English  |  正體中文  |  简体中文  |  Total items :2856600  
Visitors :  53471363    Online Users :  924
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

Jump to: [ Chinese Items ] [ 0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
or enter the first few letters:   

Showing items 748311-748360 of 2348973  (46980 Page(s) Totally)
<< < 14962 14963 14964 14965 14966 14967 14968 14969 14970 14971 > >>
View [10|25|50] records per page

Institution Date Title Author
南台科技大學 2004-01 Security of a Remote User Authentication using Smart Cards 葉禾田; Her-Tyan Yeh; H.M. Sun; and B.T. Hsieh
國立成功大學 1999-11-25 Security of broadcasting cryptosystem in computer networks Sun, Hung-Min
中國文化大學 2006 Security of efficient password authenticated key agreement using smart cards 謝文恭著
亞洲大學 2006-09 Security of fragile watermarking scheme for image authentication 廖冠捷;Liao, Kuan-Chieh
淡江大學 2005-08-05 Security of Hsu–Wu's authenticated encryption scheme with (t, n) shared verification 黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih
國立交通大學 2014-12-08T15:41:32Z Security of improvement on methods for protecting password transmission Yang, CC; Chang, TY; Hwang, MS
中國文化大學 2005 Security of Lee et al.'s remote authentication model of information appliances Shieh, Wen-Gong; Wang, Jian-Min
中國文化大學 2005 Security of Lee et al.'s remote authentication model of information appliances 謝文恭等著
中國文化大學 2009 Security of Message Passing Based on Grid Environment 陳恆生等著
南台科技大學 2003-03 Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications 葉禾田; 4. X. Yi; C.K. Siew; H.M. Sun; Her-Tyan Yeh; C. L. Lin and T. Hwang
國立成功大學 2003-03 Security of Park-Lim key agreement schemes for VSAT satellite communications Yi, Xun; Siew, Chee-Kheong; Sun, Hung-Min; Yeh, Her-Tyan; Lin, Chun-Li; Hwang, Tzonelih
南台科技大學 1999-03 Security of Shao's signature schemes based on factoring and discrete logarithms 李南逸; N.Y. Lee
佛光大學 1999-06-01 Security of the authenticated multiple-key agreement protocols 吳宗杉;He W.H.;Hsu C.L.
國立臺灣科技大學 2000 Security of the Jan-Tseng integrated schemes of user authentication and access control He, W.H;Wu, T.C
淡江大學 2005-09-01 Security of Tzeng–Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems 黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih
亞洲大學 2014-04 Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178. Hsia, 黃明祥 Shu-Yin;Hsia, Shu-Yin;W.P.Yang;Yang, Wei-Pang
亞洲大學 201404 Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178. Anonymous
國立交通大學 2014-12-08T15:22:19Z Security optical data storage in Fourier holograms Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn
國立彰化師範大學 2012-03 Security Optical Data Storage in Fourier Holograms Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn
亞洲大學 2001-08 Security patrolling in building corridors by multiple-camera computer vision and automatic vehicle navigation techniques R. C. Liu;W. H. Tsai
淡江大學 2008 Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait 白揚恩; Polisensky, Jan
臺大學術典藏 2021-08-09T08:34:47Z Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective Yang X.; Wang X.; Yue W.T.; Sia C.L.; Luo X.; CHOON LING SIA
中國文化大學 2017-07 Security Price Manipulation in Mergers and Acquisitions via Special Purpose Vehicles 吳盈德
中國文化大學 2021-02 Security Privacy and Policy for Cryptographic Based Electronic Medical Information System Liu, CH (Liu, Chia-Hui); Huang, YM (Huang, Yao-Min); Chen, TL (Chen, Tzer-Long); Wu, ZY (Wu, Zhen-Yu); Chen, HY (Chen, Hsuan-Yu)
亞洲大學 2008-05 Security protection of face images transmitted on networks by information hiding techniques D. C. Wu, C. S. Li;W. H. Tsai
亞洲大學 2010-01 Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes I. S. Lee;W. H. Tsai
亞洲大學 2008-08 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes I. S. Lee;W. H. Tsai
國立成功大學 2020 Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems Liu, C.-G.;Wu, C.-J.;Liu, I.-H.;Wu, C.-C.;Li, J.-S.
國立政治大學 2008 Security Relations among China, Japan and Taiwan, 1995-2008 羅思婷
淡江大學 2011 Security Robot Simulator Hung, W.H.; Liu, Peter; 劉寅春; Kang, S.C.
大葉大學 2004-07 Security Schemes for Protecting Mobile Agent Based Networks Ho;Tsaur, Woei-Jiunn
佛光大學 2009-06-10 Security Sector Reform and Its Practices in Taiwan 張中勇
佛光大學 2007-03-07 Security Sector Reform in Taiwan 張中勇
國立交通大學 2018-08-21T05:52:42Z Security Semantics Modeling with Progressive Distillation Shen, Zong-Xian; Hsu, Chia-Wei; Shieh, Shiuhpyng Winston
中國科技大學 2013-07-20 Security Software based on Windows NDIS Filter Drivers Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen
佛光大學 2009-12-25 Security Solutions for Critical Dedicated Ethernet Services 黃慶圓;Cherng Yeh
佛光大學 2009-12-25 Security Solutions for Critical Dedicated Ethernet Services 黃慶圓;Cherng Yeh
國立臺灣海洋大學 2011-10 Security Threats in Advanced Metering Infrastructure He-Ming Ruan;Yu-Sheng Yang;I-An Fan;Pei-Jinn Chai;Chun-Ying Huang;Chin-Laung Lei
臺大學術典藏 2018-09-10T08:46:17Z Security Threats in Advanced Metering Infrastructure He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI
臺大學術典藏 1989-09 Security Valuation Models and the Accounting Data Wang, Tay-Chang; Wang, Tay-Chang
國立臺灣大學 1989-09 Security Valuation Models and the Accounting Data 王泰昌; Wang, Tay-Chang
元智大學 May-21 Security Verification for Cyber-Physical Systems Using Model Checking Ching-Chieh Chan; Cheng-Zen Yang; Chin-Feng Fan
淡江大學 2010-12 Security Weaknesses of Song's Advanced Smart Card Based Password Authentication Protocol Horng, Wen-bing; Lee, Cheng-Ping; Peng, Jian-Wen
國立彰化師範大學 2009 Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment Chuang, Y. H. ; Tseng, Yuh-Min
國立成功大學 2015 Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs Gope, Prosanta; Hwang, Tzonelih
淡江大學 1998-03-29 Security, transparency and accountability : an analysis of R.O.C. arms acquisition process 陳一新; Chen, I-hsin
臺大學術典藏 2020-05-04T07:53:54Z Security-Aware Design Methodology and Optimization for Automotive Systems. Lin, Chung-Wei;Zheng, Bowen;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zheng, Bowen; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN
臺大學術典藏 2020-05-04T07:53:55Z Security-aware mapping for CAN-based real-time distributed automotive systems. Lin, Chung-Wei;Zhu, Qi;Phung, Calvin;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zhu, Qi; Phung, Calvin; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN
臺大學術典藏 2020-05-04T07:53:55Z Security-aware mapping for TDMA-based real-time distributed systems. CHUNG-WEI LIN; Lin, Chung-Wei;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.; Lin, Chung-Wei; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.
臺大學術典藏 2020-05-04T07:53:54Z Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems. Lin, Chung-Wei; Zhu, Qi; Sangiovanni-Vincentelli, Alberto L.; CHUNG-WEI LIN; Lin, Chung-Wei;Zhu, Qi;Sangiovanni-Vincentelli, Alberto L.

Showing items 748311-748360 of 2348973  (46980 Page(s) Totally)
<< < 14962 14963 14964 14965 14966 14967 14968 14969 14970 14971 > >>
View [10|25|50] records per page