="100%">Tzonelih Hwang</style></author><author><style face="normal" font="default" size="100%">Narn-Yih Lee</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Threshold Proxy Signatures</style></title><secondary-title><style face="normal" font="default" size="100%">IEE Proceedings- Computers and Digital Techniques</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><volume><style face="normal" font="default" size="100%">146</style></volume><pages><style face="normal" font="default" size="100%">259-263</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">5</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Hung-Min Sun</style></author><author><style face="normal" font="default" size="100%">Biing-Jang Chen</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Time-Stamp Proxy Signature with Traceable Receivers</style></title><secondary-title><style face="normal" font="default" size="100%">9th National Conference on Information Security</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><pub-location><style face="normal" font="default" size="100%">Taiwan</style></pub-location><pages><style face="normal" font="default" size="100%">247-253</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>