| 淡江大學 |
2007-09 |
Secure Authentication Scheme for RFID
|
黃仁俊 |
| 東海大學 |
2012-03-26 |
Secure authentication scheme for supporting healthcare in wireless sensor networks
|
Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B |
| 東海大學 |
2013-10-22 |
Secure authorization for controlling access via key management scheme
|
Hsiao, T.-C.; Chen, T.-L.; Chen, C.-S.; Xu, F.-S.; Tsui, S.; Chung, Y.-F.; Chen, T.-S. |
| 國立臺灣科技大學 |
2016 |
Secure BLE-based Authentication for Micropayment using Wearable Device
|
鄭偉祥 |
| 國立交通大學 |
2014-12-08T15:26:21Z |
Secure bootstrapping and routing in an IPv6-based ad hoc network
|
Tseng, YC; Jiang, JR; Lee, JH |
| 國立交通大學 |
2014-12-08T15:49:14Z |
Secure broadcasting in large networks
|
Sun, HM; Shieh, SP |
| 國立暨南國際大學 |
2012 |
Secure centralized spectrum sensing for cognitive radio networks
|
周耀新; Chou, YH |
| 國立臺灣海洋大學 |
2016 |
Secure Certificateless Two-Party Key Agreement with Short Message
|
Han-Yu Lin |
| 國立臺灣科技大學 |
2015 |
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments
|
Tsai, J.-L.;Lo, N.-W. |
| 臺大學術典藏 |
2018-09-10T15:20:15Z |
Secure client side watermarking with limited key size
|
JA-LING WU; Wu, J.-L.; Lin, Y.-H.; Sun, J.-H.; Sun, J.-H.;Lin, Y.-H.;Wu, J.-L. |
| 國立臺灣科技大學 |
2018 |
Secure color image encryption algorithm based on chaotic signals and its FPGA realization
|
Yang, C.-H.;Huang, S.-J. |
| 元培科技大學 |
2009 |
Secure communication based on a hybrid of chaos and ICA encryptions
|
Wei-ching Chen; John Yuan |
| 淡江大學 |
2001-01 |
Secure Communication for Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Lian, Kuang-yow; Chiu, Chian-song; Chiang, Tung-sheng; Liu, Peter |
| 大葉大學 |
2011-11 |
Secure Communication for Electronic Business Applications in Mobile Agent Networks
|
Tsaur, Woei-Jiunn |
| 東海大學 |
1994-07-00 |
Secure Communication for Users in Specified Access Instances
|
林祝興 |
| 國立交通大學 |
2014-12-08T15:46:04Z |
Secure communication mechanisms for GSM networks
|
Lo, CC; Chen, YJ |
| 國立交通大學 |
2015-07-21T08:29:22Z |
Secure communication zone for white-light LED visible light communication
|
Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu |
| 中華大學 |
2009 |
Secure communications and data management in ubiquitous services
|
許慶賢; Hsu, Ching-Hsien |
| 亞洲大學 |
2007-08 |
Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities
|
Lee, J. S. ; Chang, C. C. |
| 國立成功大學 |
2009-11 |
Secure Communications in Local Multipoint Distribution Service (LMDS) Networks
|
Anastasopoulos, Markos P.; Petraki, Dionysia K.; Chen, Hsiao-Hwa |
| 中原大學 |
2001 |
Secure Communications of Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Kuang-Yow Lian;Chian-Song Chiu;Tung-Sheng Chiang;Peter Liu |
| 國立臺灣大學 |
2005-11 |
Secure content delivery using key composition
|
Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Chiou, Hann-Huei; Lei, Chin-Laung |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Secure Content Delivery using Key Composition
|
C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI |
| 國立臺灣海洋大學 |
2015 |
Secure Content Distribution Using Multi-hop Proxy Re-encryption
|
Han-Yu Lin |
| 國立成功大學 |
2020 |
Secure Content-Based Image Retrieval in the Cloud with Key Confidentiality
|
Li, J.-S.;Liu, I.-H.;Tsai, C.-J.;Su, Z.-Y.;Li, C.-F.;Liu, C.-G. |