English  |  正體中文  |  简体中文  |  Total items :2856600  
Visitors :  53484477    Online Users :  1288
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

Jump to: [ Chinese Items ] [ 0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
or enter the first few letters:   

Showing items 748206-748255 of 2349007  (46981 Page(s) Totally)
<< < 14960 14961 14962 14963 14964 14965 14966 14967 14968 14969 > >>
View [10|25|50] records per page

Institution Date Title Author
國立政治大學 2011-12 Security Analysis Concerning the Random Numbers of Threshold Ring Signatures 黃凱彬;左瑞麟
國立政治大學 2016-10 Security analysis of a NTRU-based mutual authentication scheme 左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio
亞洲大學 2004-06 Security Analysis of a Threshold Access Control Scheme Based on Smart Cards 劉兆樑;Liu, Chao-Liang
亞洲大學 2004 Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing 劉兆樑;Liu, Chao-Liang
國立政治大學 2015-08 Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments 左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Y, H.Chin Augustin Yeh-hao Chin
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Chia-Hui Wei(Chia-Hui Wei); 黃明祥; Y, H.Chin(Augustin Yeh-hao Chin)
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Wei, Chia-Hui;Wei, Chia-Hui;黃明祥 Y, H.Chin;Chin, Augustin Yeh-hao
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Chia-Hui Wei;Chia-Hui Wei;黃明祥;Y, H. Chin;Augustin Yeh-hao Chin
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin)
國立政治大學 2013.07 Security Analysis of Choi et al.'s Certificateless Short Signature Scheme 左瑞麟; Tso, Raylin
南台科技大學 2001-11 Security Analysis of the Generalized Key Agreement and Password Authentication Protocol 葉禾田; Her-Tyan Yeh; H.M. Sun and T. Hwang
國立成功大學 2001-11 Security analysis of the generalized key agreement and password authentication protocol Yeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih
國立交通大學 2014-12-08T15:17:00Z Security analysis of transformed-key asymmetric watermarking system Chen, IT; Yeh, YS
朝陽科技大學 2008 Security analysis of Zhang-Wang signature scheme without using one-way hash functions 楊伏夷;許明暉
國立東華大學 2008-04 Security Analysis on Authentication of Images Using Recursive Visual Cryptography Yang,C.N.; Chen,T.S.
朝陽科技大學 2009 Security analysis on the security enhancement for anonymous secure e-voting over computer network, 楊伏夷;陳皇佑
元智大學 2008-05 Security Analyst Following of Recovering Stocks 吳瑞萱; Hsiou-wei W. Lin
元智大學 2008-05 Security Analyst Following of Recovering Stocks 吳瑞萱; Hsiou-wei W. Lin
元智大學 2011-12-09 Security Analysts'' Incentive and Cognitive Processing Bias: Evidence from Analysts'' Recommendations Ruei-Shian Wu; Hsiou-wei Lin
元智大學 2011-12 Security Analysts'''' Incentive and Cognitive Processing Bias: Evidence from Analysts'''' Recommendations Ruei-Shian Wu; Hsiou-wei Lin
國立臺灣大學 2006-08 Security Analysts’ Competence in Value and Glamour Lin, Hsiou-wei; Wu, Ray-hsuan
臺大學術典藏 1999-08 Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies Lin, Hsiou-Wei W; Lin, Hsiou-wei W
國立臺灣大學 1999-08 Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies Lin, Hsiou-wei W
元智大學 Dec-14 Security analysts’ incentive and cognitive processing bias: evidence from analysts’ recommendations Ruei-Shian Wu; H.W. Lin
臺大學術典藏 2020-02-15T03:52:25Z Security analysts’ incentive and cognitive processing bias: Evidence from analysts’ recommendations Wu R.-S.;Lin H.-W.W.; Wu R.-S.; Lin H.-W.W.; HSIOU-WEI W. LIN
國立臺灣大學 1998-04 Security and Auditing in VPN and its Trends Lei, C. L.
亞洲大學 2015/05 Security and Communication Networks 李正吉; Lee, Cheng-Chi
亞洲大學 2018-01 Security and Efficiency Enhancement of Robust ID based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks 李正吉;Lee, Cheng-Chi
國立高雄師範大學 2005 Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms 楊中皇; Chung-Huang Yang;Hikaru Morita;Tatsuaki Okamoto
國立交通大學 2015-12-02T02:59:31Z Security and privacy in unified communications: Challenges and solutions Karopoulos, Georgios; Portokalidis, Georgios; Domingo-Ferrer, Josep; Lin, Ying-Dar; Geneiatakis, Dimitris; Kambourakis, Georgios
亞洲大學 2020-01-20 Security and Privacy in Wireless Sensor Networks: Advances and Challenges 李正吉; Lee, Cheng-Chi
臺北醫學大學 2007 Security and Privacy Protection Protocol for Shared Medical Records Kuo-Ching Liua;Hui-Feng Huangb
中國醫藥大學 2007-11-16 Security and Privacy Protection Protocol for Shared Medical Records 劉國慶; 黃慧鳳(Hui-Feng Huang)
中國醫藥大學 2007-11-16 Security and Privacy Protection Protocol for Shared Medical Records 劉國慶; 黃慧鳳(Hui-Feng Huang)
淡江大學 2004-03 Security and Privacy Technologies for Distance Education Applications 施國琛
國立成功大學 2024 Security and Privacy Threats of O-RAN for Home Healthcare Tang;B, -H.;Liu;I, -H.;Chen;H, -H.;Li;J, -S.
淡江大學 2009 Security and prosperity in East Asia and the world Tai, Wan-Chin; Zhao, Quansheng
國立交通大學 2019-04-03T06:42:08Z Security approach to controlling access to personal health records in healthcare service Chen, Tzer-Long; Liao, Yu-Ting; Chang, Yi-Fan; Hwang, Jen-Hung
國立政治大學 1996-12 Security Arrangements in the Asia-Pacific Region Lin, Cheng-Yi; 林正義
國立交通大學 2014-12-08T15:12:53Z Security aspects of mobile phone virus: a critical survey Shih, Dong-Her; Lin, Binshan; Chiang, Hslu-Sen; Shih, Ming-Hung
臺大學術典藏 2021-07-15T05:33:11Z Security assessment of taiwan solid wood product supply CHYI-RONG CHIOU; Chan, Wei Hsun; Wu, Meng Shan; Lin, Jiunn Cheng
臺大學術典藏 2021-07-26T09:44:08Z Security assessment of taiwan solid wood product supply Chiou C.-R;Chan W.-H;Wu M.-S;Lin J.-C.; Chiou C.-R; Chan W.-H; Wu M.-S; Lin J.-C.; CHYI-RONG CHIOU
國立臺灣科技大學 2013 Security attacks on the wavelet transform and singular value decomposition image watermarking Guo, J.-M.;Prasetyo, H.
國立交通大學 2015-07-21T08:28:56Z Security authentication using phase-encoded nanoparticle structures and polarized light Carnicer, Artur; Hassanfiroozi, Amir; Latorre-Carmona, Pedro; Huang, Yi-Pai; Javidi, Bahram
國立政治大學 2012 Security balancing for IT-enabled service innovation Wu, Sou-Chein;Chen, A.H.-C.;Chu, H.-C.
國立臺灣大學 2007 Security Biosignal Transmission based on Face Recognition for Telemedicine Chien, Jen-Chien; Wang, Jeng-Pang; Cho, Chien-Lung; Chong, Fok-Ching
佛光大學 2005-09-05 Security Challenges to the 21st Century Policing in Taiwan 張中勇
佛光大學 2005-12 Security Challenges to the 21st Century Policing in Taiwan 張中勇
國立成功大學 2008-12-18 Security co-existence of wireless sensor networks and RFID for pervasive computing Sun, Bo; Xiao, Yang; Li, Chung Chih; Chen, Hsiao-Hwa; Yang, T. Andrew

Showing items 748206-748255 of 2349007  (46981 Page(s) Totally)
<< < 14960 14961 14962 14963 14964 14965 14966 14967 14968 14969 > >>
View [10|25|50] records per page