English  |  正體中文  |  简体中文  |  Total items :2856565  
Visitors :  53409739    Online Users :  691
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

Jump to: [ Chinese Items ] [ 0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
or enter the first few letters:   

Showing items 748006-748055 of 2348973  (46980 Page(s) Totally)
<< < 14956 14957 14958 14959 14960 14961 14962 14963 14964 14965 > >>
View [10|25|50] records per page

Institution Date Title Author
國立交通大學 2019-04-02T06:00:23Z Secure and Fast Encryption (SAFE) with Classical Random Number Generators Deng, Lih-Yuan; Shiau, Jyh-Jen Horng; Lu, Henry Horng-Shing; Bowman, Dale
國立交通大學 2014-12-08T15:26:44Z Secure and invisible data hiding in 2-color images Tseng, YC; Pan, HK
國立臺灣大學 1996-05 Secure and Practical Electrical Voting Scheme for Real World Environments Juang, W. S.; Lei, C. L.
臺大學術典藏 2020-06-11T06:24:21Z Secure and robust SIFT Hsu, C.-Y.;Lu, C.-S.;Pei, S.-C.; Hsu, C.-Y.; Lu, C.-S.; Pei, S.-C.; SOO-CHANG PEI
臺大學術典藏 2018-09-10T08:17:58Z Secure and robust SIFT with resistance to chosen-plaintext attack Chao-Yung Hsu;Chun-Shien Lu;S. C. Pei; Chao-Yung Hsu; Chun-Shien Lu; S. C. Pei; SOO-CHANG PEI
國立交通大學 2014-03-01 Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment Lin, Ying-Dar; Shih, Tzung-Bi; Wu, Yu-Sung; Lai, Yuan-Cheng
國立臺灣科技大學 2014 Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment Lin, Y.-D.;Shih, T.-B.;Wu, Y.-S.;Lai, Y.-C.
國立臺灣科技大學 2012 Secure anonymous authentication protocol with unlinkability for mobile wireless environment Tsai, J.-L.;Lo, N.-W.;Wu, T.-C.
國立臺灣科技大學 2013 Secure anonymous authentication scheme without verification table for mobile satellite communication systems Tsai, J.-L.;Lo, N.-W.;Wu, T.-C.
國立臺灣科技大學 2013 Secure anonymous authentication scheme without verification table for mobile satellite communication systems Tsai, J.-L.;Lo, N.-W.;Wu, T.-C.
國立臺灣科技大學 2016 Secure Anonymous Key Distribution Scheme for Smart Grid Tsai, J.-L;Lo, N.-W.
國立成功大學 2023 Secure Authentication in an IoT-Based Healthcare Environment with Strong Anonymity and Unclonable Device Nurkifli, E.H.;Hwang, T.
亞洲大學 2008-09 Secure Authentication Protocols for Mobile Commerce Transactions Lee, J.S.;Chang, Y.F.;Chang, C.C.
國立交通大學 2014-12-08T15:16:00Z Secure authentication protocols resistant to guessing attacks Luo, Jia-Ning; Shieh, Shiuhpyng; Shen, Ji-Chiang
淡江大學 2007-09 Secure Authentication Scheme for RFID 黃仁俊
東海大學 2012-03-26 Secure authentication scheme for supporting healthcare in wireless sensor networks Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B
東海大學 2013-10-22 Secure authorization for controlling access via key management scheme Hsiao, T.-C.; Chen, T.-L.; Chen, C.-S.; Xu, F.-S.; Tsui, S.; Chung, Y.-F.; Chen, T.-S.
國立臺灣科技大學 2016 Secure BLE-based Authentication for Micropayment using Wearable Device 鄭偉祥
國立交通大學 2014-12-08T15:26:21Z Secure bootstrapping and routing in an IPv6-based ad hoc network Tseng, YC; Jiang, JR; Lee, JH
國立交通大學 2014-12-08T15:49:14Z Secure broadcasting in large networks Sun, HM; Shieh, SP
國立暨南國際大學 2012 Secure centralized spectrum sensing for cognitive radio networks 周耀新; Chou, YH
國立臺灣海洋大學 2016 Secure Certificateless Two-Party Key Agreement with Short Message Han-Yu Lin
國立臺灣科技大學 2015 Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments Tsai, J.-L.;Lo, N.-W.
臺大學術典藏 2018-09-10T15:20:15Z Secure client side watermarking with limited key size JA-LING WU; Wu, J.-L.; Lin, Y.-H.; Sun, J.-H.; Sun, J.-H.;Lin, Y.-H.;Wu, J.-L.
國立臺灣科技大學 2018 Secure color image encryption algorithm based on chaotic signals and its FPGA realization Yang, C.-H.;Huang, S.-J.
元培科技大學 2009 Secure communication based on a hybrid of chaos and ICA encryptions Wei-ching Chen; John Yuan
淡江大學 2001-01 Secure Communication for Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design Lian, Kuang-yow; Chiu, Chian-song; Chiang, Tung-sheng; Liu, Peter
大葉大學 2011-11 Secure Communication for Electronic Business Applications in Mobile Agent Networks Tsaur, Woei-Jiunn
東海大學 1994-07-00 Secure Communication for Users in Specified Access Instances 林祝興
國立交通大學 2014-12-08T15:46:04Z Secure communication mechanisms for GSM networks Lo, CC; Chen, YJ
國立交通大學 2015-07-21T08:29:22Z Secure communication zone for white-light LED visible light communication Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu
中華大學 2009 Secure communications and data management in ubiquitous services 許慶賢; Hsu, Ching-Hsien
亞洲大學 2007-08 Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities Lee, J. S. ; Chang, C. C.
國立成功大學 2009-11 Secure Communications in Local Multipoint Distribution Service (LMDS) Networks Anastasopoulos, Markos P.; Petraki, Dionysia K.; Chen, Hsiao-Hwa
中原大學 2001 Secure Communications of Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design Kuang-Yow Lian;Chian-Song Chiu;Tung-Sheng Chiang;Peter Liu
國立臺灣大學 2005-11 Secure content delivery using key composition Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Chiou, Hann-Huei; Lei, Chin-Laung
臺大學術典藏 2018-09-10T05:26:49Z Secure Content Delivery using Key Composition C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI
國立臺灣海洋大學 2015 Secure Content Distribution Using Multi-hop Proxy Re-encryption Han-Yu Lin
國立成功大學 2020 Secure Content-Based Image Retrieval in the Cloud with Key Confidentiality Li, J.-S.;Liu, I.-H.;Tsai, C.-J.;Su, Z.-Y.;Li, C.-F.;Liu, C.-G.
國立臺灣海洋大學 2009 Secure Convertible Authenticated Encryption Scheme Based on RSA. Tzong-Sun Wu;Han-Yu Lin
國立臺灣科技大學 2013 Secure convertible undeniable signature scheme using extended Euclidean algorithm without random oracles Horng, S.-J.;Tzeng, S.-F.;Fan, P.;Wang, X.;Li, T.;Khurram Khan, M.
淡江大學 2017年12月1日 Secure Data Collection Scheme for Wireless Sensor Networks Hwang, Ren-Junn;Huang, Y. Z.
國立成功大學 2022 Secure Data Transmission and Image Encryption Based on a Digital-Redesign Sliding Mode Chaos Synchronization Fang, J.-S.;Tsai, J.S.-H.;Yan, J.-J.;Chiang, L.-H.;Guo, S.-M.
淡江大學 2015-08-06 Secure Data Transmission Scheme for WSNs Hwang, Ren Junn;Huang, Yan Zhi
國立臺灣科技大學 2015 Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere Liu, T.-Y.;Mukherjee, P.;Ulukus, S.;Lin, S.-C.;Peter Hong, Y.-W.
國立臺灣科技大學 2012 Secure delegation-based authentication protocol for Wireless roaming service Tsai, J.-L.;Lo, N.-W.;Wu, T.-C.
南台科技大學 2008-04 Secure Direct Communication using Deterministic BB84 Protocol 李南逸; T. Hwang; C.M. Li; N.Y. Lee
國立成功大學 2008-04 Secure direct communication using deterministic BB84 protocol Hwang, Tzonelih; Li, Chuan-Ming; Lee, Narn-Yih
臺大學術典藏 2018-09-10T08:08:26Z Secure distributed data aggregation Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO
國立臺灣大學 2004-02 Secure Document Access Architecture based on Distributed Firewall and Proxy Technologies Pan, Chi Chien; Yang, Kai Hsiang; Lee, Tzao Lin

Showing items 748006-748055 of 2348973  (46980 Page(s) Totally)
<< < 14956 14957 14958 14959 14960 14961 14962 14963 14964 14965 > >>
View [10|25|50] records per page