| 國立政治大學 |
1996-09 |
Security in East Asia and Taiwan's Role
|
Ho, Szu-Yin |
| 淡江大學 |
2007-06 |
Security in Eastern Asia- Let’s Start with Human Right
|
鄭欽模 |
| 國立成功大學 |
2015-08 |
Security in Space Information Networks
|
Jiang, Chunxiao; Wang, Xuexia; Wang, Jian; Chen, Hsiao-Hwa; Ren, Yong |
| 淡江大學 |
1998-10 |
Security in the Taiwan strait
|
翁明賢 |
| 國立成功大學 |
2008-08 |
Security in wireless sensor networks
|
Du, Xiaojiang; Chen, Hsiao-Hwa |
| 臺北市立大學 |
2006 |
Security Issues in Customer Relationship Management Systems。
|
Lee, H., Chen;K. L., Shing;C, C. C.;Shing, M. L.;幸曼玲 |
| 國立交通大學 |
2014-12-08T15:27:18Z |
Security issues on B-ISDN billing system
|
Lo, CC; Yeh, YC |
| 國立臺灣大學 |
1997 |
Security Management for ATM Networks
|
Lei, C. L. |
| 亞洲大學 |
2007 |
Security Management System For Critical Prison By Using RFID
|
Ahmad Syaukani |
| 臺北醫學大學 |
2001 |
Security Mechanism in Medical Informatics By using Enhanced CORBA based Component
|
劉立; Jin-Cheng; Chen; L. Liu |
| 臺大學術典藏 |
2020-05-04T07:53:54Z |
Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems.
|
Lin, Chung-Wei; Lin, Chung-Wei; CHUNG-WEI LIN |
| 亞洲大學 |
2006 |
Security Modeling and Analysis of Mobile Agent Systems
|
Ma, Lu;Ma, Lu;蔡進發;Jeffrey, J.P.Tsai |
| 臺北市立大學 |
2007 |
Security modeling on the supply chain networks
|
Shing, M. L.;幸曼玲;Shing, C. C.;Chen, K. L;Lee, H. |
| 國立成功大學 |
2007-02 |
Security of "asymmetrical quantum key distribution protocol"
|
Li, Chuan-Ming; Hwang, Tzonelih; Lee, Kuo-Chang |
| 國立成功大學 |
2004-01 |
Security of a remote user authentication scheme using smart cards
|
Yeh, Her-Tyan; Sun, Hung-Min; Hsieh, Bin-Tsan |
| 南台科技大學 |
2004-01 |
Security of a Remote User Authentication using Smart Cards
|
葉禾田; Her-Tyan Yeh; H.M. Sun; and B.T. Hsieh |
| 國立成功大學 |
1999-11-25 |
Security of broadcasting cryptosystem in computer networks
|
Sun, Hung-Min |
| 中國文化大學 |
2006 |
Security of efficient password authenticated key agreement using smart cards
|
謝文恭著 |
| 亞洲大學 |
2006-09 |
Security of fragile watermarking scheme for image authentication
|
廖冠捷;Liao, Kuan-Chieh |
| 淡江大學 |
2005-08-05 |
Security of Hsu–Wu's authenticated encryption scheme with (t, n) shared verification
|
黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih |
| 國立交通大學 |
2014-12-08T15:41:32Z |
Security of improvement on methods for protecting password transmission
|
Yang, CC; Chang, TY; Hwang, MS |
| 中國文化大學 |
2005 |
Security of Lee et al.'s remote authentication model of information appliances
|
Shieh, Wen-Gong; Wang, Jian-Min |
| 中國文化大學 |
2005 |
Security of Lee et al.'s remote authentication model of information appliances
|
謝文恭等著 |
| 中國文化大學 |
2009 |
Security of Message Passing Based on Grid Environment
|
陳恆生等著 |
| 南台科技大學 |
2003-03 |
Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications
|
葉禾田; 4. X. Yi; C.K. Siew; H.M. Sun; Her-Tyan Yeh; C. L. Lin and T. Hwang |
| 國立成功大學 |
2003-03 |
Security of Park-Lim key agreement schemes for VSAT satellite communications
|
Yi, Xun; Siew, Chee-Kheong; Sun, Hung-Min; Yeh, Her-Tyan; Lin, Chun-Li; Hwang, Tzonelih |
| 南台科技大學 |
1999-03 |
Security of Shao's signature schemes based on factoring and discrete logarithms
|
李南逸; N.Y. Lee |
| 佛光大學 |
1999-06-01 |
Security of the authenticated multiple-key agreement protocols
|
吳宗杉;He W.H.;Hsu C.L. |
| 國立臺灣科技大學 |
2000 |
Security of the Jan-Tseng integrated schemes of user authentication and access control
|
He, W.H;Wu, T.C |
| 淡江大學 |
2005-09-01 |
Security of Tzeng–Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems
|
黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih |
| 亞洲大學 |
2014-04 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Hsia, 黃明祥 Shu-Yin;Hsia, Shu-Yin;W.P.Yang;Yang, Wei-Pang |
| 亞洲大學 |
201404 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Anonymous |
| 國立交通大學 |
2014-12-08T15:22:19Z |
Security optical data storage in Fourier holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |
| 國立彰化師範大學 |
2012-03 |
Security Optical Data Storage in Fourier Holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |
| 亞洲大學 |
2001-08 |
Security patrolling in building corridors by multiple-camera computer vision and automatic vehicle navigation techniques
|
R. C. Liu;W. H. Tsai |
| 淡江大學 |
2008 |
Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait
|
白揚恩; Polisensky, Jan |
| 臺大學術典藏 |
2021-08-09T08:34:47Z |
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective
|
Yang X.; Wang X.; Yue W.T.; Sia C.L.; Luo X.; CHOON LING SIA |
| 中國文化大學 |
2017-07 |
Security Price Manipulation in Mergers and Acquisitions via Special Purpose Vehicles
|
吳盈德 |
| 中國文化大學 |
2021-02 |
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System
|
Liu, CH (Liu, Chia-Hui); Huang, YM (Huang, Yao-Min); Chen, TL (Chen, Tzer-Long); Wu, ZY (Wu, Zhen-Yu); Chen, HY (Chen, Hsuan-Yu) |
| 亞洲大學 |
2008-05 |
Security protection of face images transmitted on networks by information hiding techniques
|
D. C. Wu, C. S. Li;W. H. Tsai |
| 亞洲大學 |
2010-01 |
Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes
|
I. S. Lee;W. H. Tsai |
| 亞洲大學 |
2008-08 |
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
|
I. S. Lee;W. H. Tsai |
| 國立成功大學 |
2020 |
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems
|
Liu, C.-G.;Wu, C.-J.;Liu, I.-H.;Wu, C.-C.;Li, J.-S. |
| 國立政治大學 |
2008 |
Security Relations among China, Japan and Taiwan, 1995-2008
|
羅思婷 |
| 淡江大學 |
2011 |
Security Robot Simulator
|
Hung, W.H.; Liu, Peter; 劉寅春; Kang, S.C. |
| 大葉大學 |
2004-07 |
Security Schemes for Protecting Mobile Agent Based Networks
|
Ho;Tsaur, Woei-Jiunn |
| 佛光大學 |
2009-06-10 |
Security Sector Reform and Its Practices in Taiwan
|
張中勇 |
| 佛光大學 |
2007-03-07 |
Security Sector Reform in Taiwan
|
張中勇 |
| 國立交通大學 |
2018-08-21T05:52:42Z |
Security Semantics Modeling with Progressive Distillation
|
Shen, Zong-Xian; Hsu, Chia-Wei; Shieh, Shiuhpyng Winston |
| 中國科技大學 |
2013-07-20 |
Security Software based on Windows NDIS Filter Drivers
|
Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen |