2002  Meeting  行 程 表

日期

報告者

報告題目 ( 或  paper )

投影片

2002/02/26 王乾隆 Flow shop Scheduling Problems with Transportation and Capacities Flow shop Scheduling Problems with Transportation and Capacities
2002/03/05 羅金錤 Dynamic Multi-signatures for Secure Autonomous Agents Dynamic Multi-signatures for Secure Autonomous Agents
2002/03/12 鍾敏毓 An user efficient fair e-cash scheme anonymous certificates An user efficient fair e-cash scheme anonymous certificates
2002/03/19 王上豪 Watermarking For Image Authentication Watermarking For Image Authentication
2002/03/26 邱文怡 New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel
2002/04/09 林偉立 Nogood Recording for Static and Dynamic Constraint Satisfaction Problems Nogood Recording for Static and Dynamic Constraint Satisfaction Problems
2002/04/23 周伯錕 A Perfect Threshold Secret Sharing Scheme to Identify Cheaters A Perfect Threshold Secret Sharing Scheme to Identify Cheaters
2002/04/30 劉兆樑 ID-based Signatures from Pairings on Elliptic Curves ID-based Signatures from Pairings on Elliptic Curves
2002/05/07 郭淑娟 一個新的代理簽章法 一個新的代理簽章法
2002/05/14 蔡篤校 Image Integrity and Correction Using Parities of Error Image Integrity and Correction Using Parities of Error
2002/05/21 曾斌誠 maximizing strength of digital watermarks using neural networks maximizing strength of digital watermarks using neural networks
2002/05/28 陳宗和 Three-Party EKE without server public-keys Three-Party EKE without server public-keys
 2002/09/17      劉兆樑 Identity-based authenticated key agreement protocol based on Weil pairing Identity-based authenticated key agreement protocol based on Weil pairing
2002/9/24 陳俊華 Neural Network(2) Neural Network(2)
2002/10/01 曾斌誠 Authenticated key agreement without using one-way hash functions Authenticated key agreement without using one-way hash functions 
2002/10/08 王乾隆 Gray Theory Grey Theory
2002/10/15 羅金騏 A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts
2002/10/22 郭淑娟 A practical off-line digital money system with partially blind signature based on the discrete logarithm problem A practical off-line digital money system with partially blind signature based on the discrete logarithm problem
2002/10/29 周伯錕 Optical Fingerprinting to Protect Data: A Proposal Optical Fingerprinting to Protect Data: A Proposal
2002/11/05 曾斌誠 一個植基於類神經網路之具強韌性的無失真著作權保護技術 一個植基於類神經網路之具強韌性的無失真著作權保護技術
2002/11/19 蔡篤校 Software Watermarking Models And Dynamic Embeddings Software Watermarking Models And Dynamic Embeddings
2002/11/26 周伯錕 Wang-Chang之以智慧卡為驗證基礎之通行碼確認方法的改進 Wang-Chang之以智慧卡為驗證基礎之通行碼確認方法的改進
2002/12/03 許琪慧 Identity-Based Signcryption  
2002/12/10 黃耀德 A Remote Password Authentication Scheme A Remote Password Authentication Scheme
2002/12/17 張家銘 Generalized Regression Neural Networks for Biomedical Image Interpolation Generalized Regression Neural Networks for Biomedical Image Interpolation
2002/12/24 黃珮瑩 Remote password authentication scheme based on cross-product Remote password authentication scheme based on cross-product
2002/12/31 林光隆 Ant Colony Optimization for Job Shop Scheduling Ant Colony Optimization for Job Shop Scheduling