|
English
|
正體中文
|
简体中文
|
2817721
|
|
???header.visitor??? :
27846944
???header.onlineuser??? :
343
???header.sponsordeclaration???
|
|
|
???tair.name??? >
???browser.page.title.author???
|
"peng a g"???jsp.browse.items-by-author.description???
Showing items 1-6 of 6 (1 Page(s) Totally) 1 View [10|25|50] records per page
國立東華大學 |
2009-08 |
MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on Resolving Alignment Difficulty
|
Yang,C.N.; Peng,A.G.; Chen,T.S. |
國立東華大學 |
2008-11 |
Secret Image Sharing: DPVCS A Two-in-One Combination of (D)eterministic and (P)robabilistic (V)isual Iryptography (S)chemes
|
Yang,C.N.; Peng,A.G.; Chen,T.S. |
國立東華大學 |
2007-12 |
Reducing Shadow Size for Visual Cryptography Scheme
|
Yang,C.N.; Peng,A.G.; Chen,T.S. |
國立東華大學 |
2007-06 |
Registration Tolerant Visual Secret Sharing Schemes Using Two-Sized Subpixels
|
Yang,C.N.; Peng, A.G.; Chen,T.S. |
國立東華大學 |
2006-11 |
Certificate Services for Cellular Phone Emulator Based on JAVA Card
|
Yang,C.N.; Chen,T.S.; Peng, A.G. |
國立東華大學 |
2005-12 |
A Reliable Tree-Based Revocation Scheme in Grid Computing System
|
Yang,C.N.; Chen,K. N.; Peng,A.G. |
Showing items 1-6 of 6 (1 Page(s) Totally) 1 View [10|25|50] records per page
|