| 亞洲大學 |
2015-11 |
A Safety Review on Fuzzy-based Relay Selection in Wireless Sensor Networks
|
Feng), 馮棟煌(Tung-Huang;Shih), 施能義(Neng-Yih;黃明祥 |
| 亞洲大學 |
2015-09 |
A Survey of Digital Evidences Forensic and Cybercrime Investigation Procedure
|
Sun), 孫加榮(Jia-Rong;施茂林;黃明祥 |
| 亞洲大學 |
2015-07 |
An Efficient IC-Lock Self-Reader Data Security in Cloud Computing
|
黃明祥;Le, Cheng-Chi;Chu, Pei-Shan |
| 亞洲大學 |
2015-07 |
The Secure Transaction Protocol in NFC Card Emulation Mode
|
Chi), 紀逸倫(Yi-Lun;Chen), C. H. Chen(Cheng Hao;Lin), I. C. Lin(Iuon-Chang;黃明祥 |
| 亞洲大學 |
2015-07 |
An Efficient Batch Verifying Scheme for Detecting Illegal Signatures
|
Ren), YanLi Ren(YanLi;Wang), S. Z Wang(Shuozhong;Zhang), X. P.Zhang(Xinpeng;黃明祥 |
| 國立臺灣體育運動大學 |
2015-06 |
探討 桌球選手彭婉華準備 2011年全國大專校院運動會混合雙打
|
彭婉華;黃明祥;郭智翔 |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Chia-Hui Wei(Chia-Hui Wei); 黃明祥; Y, H.Chin(Augustin Yeh-hao Chin) |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin) |
| 亞洲大學 |
2015-05 |
A False Data Report Filtering Scheme in Wireless Sensor Networks: A Survey
|
Feng), 馮棟煌(Tung-Huang;Li), Wei Teng Li(Wei Teng;黃明祥 |
| 亞洲大學 |
2015-03 |
Improvement on Timestamp-based User Authentication Scheme with Smart Card Lost Attack Resistance
|
Wijayanto), H. Wijayanto(Heri;黃明祥 |
| 亞洲大學 |
2015-01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
;黃明祥 |
| 亞洲大學 |
2015-01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
Sun, Jia-Rong;Sun, Jia-Rong;黃明祥 |
| 亞洲大學 |
2015-01 |
A New Investigation Approach for Tracing Source IP in DDoS attack from Proxy Server
|
Sun), Jia-Rong Sun(Jia-Rong;黃明祥 |
| 亞洲大學 |
2015 |
PHP+MySQL 資訊管理系統
|
黃明祥 |
| 亞洲大學 |
201411 |
Group Rekeying in Wireless Sensor Networks: A Survey
|
Li, Wei Teng;Li, Wei Teng;林宗輝;黃明祥 |
| 亞洲大學 |
201407 |
Phenethyl isothiocyanate triggers apoptosis in human malignant melanoma A375.S348 cells through reactive oxygen species and the mitochondria-dependent pathways
|
Yang), L.C.Huang(Li-Chin Huang); 黃明祥; W.P.Yang(Wei-Pang |
| 亞洲大學 |
201407 |
A Conference Key Distribution Scheme in Tree Hierarchies
|
Yang), L.C.Huang(Li-Chin Huang); 黃明祥; W.P.Yang(Wei-Pang |
| 國立交通大學 |
2014-12-12T02:46:11Z |
可證明安全的公開金鑰密碼系統與通行碼驗證金鑰交換
|
張庭毅; Ting-Yi Chang; 楊維邦; 黃明祥; Wei-Pang Yang; Min-Shiang Hwang |
| 國立交通大學 |
2014-12-12T02:28:52Z |
微振量測器之分析與應用
|
黃明祥; Hwang Ming-Shyang; 鄭璧瑩; Pi-Ying Cheng |
| 國立交通大學 |
2014-12-12T02:13:31Z |
以密碼學為基礎之資料庫安全性研究
|
黃明祥; Min-Shiang Hwang; 曾文貴, 楊維邦; Wen-Guey Tzeng, Wei-Pang Yang |
| 亞洲大學 |
2014-11 |
Group Rekeying in Wireless Sensor Networks: A Survey
|
Li, Wei Teng;Li, Wei Teng;林宗輝;黃明祥 |
| 亞洲大學 |
2014-09 |
Data Error Locations Reported by Public Auditing in Cloud Storage Service
|
黃明祥;C.C.Lee;Lee, Cheng-Chi;T.H.Sun;Sun, Tsuei-Hung |
| 亞洲大學 |
2014-09 |
Distributed Detecting Node Replication Attacks in Wireless Sensor Networks: A Survey
|
Li, Wei Teng;Li, Wei Teng;馮棟煌;Feng, Tung-Huang;黃明祥 |
| 亞洲大學 |
2014-09 |
A New Public Key Encryption with Conjunctive Field Keyword Search Scheme
|
黃明祥;S.T.Hsu;Hsu, Shih-Ting;C.C.Lee;Lee, Cheng-Chi |
| 亞洲大學 |
2014-08 |
行動通訊點對點網路之數位權管理系統研發
|
黃明祥 |