| 國立交通大學 |
2014-03-01 |
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment
|
Lin, Ying-Dar; Shih, Tzung-Bi; Wu, Yu-Sung; Lai, Yuan-Cheng |
| 國立臺灣科技大學 |
2014 |
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment
|
Lin, Y.-D.;Shih, T.-B.;Wu, Y.-S.;Lai, Y.-C. |
| 國立臺灣科技大學 |
2012 |
Secure anonymous authentication protocol with unlinkability for mobile wireless environment
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2016 |
Secure Anonymous Key Distribution Scheme for Smart Grid
|
Tsai, J.-L;Lo, N.-W. |
| 國立成功大學 |
2023 |
Secure Authentication in an IoT-Based Healthcare Environment with Strong Anonymity and Unclonable Device
|
Nurkifli, E.H.;Hwang, T. |
| 亞洲大學 |
2008-09 |
Secure Authentication Protocols for Mobile Commerce Transactions
|
Lee, J.S.;Chang, Y.F.;Chang, C.C. |
| 國立交通大學 |
2014-12-08T15:16:00Z |
Secure authentication protocols resistant to guessing attacks
|
Luo, Jia-Ning; Shieh, Shiuhpyng; Shen, Ji-Chiang |
| 淡江大學 |
2007-09 |
Secure Authentication Scheme for RFID
|
黃仁俊 |
| 東海大學 |
2012-03-26 |
Secure authentication scheme for supporting healthcare in wireless sensor networks
|
Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B |
| 東海大學 |
2013-10-22 |
Secure authorization for controlling access via key management scheme
|
Hsiao, T.-C.; Chen, T.-L.; Chen, C.-S.; Xu, F.-S.; Tsui, S.; Chung, Y.-F.; Chen, T.-S. |
| 國立臺灣科技大學 |
2016 |
Secure BLE-based Authentication for Micropayment using Wearable Device
|
鄭偉祥 |
| 國立交通大學 |
2014-12-08T15:26:21Z |
Secure bootstrapping and routing in an IPv6-based ad hoc network
|
Tseng, YC; Jiang, JR; Lee, JH |
| 國立交通大學 |
2014-12-08T15:49:14Z |
Secure broadcasting in large networks
|
Sun, HM; Shieh, SP |
| 國立暨南國際大學 |
2012 |
Secure centralized spectrum sensing for cognitive radio networks
|
周耀新; Chou, YH |
| 國立臺灣海洋大學 |
2016 |
Secure Certificateless Two-Party Key Agreement with Short Message
|
Han-Yu Lin |
| 國立臺灣科技大學 |
2015 |
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments
|
Tsai, J.-L.;Lo, N.-W. |
| 臺大學術典藏 |
2018-09-10T15:20:15Z |
Secure client side watermarking with limited key size
|
JA-LING WU; Wu, J.-L.; Lin, Y.-H.; Sun, J.-H.; Sun, J.-H.;Lin, Y.-H.;Wu, J.-L. |
| 國立臺灣科技大學 |
2018 |
Secure color image encryption algorithm based on chaotic signals and its FPGA realization
|
Yang, C.-H.;Huang, S.-J. |
| 元培科技大學 |
2009 |
Secure communication based on a hybrid of chaos and ICA encryptions
|
Wei-ching Chen; John Yuan |
| 淡江大學 |
2001-01 |
Secure Communication for Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Lian, Kuang-yow; Chiu, Chian-song; Chiang, Tung-sheng; Liu, Peter |
| 大葉大學 |
2011-11 |
Secure Communication for Electronic Business Applications in Mobile Agent Networks
|
Tsaur, Woei-Jiunn |
| 東海大學 |
1994-07-00 |
Secure Communication for Users in Specified Access Instances
|
林祝興 |
| 國立交通大學 |
2014-12-08T15:46:04Z |
Secure communication mechanisms for GSM networks
|
Lo, CC; Chen, YJ |
| 國立交通大學 |
2015-07-21T08:29:22Z |
Secure communication zone for white-light LED visible light communication
|
Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu |
| 中華大學 |
2009 |
Secure communications and data management in ubiquitous services
|
許慶賢; Hsu, Ching-Hsien |
| 亞洲大學 |
2007-08 |
Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities
|
Lee, J. S. ; Chang, C. C. |
| 國立成功大學 |
2009-11 |
Secure Communications in Local Multipoint Distribution Service (LMDS) Networks
|
Anastasopoulos, Markos P.; Petraki, Dionysia K.; Chen, Hsiao-Hwa |
| 中原大學 |
2001 |
Secure Communications of Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Kuang-Yow Lian;Chian-Song Chiu;Tung-Sheng Chiang;Peter Liu |
| 國立臺灣大學 |
2005-11 |
Secure content delivery using key composition
|
Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Chiou, Hann-Huei; Lei, Chin-Laung |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Secure Content Delivery using Key Composition
|
C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI |
| 國立臺灣海洋大學 |
2015 |
Secure Content Distribution Using Multi-hop Proxy Re-encryption
|
Han-Yu Lin |
| 國立成功大學 |
2020 |
Secure Content-Based Image Retrieval in the Cloud with Key Confidentiality
|
Li, J.-S.;Liu, I.-H.;Tsai, C.-J.;Su, Z.-Y.;Li, C.-F.;Liu, C.-G. |
| 國立臺灣海洋大學 |
2009 |
Secure Convertible Authenticated Encryption Scheme Based on RSA.
|
Tzong-Sun Wu;Han-Yu Lin |
| 國立臺灣科技大學 |
2013 |
Secure convertible undeniable signature scheme using extended Euclidean algorithm without random oracles
|
Horng, S.-J.;Tzeng, S.-F.;Fan, P.;Wang, X.;Li, T.;Khurram Khan, M. |
| 淡江大學 |
2017年12月1日 |
Secure Data Collection Scheme for Wireless Sensor Networks
|
Hwang, Ren-Junn;Huang, Y. Z. |
| 國立成功大學 |
2022 |
Secure Data Transmission and Image Encryption Based on a Digital-Redesign Sliding Mode Chaos Synchronization
|
Fang, J.-S.;Tsai, J.S.-H.;Yan, J.-J.;Chiang, L.-H.;Guo, S.-M. |
| 淡江大學 |
2015-08-06 |
Secure Data Transmission Scheme for WSNs
|
Hwang, Ren Junn;Huang, Yan Zhi |
| 國立臺灣科技大學 |
2015 |
Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere
|
Liu, T.-Y.;Mukherjee, P.;Ulukus, S.;Lin, S.-C.;Peter Hong, Y.-W. |
| 國立臺灣科技大學 |
2012 |
Secure delegation-based authentication protocol for Wireless roaming service
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 南台科技大學 |
2008-04 |
Secure Direct Communication using Deterministic BB84 Protocol
|
李南逸; T. Hwang; C.M. Li; N.Y. Lee |
| 國立成功大學 |
2008-04 |
Secure direct communication using deterministic BB84 protocol
|
Hwang, Tzonelih; Li, Chuan-Ming; Lee, Narn-Yih |
| 臺大學術典藏 |
2018-09-10T08:08:26Z |
Secure distributed data aggregation
|
Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO |
| 國立臺灣大學 |
2004-02 |
Secure Document Access Architecture based on Distributed Firewall and Proxy Technologies
|
Pan, Chi Chien; Yang, Kai Hsiang; Lee, Tzao Lin |
| 國立臺灣科技大學 |
2014 |
Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
|
Liu T.-Y., Mukherjee P., Ulukus S., Lin S.-C., Hong Y.-W.P. |
| 東海大學 |
2012 |
Secure dynamic access control scheme of PHR in cloud computing
|
Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure e-health system on passive RFID: Outpatient clinic and emergency care
|
Yeh, K.-H.;Lo, N.-W.;Wu, T.-C.;Wang, C. |
| 淡江大學 |
2005-01 |
Secure e-mail protocols providing perfect forward secrecy
|
孫宏民; Sun, Hung-min; 謝濱燦; Hsieh, Bin-tsan; 黃心嘉; Hwang, Shin-jia |
| 國立成功大學 |
2005-01 |
Secure e-mail protocols providing perfect forward secrecy
|
Sun, Hung-Min; Hsieh, Bin-Tsan; Hwang, Hsin-Jia |