臺大學術典藏 |
2021-10-25T09:17:48Z |
Design of a bio-inspired dynamical vertical climbing robot
|
J. E. Clark; D. I. Goldman; P. C. Lin; G. Lynch; T. S. Chen; H. Komsuoglu; R. J. Full; D. E. Koditschek; PEI-CHUN LIN |
臺大學術典藏 |
2018-09-10T09:25:41Z |
Mobile agent application and integration in electronic anamnesis system
|
C. H. Liu;Y. F. Chung;T. S. Chen;S. D. Wang; C. H. Liu; Y. F. Chung; T. S. Chen; S. D. Wang; SHENG-DE WANG |
臺大學術典藏 |
2018-09-10T09:25:40Z |
The enhancement of security in healthcare information systems
|
C. H. Liu;Y. F. Chung;T. S. Chen;S. D. Wang; C. H. Liu; Y. F. Chung; T. S. Chen; S. D. Wang; SHENG-DE WANG |
臺大學術典藏 |
2018-09-10T09:25:35Z |
A Password-based User Authentication Scheme for the Integrated EPR Information System
|
Z. Y. Wu,;Y. F. Chung,;F. Lai,;T. S. Chen,; Z. Y. Wu,; Y. F. Chung,; F. Lai,; T. S. Chen,; FEI-PEI LAI |
臺大學術典藏 |
2018-09-10T08:47:38Z |
The Design of ID-Based Access Control System with Time-Sensitive key for Mobile Agent’s Migration
|
C. H. Liu; Y. F. Chung; T. S. Chen; S. D. Wang; SHENG-DE WANG |
臺大學術典藏 |
2018-09-10T08:47:38Z |
An ID-based access control in a hierarchical key management for mobile agent
|
C. H. Liu; Y. F. Chung; T. S. Chen; S. D. Wang; SHENG-DE WANG |
臺大學術典藏 |
2018-09-10T08:47:38Z |
A time-restricted key management for mobile agent in distributed networks
|
C. H. Liu; T. Y. Fang; Y. F. Chung; T. S. Chen; S. D. Wang; SHENG-DE WANG |
臺大學術典藏 |
2018-09-10T07:43:12Z |
Efficient Migration for Mobile Computing in Distributed Networks
|
K. H. Huang,;Y. F. Chung,;C. H. Liu,;F. P. Lai,;T. S. Chen,; K. H. Huang,; Y. F. Chung,; C. H. Liu,; F. P. Lai,; T. S. Chen,; FEI-PEI LAI |
臺大學術典藏 |
2018-09-10T06:37:59Z |
Group key management method for the distributed system
|
Y. F. Chung, F. P. Lai,; T. S. Chen; FEI-PEI LAI |
臺大學術典藏 |
2018-09-10T06:37:59Z |
A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery
|
Y. F. Chung,;Z. Y. Wu,;F. P. Lai,;T. S. Chen,; Y. F. Chung,; Z. Y. Wu,; F. P. Lai,; T. S. Chen,; FEI-PEI LAI |
臺大學術典藏 |
2018-09-10T03:50:53Z |
Partially loaded periodic microstrip lines
|
T.-S. Chen; J.-F. Kiang; C. H. Chen; JEAN-FU KIANG |
國立交通大學 |
2017-10-06T06:17:34Z |
Frequency Control By Passive Microwave Atomic Resonance
|
陳德勝; T.S.Chen |
育達商業科技大學 |
2012 |
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching
|
W. Hong;T.S. Chen |
育達商業科技大學 |
2011-09 |
Multilevel Reversible Data Hiding Using Modification of Prediction Errors
|
C. L. Pan;潘,哲倫;W. Hong;T.S. Chen;J. Chen;C.W. Shiu |
育達商業科技大學 |
2011-08-11 |
Data Analysis of Optimal Square Of Pixel Pair Modification Based Brute Force
|
T.S. Chen;W. Hong;J. Chen;Y.M. Shu;S.J. Wei;C.W. Jhong |
育達商業科技大學 |
2011-06 |
Lossless Data Embedding in BTC codes Based on Prediction and Histogram Shifting
|
W. Hong;T.S. Chen;C.W. Shiu;M.C. Wu |
育達商業科技大學 |
2011-02 |
Steganography for Block Truncation Coding Compressed Images Using Hybrid Embedding Scheme
|
W. Hong;J. Chen;T.S. Chen;C.W. Shiu |
育達商業科技大學 |
2011-02 |
Reversible Data Embedding for High Quality Images Using Interpolation and Reference Pixel Distribution Mechanism
|
W. Hong;T.S. Chen |
育達商業科技大學 |
2011 |
The Steganalysis of Efficient Prediction-And-Shifting Embedding Based On Spam Data Mining
|
T.S. Chen;W. Hong;J. Chen;K.C. Wang;S.J. Wei;C.W. Jhong |
育達商業科技大學 |
2010-11 |
A High Capacity Reversible Data Hiding Scheme Using Orthogonal Projection and Prediction Error Modification
|
W. Hong;T.S. Chen;Y.P. Chang;C.W. Shiu |
育達商業科技大學 |
2010-08 |
Steganography for BTC Compressed Images Using No Distortion Technique
|
J. Chen;W. Hong;T.S. Chen;C.W. Shiu |
育達商業科技大學 |
2010-07 |
Data Hiding by Exploiting Modification Direction Technique Using Optimal Pixel Grouping
|
K.Y. Lin;W. Hong;J. Chen;T.S. Chen;W.C. Chiang |
育達商業科技大學 |
2010 |
A Local Variance-Controlled Reversible Data Hiding Method Using Prediction and Histogram-Shifting
|
W. Hong;T.S. Chen |
育達商業科技大學 |
2009-11 |
Reversible Data Hiding for High Quality Images Using Modification of Prediction Errors
|
W. Hong;T.S. Chen;C.W. Shiu |
育達商業科技大學 |
2009 |
Blockwise Reversible Data Hiding by Contrast Mapping
|
W. Hong;J. Chen;T.S. Chen |