English  |  正體中文  |  简体中文  |  总笔数 :2856597  
造访人次 :  53451968    在线人数 :  881
教育部委托研究计画      计画执行:国立台湾大学图书馆
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
关于TAIR

浏览

消息

著作权

相关连结

跳至: [ 中文 ] [ 数字0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
请输入前几个字:   

显示项目 748191-748240 / 2348973 (共46980页)
<< < 14959 14960 14961 14962 14963 14964 14965 14966 14967 14968 > >>
每页显示[10|25|50]项目

机构 日期 题名 作者
亞洲大學 2013-07 Security Analysis and Improvement of a new Ultra-lightweight RFID Protocol Xu Zhuang;Zhi-Hui Wang;Chin-Chen Chang;Yan Zhu
國立政治大學 2014-10 Security analysis and improvement of femtocell access control Chen, C.-M.;Wu, T.-Y.;Tso, Ray-Lin;Wu, M.-E.; 左瑞麟
淡江大學 2010-09 Security Analysis and Improvement of Remote User Authentication Scheme without Using Smart Cards 洪文斌; Horng, Wen-bing
淡江大學 2010-12 Security Analysis and Improvement of the Remote User Authentication Scheme without Using Smart Cards Horng, Wen-Bing; Shieh, Wen-Gong
國立政治大學 2013.11 Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol 左瑞麟; Tso, Raylin
國立政治大學 2012 Security analysis concerning the random numbers of threshold ring signatures Huang, Kaibin;Tso, Ray-Lin; 左瑞麟
國立政治大學 2011-12 Security Analysis Concerning the Random Numbers of Threshold Ring Signatures 黃凱彬;左瑞麟
國立政治大學 2016-10 Security analysis of a NTRU-based mutual authentication scheme 左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio
亞洲大學 2004-06 Security Analysis of a Threshold Access Control Scheme Based on Smart Cards 劉兆樑;Liu, Chao-Liang
亞洲大學 2004 Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing 劉兆樑;Liu, Chao-Liang
國立政治大學 2015-08 Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments 左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Y, H.Chin Augustin Yeh-hao Chin
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Chia-Hui Wei(Chia-Hui Wei); 黃明祥; Y, H.Chin(Augustin Yeh-hao Chin)
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Wei, Chia-Hui;Wei, Chia-Hui;黃明祥 Y, H.Chin;Chin, Augustin Yeh-hao
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Chia-Hui Wei;Chia-Hui Wei;黃明祥;Y, H. Chin;Augustin Yeh-hao Chin
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin)
國立政治大學 2013.07 Security Analysis of Choi et al.'s Certificateless Short Signature Scheme 左瑞麟; Tso, Raylin
南台科技大學 2001-11 Security Analysis of the Generalized Key Agreement and Password Authentication Protocol 葉禾田; Her-Tyan Yeh; H.M. Sun and T. Hwang
國立成功大學 2001-11 Security analysis of the generalized key agreement and password authentication protocol Yeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih
國立交通大學 2014-12-08T15:17:00Z Security analysis of transformed-key asymmetric watermarking system Chen, IT; Yeh, YS
朝陽科技大學 2008 Security analysis of Zhang-Wang signature scheme without using one-way hash functions 楊伏夷;許明暉
國立東華大學 2008-04 Security Analysis on Authentication of Images Using Recursive Visual Cryptography Yang,C.N.; Chen,T.S.
朝陽科技大學 2009 Security analysis on the security enhancement for anonymous secure e-voting over computer network, 楊伏夷;陳皇佑
元智大學 2008-05 Security Analyst Following of Recovering Stocks 吳瑞萱; Hsiou-wei W. Lin
元智大學 2008-05 Security Analyst Following of Recovering Stocks 吳瑞萱; Hsiou-wei W. Lin
元智大學 2011-12-09 Security Analysts'' Incentive and Cognitive Processing Bias: Evidence from Analysts'' Recommendations Ruei-Shian Wu; Hsiou-wei Lin
元智大學 2011-12 Security Analysts'''' Incentive and Cognitive Processing Bias: Evidence from Analysts'''' Recommendations Ruei-Shian Wu; Hsiou-wei Lin
國立臺灣大學 2006-08 Security Analysts’ Competence in Value and Glamour Lin, Hsiou-wei; Wu, Ray-hsuan
臺大學術典藏 1999-08 Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies Lin, Hsiou-Wei W; Lin, Hsiou-wei W
國立臺灣大學 1999-08 Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies Lin, Hsiou-wei W
元智大學 Dec-14 Security analysts’ incentive and cognitive processing bias: evidence from analysts’ recommendations Ruei-Shian Wu; H.W. Lin
臺大學術典藏 2020-02-15T03:52:25Z Security analysts’ incentive and cognitive processing bias: Evidence from analysts’ recommendations Wu R.-S.;Lin H.-W.W.; Wu R.-S.; Lin H.-W.W.; HSIOU-WEI W. LIN
國立臺灣大學 1998-04 Security and Auditing in VPN and its Trends Lei, C. L.
亞洲大學 2015/05 Security and Communication Networks 李正吉; Lee, Cheng-Chi
亞洲大學 2018-01 Security and Efficiency Enhancement of Robust ID based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks 李正吉;Lee, Cheng-Chi
國立高雄師範大學 2005 Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms 楊中皇; Chung-Huang Yang;Hikaru Morita;Tatsuaki Okamoto
國立交通大學 2015-12-02T02:59:31Z Security and privacy in unified communications: Challenges and solutions Karopoulos, Georgios; Portokalidis, Georgios; Domingo-Ferrer, Josep; Lin, Ying-Dar; Geneiatakis, Dimitris; Kambourakis, Georgios
亞洲大學 2020-01-20 Security and Privacy in Wireless Sensor Networks: Advances and Challenges 李正吉; Lee, Cheng-Chi
臺北醫學大學 2007 Security and Privacy Protection Protocol for Shared Medical Records Kuo-Ching Liua;Hui-Feng Huangb
中國醫藥大學 2007-11-16 Security and Privacy Protection Protocol for Shared Medical Records 劉國慶; 黃慧鳳(Hui-Feng Huang)
中國醫藥大學 2007-11-16 Security and Privacy Protection Protocol for Shared Medical Records 劉國慶; 黃慧鳳(Hui-Feng Huang)
淡江大學 2004-03 Security and Privacy Technologies for Distance Education Applications 施國琛
國立成功大學 2024 Security and Privacy Threats of O-RAN for Home Healthcare Tang;B, -H.;Liu;I, -H.;Chen;H, -H.;Li;J, -S.
淡江大學 2009 Security and prosperity in East Asia and the world Tai, Wan-Chin; Zhao, Quansheng
國立交通大學 2019-04-03T06:42:08Z Security approach to controlling access to personal health records in healthcare service Chen, Tzer-Long; Liao, Yu-Ting; Chang, Yi-Fan; Hwang, Jen-Hung
國立政治大學 1996-12 Security Arrangements in the Asia-Pacific Region Lin, Cheng-Yi; 林正義
國立交通大學 2014-12-08T15:12:53Z Security aspects of mobile phone virus: a critical survey Shih, Dong-Her; Lin, Binshan; Chiang, Hslu-Sen; Shih, Ming-Hung
臺大學術典藏 2021-07-15T05:33:11Z Security assessment of taiwan solid wood product supply CHYI-RONG CHIOU; Chan, Wei Hsun; Wu, Meng Shan; Lin, Jiunn Cheng
臺大學術典藏 2021-07-26T09:44:08Z Security assessment of taiwan solid wood product supply Chiou C.-R;Chan W.-H;Wu M.-S;Lin J.-C.; Chiou C.-R; Chan W.-H; Wu M.-S; Lin J.-C.; CHYI-RONG CHIOU
國立臺灣科技大學 2013 Security attacks on the wavelet transform and singular value decomposition image watermarking Guo, J.-M.;Prasetyo, H.

显示项目 748191-748240 / 2348973 (共46980页)
<< < 14959 14960 14961 14962 14963 14964 14965 14966 14967 14968 > >>
每页显示[10|25|50]项目