| 朝陽科技大學 |
2021-09-17 |
Secrecy Rate Analysis in The Cooperative Communication System
|
陳忠信; Yang, Cheng-Ying; Yao, Jenq-Foung JF; Hwang, Min-Hsiang |
| 國立成功大學 |
2020-07 |
Secrecy Rate Maximization via Radio Resource Allocation in Cellular Underlaying V2V Communications
|
Liu;Yiliang;Wang;Wei;Chen;Hsiao-Hwa;Wang;Liangmin;Cheng;Nan;Meng;Weixiao;Shen;Xuemin |
| 國立成功大學 |
2016-04 |
SECRECY WIRELESS INFORMATION AND POWER TRANSFER: CHALLENGES AND OPPORTUNITIES
|
Chen, Xiaoming; Ng, Derrick Wing Kwan; Chen, Hsiao-Hwa |
| 元智大學 |
Apr-16 |
Secret Communication and Sharing Mechanism for Mobile Media
|
Pei-Yu Lin; Wen-Shao Lan |
| 朝陽科技大學 |
2015-03 |
Secret Communication Based on Quantization Tables
|
Chen, Po-Yueh;Chen, Wei-Chih |
| 國立交通大學 |
2015-05-12T02:59:51Z |
SECRET COMMUNICATION METHOD WITH SELF-AUTHENTICATION CAPABILITY
|
LEE CHE-WEI; TSAI WEN-HSIANG |
| 亞洲大學 |
2008-11 |
Secret communication through web pages using special codes in HTML files
|
I. S. Lee;W. H. Tsai |
| 朝陽科技大學 |
2008-11 |
Secret Communication through Web Pages Using Special Space Codes in HTML Files
|
I-Shi Leea;Wen-Hsiang Tsai |
| 國立臺灣科技大學 |
2010-10 |
Secret Communication Using JPEG Double Compression
|
Jing-Ming Guo;Thanh-Nam Le |
| 臺北醫學大學 |
2007 |
Secret Garden Project:A Smoking Prevention Program for the Junior High School Students in Taipei
|
苗迺芳; Liao HJ; Lee CM; Lin SH; Miao NF; Lung CN; Lee SC; LinYH; Yen L |
| 元智大學 |
2013-12-02 |
Secret Hiding Mechanism Using QR Barcode
|
Pei-Yu Lin; Yi-Hui Chen; Eric Jui-Lin Lu; Ping-Jung Chen |
| 元智大學 |
2013-12-02 |
Secret Hiding Mechanism Using QR Barcode
|
Pei-Yu Lin; Yi-Hui Chen; Eric Jui-Lin Lu; Ping-Jung Chen |
| 亞洲大學 |
2007-04 |
Secret Image Hiding and Sharing Based on the (t, n)-Threshold
|
Chang, C. C. ; Lin, C. Y. ; Tseng, C. S. |
| 亞洲大學 |
2007 |
Secret Image Hiding and Sharing Based on the (t, n)-Threshold
|
林智揚;Lin, Chih-Yang;Chin-Chen Chang; |
| 國立交通大學 |
2014-12-08T15:41:53Z |
Secret image sharing
|
Thien, CC; Lin, JC |
| 國立交通大學 |
2020-10-05T01:59:51Z |
Secret Image Sharing Revisited: Forbidden Type, Support Type, and Their Two Approaches
|
Chao, Che-Yi; Lin, Ja-Chen |
| 元培科技大學 |
2008-10-14 |
Secret Image Sharing Safety
|
Wen-Pinn Fang |
| 中國醫藥大學 |
2008.08 |
Secret image sharing scheme based solely on ADDITION
|
(M.-H. Tsai); (C.-K. Chen); 陳永福(Yung-Fu Chen); (Y.-K. Chan); (K.-C. Chen); (Y.-P. Chu) |
| 亞洲大學 |
2007-11 |
Secret Image Sharing Using Quadratic Residues
|
Chang, C. C.;Chen, C. C |
| 國立交通大學 |
2014-12-08T15:40:31Z |
Secret image sharing with capability of share data reduction
|
Lin, CC; Tsai, WH |
| 亞洲大學 |
2003-07 |
Secret image sharing with capability of share data reduction
|
C. C. Lin;W. H. Tsai |
| 亞洲大學 |
2009-06 |
Secret Image Sharing with Reversible Steganography
|
Chang, C. C.; Lin, P. Y.;Chan, C. S |
| 亞洲大學 |
2009 |
Secret image sharing with reversible steganography
|
Chang, Chin-Chen ; Lin, Pei-Yu ; Chan, Chi-Shiang |
| 亞洲大學 |
2009 |
Secret image sharing with reversible steganography
|
詹啟祥;Chan, Chi-Shiang |
| 國立交通大學 |
2017-04-21T06:56:48Z |
Secret image sharing with smaller shadow sizes for general access structures
|
Chen, Ying-Ru; Chen, Ling-Hwei; Shyu, Shyong Jian |