|
|
Taiwan Academic Institutional Repository >
Browse by Author
|
"yang c n"
Showing items 81-130 of 166 (4 Page(s) Totally) << < 1 2 3 4 > >> View [10|25|50] records per page
| 國立東華大學 |
2008-11 |
Visual Cryptography Schemes with Reversing
|
Yang,C.N.; Wang,C.C.; Chen,T.S. |
| 國立東華大學 |
2008-10 |
Colored Visual Cryptography Scheme Based on Additive Color Mixing
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2008-10 |
RFID Enabled Passenger with Bicycle Transit Auto-Payment Scheme in MRT
|
Yang,C.N.; Cheng,S.U.; Kun,Y.C.; Wu,G.C.; Chung,T.H. |
| 國立東華大學 |
2008-08 |
New Steganography Scheme in Halftone Images
|
Yang,C.N.; Yang,Y.Y.; Chen,T.S.; Ye,G.C. |
| 國立東華大學 |
2008-07 |
Efficient Encoding Algorithm for Second-Order Spectral-Null Codes Using Cyclic Bit-Shift
|
Yang,C.N. |
| 國立東華大學 |
2008-07 |
Wireless Image Transmission Using Burst Error Correction Codes
|
Yang,C.N.; Chiu,C.Y.; Chen,.T.S.; Ye,G.C. |
| 國立東華大學 |
2008-05 |
On The Analysis of Visual Cryptography Scheme Underlying XOR Operation
|
Yang,C.N.; Chen,T. S. |
| 國立東華大學 |
2008-05 |
A New Pixel-Value Differencing Steganography Scheme Based on Space Filling Curve
|
Yang,C.N.; Chang,S.H.; Chen,T.S.; Su,C.H. |
| 國立東華大學 |
2008-04 |
Security Analysis on Authentication of Images Using Recursive Visual Cryptography
|
Yang,C.N.; Chen,T.S. |
| 淡江大學 |
2008-01 |
Knockdown of zebrafish Nav1.6 sodium channel impairs embryonic locomotor activities
|
陳曜鴻; Chen, Yau-hung; Huang, F. L.; Cheng, Y. C.; Wu, C. J.; Yang, C. N.; Tsay, H. J. |
| 國立東華大學 |
2007-12 |
Reducing Shadow Size for Visual Cryptography Scheme
|
Yang,C.N.; Peng,A.G.; Chen,T.S. |
| 國立東華大學 |
2007-11 |
Implementation of A High-Security Certificate Service By Embedding Fingerprint In Smart Cards
|
Yang,C.N.; Su,J. S.; Chen,T. S.; Chang,S. H. |
| 國立東華大學 |
2007-10 |
Campus Micropayment System by Mobile Barcode
|
Yang,C.N.; Yen,C. E.; Wang,C. H.; Chen,C. M.; Chen,T. S.; Lee,Y. F. |
| 國立東華大學 |
2007-09 |
Visual Secret Sharing Scheme: Prioritizing the Secret Pixels with Different Pixel Expansions to Enhance the Image Contrast
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2007-08 |
Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2007-07 |
Error Spreading Control in Image Steganographic Embedding Schemes Using Unequal Error Protection
|
Yang,C.N.; Chen,G.J.; Lukac,R.; Chen,T.S. |
| 國立東華大學 |
2007-07 |
Authorized Tracking and Tracing for RFID Tags
|
Yang,C.N.; Laih,C.S.; Chen,M.Y. |
| 國立東華大學 |
2007-07 |
Improvements of image sharing with steganography and authentication
|
Yang,C.N.; Chen,T.S.; Wang,C.C.; Yu,K.H. |
| 國立東華大學 |
2007-07 |
An Image Secret Sharing Scheme with the Capability of Previewing the Secret Image
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2007-06 |
User-Friendly Image Sharing Using Polynomials with Different Primes
|
Yang,C.N.; Yu,K.H.; Lukac,R. |
| 國立東華大學 |
2007-06 |
Registration Tolerant Visual Secret Sharing Schemes Using Two-Sized Subpixels
|
Yang,C.N.; Peng, A.G.; Chen,T.S. |
| 國立東華大學 |
2007-03 |
Applying CAPTCHA Technology to Prevent Click Fraud in E-Commercials
|
Yang,C.N.; Zhou,F.R.; Lu,J.R.; Zheng, T.; Chen,T.S. |
| 國立東華大學 |
2007-01 |
User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes
|
Yang,C.N.; Yu,K.H.; Lukac,R. |
| 國立東華大學 |
2007 |
Applying RFID Technology in Warranty Service Information System
|
Yang,C.N.; Chen,M.Y.; Laih,C.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Lin, Ming-Lang; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting process from deformed growth strata
|
Lin, M. L.; Wang, C.P.; Yang, C.N.; Chen, W.S.; Jeng, F.S. |
| 國立臺灣大學 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Lin, M.L.; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 臺大學術典藏 |
2007 |
Inference of trishear-faulting processes from deformed pregrowth and growth strata
|
Chen, W.S.; Yang, C.N.; Jeng, F.S.; Lin, Ming-Lang; Wang, C.P.; Lin, Ming-Lang; Wang, C.P.; Chen, W.S.; Yang, C.N.; Jeng, F.S. |
| 國立東華大學 |
2006-11 |
Certificate Services for Cellular Phone Emulator Based on JAVA Card
|
Yang,C.N.; Chen,T.S.; Peng, A.G. |
| 國立東華大學 |
2006-11 |
Access Control for Mouse and Network Functions in Computer Classroom Using RFID Technique
|
Yang,C.N.; Chen,T.S.; Lin,Y.C.; Yu,Y.F.; Chen,Y.F.; Chiu,C.Y.; Lee,U.F. |
| 國立東華大學 |
2006-09 |
Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image via Different Pixel Expansions
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2006-08 |
Authorized Tracking and Tracing for RFID Tags
|
Yang,C.N.; Chen,M.Y.; Laih,C.S. |
| 國立東華大學 |
2006-07 |
Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables
|
Yang,C.N.; Lee,D.J. |
| 國立東華大學 |
2006-07 |
Reduce Shadow Size in Aspect Ratio Invariant Visual Secret Sharing Schemes using a Square Block-wise Operation
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2006-06 |
Real Perfect Contrast Visual Secret Schemes with Reversing
|
Yang,C.N.; Wang,C.C.; Chen,T.S. |
| 國立東華大學 |
2006-06 |
Cheating-Immune Secret Image Sharing Scheme with Steganography
|
Yang,C.N.; Chen,T.S.; Yu,K.H.; Wang,C.C. |
| 國立東華大學 |
2006-05 |
Improved Tracing Algorithm for Random-Error-Resilient Collusion-Secure Fingerprinting Codes
|
Yang,C.N.; Lu,B.L |
| 國立東華大學 |
2006-02 |
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size,” IEICE Transactions on Fundamentals of Electronics
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2006 |
Embed Additional Private Information into Two-Dimensional Bar Codes by the Visual Secret Sharing Scheme
|
Yang,C.N.; Chen,T.S.; Ching,M.H. |
| 國立東華大學 |
2005-12 |
A Reliable Tree-Based Revocation Scheme in Grid Computing System
|
Yang,C.N.; Chen,K. N.; Peng,A.G. |
| 國立東華大學 |
2005-10 |
Automatic IP Management
|
Yang,C.N.; Chi,H.C.; Lee,Y.F.; Liou,B.F. |
| 國立東華大學 |
2005-09 |
Size-Adjustable Visual Secret Sharing Schemes
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2005-09 |
Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2005-09 |
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-wise Operation
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2005-08 |
A Slight Secret Key Storage Requirement Watermarking Scheme For Image Authentication
|
Yang,C.N.; Chen,Z.W.; Chiang,C.C. |
| 國立東華大學 |
2005-06 |
Enhanced Fair Micropayment Scheme Based on Hash Chain To Avoid Merchant Collusion
|
Yang,C.N.; Lin,T.; Chen,T.S. |
| 國立東華大學 |
2005-05 |
New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size
|
Yang,C.N.; Chen,T.S. |
| 國立東華大學 |
2005-04 |
Design of Efficient Second-Order Spectral-Null Codes
|
Yang,C.N. |
| 國立東華大學 |
2005-03 |
A Comment on Systematic Single Asymmetric Error-Correcting Codes
|
Yang,C.N.; Chen,G.J. |
| 國立東華大學 |
2005-01 |
Failure of Kak-Quantum Key Distribution Protocol
|
Yang,C.N.; Chu,S.H.; Lu, B.L. |
Showing items 81-130 of 166 (4 Page(s) Totally) << < 1 2 3 4 > >> View [10|25|50] records per page
|