|
English
|
正體中文
|
简体中文
|
总笔数 :0
|
|
造访人次 :
51011898
在线人数 :
1159
教育部委托研究计画 计画执行:国立台湾大学图书馆
|
|
|
"ren yi"的相关文件
显示项目 26-36 / 36 (共1页) 1 每页显示[10|25|50]项目
| 國立交通大學 |
2017-04-21T06:56:44Z |
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service
|
Ren, Yi; Chen, Jyh-Cheng; Chin, Jui-Chih; Tseng, Yu-Chee |
| 國立交通大學 |
2017-04-21T06:49:44Z |
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring
|
Ren, Wei; Ren, Yi; Wu, Mu-En; Lee, Chia-Jung |
| 國立交通大學 |
2017-04-21T06:48:17Z |
Design and Analysis of a Threshold Offloading (TO) Algorithm for LTE Femtocell/Macrocell Networks
|
Chen, Wei-Han; Ren, Yi; Chen, Jyh-Cheng |
| 國立交通大學 |
2016-03-28T00:04:15Z |
RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications
|
Ren, Wei; Yu, Linchen; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2015-07-21T08:31:28Z |
A Feasiblity Study on Developing IoT/M2M Applications over ETSI M2M Architecture
|
Lin, Fuchun Joseph; Ren, Yi; Cerritos, Eduardo |
| 國立交通大學 |
2014-12-08T15:36:34Z |
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
|
Ren, Yi; Zadorozhny, Vladimir I.; Oleshchuk, Vladimir A.; Li, Frank Y. |
| 國立交通大學 |
2014-12-08T15:36:00Z |
Design of a Self-Portrait Application with Sensor-Assisted Guiding for Smart Devices
|
Lo, Chi-Chung; Huang, Sz-Pin; Ren, Yi; Tseng, Yu-Chee |
| 國立交通大學 |
2014-12-08T15:33:18Z |
LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks
|
Ren, Wei; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2014-12-08T15:31:43Z |
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
|
Ren, Wei; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2014-12-08T15:30:30Z |
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid
|
Ren, Wei; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2014-12-08T15:29:35Z |
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack
|
Ren, Wei; Yu, Linchen; Ma, Liangli; Ren, Yi |
显示项目 26-36 / 36 (共1页) 1 每页显示[10|25|50]项目
|