English  |  正體中文  |  简体中文  |  Total items :2856597  
Visitors :  53450122    Online Users :  845
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

Jump to: [ Chinese Items ] [ 0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
or enter the first few letters:   

Showing items 748331-748355 of 2348973  (93959 Page(s) Totally)
<< < 29929 29930 29931 29932 29933 29934 29935 29936 29937 29938 > >>
View [10|25|50] records per page

Institution Date Title Author
淡江大學 2008 Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait 白揚恩; Polisensky, Jan
臺大學術典藏 2021-08-09T08:34:47Z Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective Yang X.; Wang X.; Yue W.T.; Sia C.L.; Luo X.; CHOON LING SIA
中國文化大學 2017-07 Security Price Manipulation in Mergers and Acquisitions via Special Purpose Vehicles 吳盈德
中國文化大學 2021-02 Security Privacy and Policy for Cryptographic Based Electronic Medical Information System Liu, CH (Liu, Chia-Hui); Huang, YM (Huang, Yao-Min); Chen, TL (Chen, Tzer-Long); Wu, ZY (Wu, Zhen-Yu); Chen, HY (Chen, Hsuan-Yu)
亞洲大學 2008-05 Security protection of face images transmitted on networks by information hiding techniques D. C. Wu, C. S. Li;W. H. Tsai
亞洲大學 2010-01 Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes I. S. Lee;W. H. Tsai
亞洲大學 2008-08 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes I. S. Lee;W. H. Tsai
國立成功大學 2020 Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems Liu, C.-G.;Wu, C.-J.;Liu, I.-H.;Wu, C.-C.;Li, J.-S.
國立政治大學 2008 Security Relations among China, Japan and Taiwan, 1995-2008 羅思婷
淡江大學 2011 Security Robot Simulator Hung, W.H.; Liu, Peter; 劉寅春; Kang, S.C.
大葉大學 2004-07 Security Schemes for Protecting Mobile Agent Based Networks Ho;Tsaur, Woei-Jiunn
佛光大學 2009-06-10 Security Sector Reform and Its Practices in Taiwan 張中勇
佛光大學 2007-03-07 Security Sector Reform in Taiwan 張中勇
國立交通大學 2018-08-21T05:52:42Z Security Semantics Modeling with Progressive Distillation Shen, Zong-Xian; Hsu, Chia-Wei; Shieh, Shiuhpyng Winston
中國科技大學 2013-07-20 Security Software based on Windows NDIS Filter Drivers Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen
佛光大學 2009-12-25 Security Solutions for Critical Dedicated Ethernet Services 黃慶圓;Cherng Yeh
佛光大學 2009-12-25 Security Solutions for Critical Dedicated Ethernet Services 黃慶圓;Cherng Yeh
國立臺灣海洋大學 2011-10 Security Threats in Advanced Metering Infrastructure He-Ming Ruan;Yu-Sheng Yang;I-An Fan;Pei-Jinn Chai;Chun-Ying Huang;Chin-Laung Lei
臺大學術典藏 2018-09-10T08:46:17Z Security Threats in Advanced Metering Infrastructure He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI
臺大學術典藏 1989-09 Security Valuation Models and the Accounting Data Wang, Tay-Chang; Wang, Tay-Chang
國立臺灣大學 1989-09 Security Valuation Models and the Accounting Data 王泰昌; Wang, Tay-Chang
元智大學 May-21 Security Verification for Cyber-Physical Systems Using Model Checking Ching-Chieh Chan; Cheng-Zen Yang; Chin-Feng Fan
淡江大學 2010-12 Security Weaknesses of Song's Advanced Smart Card Based Password Authentication Protocol Horng, Wen-bing; Lee, Cheng-Ping; Peng, Jian-Wen
國立彰化師範大學 2009 Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment Chuang, Y. H. ; Tseng, Yuh-Min
國立成功大學 2015 Security Weaknesses on a Delegation-Based Authentication Protocol for PCSs Gope, Prosanta; Hwang, Tzonelih

Showing items 748331-748355 of 2348973  (93959 Page(s) Totally)
<< < 29929 29930 29931 29932 29933 29934 29935 29936 29937 29938 > >>
View [10|25|50] records per page