Skip to main content

CSDM Logo

Information Techologies for Security

JTSAC logo

  • IT for Security
  • Team
    • Researchers
    • Associates
    • Support Staff
    • PHD Students
  • Projects
    • Ongoing
    • Upcoming
    • Finalized
  • Courses
    • Defence policy
    • Security Studies
    • Cybersecurity
    • Administration
    • Management
    • Economics
    • Innovations
    • Themes
    • all courses
  • Resources
    • Publications
    • IT4Sec Reports
    • CSDM Views
    • Presentations
    • Books
  • Events
  • Partners
  • Contact

Biblio

Export 3 results:
  • RTF
  • EndNote XML
Filters: Author is Jinn-Ke Jan  [Clear All Filters]
2003
Chien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "Cryptanalysis on Mu-Varadharajan’s e-Voting Schemes." Applied Mathematics and Computation 139, no. 2-3 (2003): 525-530.
  • Google Scholar(link is external)
  • RTF
  • EndNote XML
2002
Chien, Hung-Yu, Jinn-Ke Jan, and Yuh-Min Tseng. "An Efficient and Practical Solution to Remote Authentication: Smart Card." Computers & Security 21, no. 4 (2002): 372-375.
  • Google Scholar(link is external)
  • RTF
  • EndNote XML
1999
Tseng, Yuh-Min, and Jinn-Ke Jan. "Anonymous Conference Key Distribution Systems Based on the Discrete Logarithm Problem(link is external)." Computer Communications 22, no. 8 (1999): 749-754.
  • Google Scholar(link is external)
  • RTF
  • EndNote XML
  • English
  • Български
  • Facebook icon
  • Twitter icon
  • LinkedIn icon

Search form

Resources

  • Security policy
  • Cybersecurity
  • Intelligence
  • Law Enforcement
  • Terrorism
  • Operations
  • Technologies & Industry
  • Personnel management
  • Acquisition Management
  • Strategy
  • Concepts and doctrine
  • Management
  • Defence economics
  • Financial management
  • Information & knowledge management
  • Simulation and Training
  • Change management
  • Decision-making
  • Good governance

Partner sites

Information & Security: An International JournalSecurity & Defence Mangement siteConnectins: The Quarterly Journal

IT4Sec News

Study on 2035 scenarios on defence resource allocation

read more >>

Contribution to the Inter-Parliamentary Conference on CFSP and CSDP

read more >>

Vol. 29 of I&S on Scenario-based Security Foresight is available online

read more >>

Crisis Management study tour to France

read more >>

Information Security Workshop, 26-28 Sep 2019

read more >>
view all

  

 Trade mark of IIKT bas-logo

© IT for Security Department, Institute of ICT(link is external), 2010 -