| 元培科技大學 |
2009 |
Secure communication based on a hybrid of chaos and ICA encryptions
|
Wei-ching Chen; John Yuan |
| 淡江大學 |
2001-01 |
Secure Communication for Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Lian, Kuang-yow; Chiu, Chian-song; Chiang, Tung-sheng; Liu, Peter |
| 大葉大學 |
2011-11 |
Secure Communication for Electronic Business Applications in Mobile Agent Networks
|
Tsaur, Woei-Jiunn |
| 東海大學 |
1994-07-00 |
Secure Communication for Users in Specified Access Instances
|
林祝興 |
| 國立交通大學 |
2014-12-08T15:46:04Z |
Secure communication mechanisms for GSM networks
|
Lo, CC; Chen, YJ |
| 國立交通大學 |
2015-07-21T08:29:22Z |
Secure communication zone for white-light LED visible light communication
|
Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu |
| 中華大學 |
2009 |
Secure communications and data management in ubiquitous services
|
許慶賢; Hsu, Ching-Hsien |
| 亞洲大學 |
2007-08 |
Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities
|
Lee, J. S. ; Chang, C. C. |
| 國立成功大學 |
2009-11 |
Secure Communications in Local Multipoint Distribution Service (LMDS) Networks
|
Anastasopoulos, Markos P.; Petraki, Dionysia K.; Chen, Hsiao-Hwa |
| 中原大學 |
2001 |
Secure Communications of Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Kuang-Yow Lian;Chian-Song Chiu;Tung-Sheng Chiang;Peter Liu |
| 國立臺灣大學 |
2005-11 |
Secure content delivery using key composition
|
Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Chiou, Hann-Huei; Lei, Chin-Laung |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Secure Content Delivery using Key Composition
|
C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI |
| 國立臺灣海洋大學 |
2015 |
Secure Content Distribution Using Multi-hop Proxy Re-encryption
|
Han-Yu Lin |
| 國立成功大學 |
2020 |
Secure Content-Based Image Retrieval in the Cloud with Key Confidentiality
|
Li, J.-S.;Liu, I.-H.;Tsai, C.-J.;Su, Z.-Y.;Li, C.-F.;Liu, C.-G. |
| 國立臺灣海洋大學 |
2009 |
Secure Convertible Authenticated Encryption Scheme Based on RSA.
|
Tzong-Sun Wu;Han-Yu Lin |
| 國立臺灣科技大學 |
2013 |
Secure convertible undeniable signature scheme using extended Euclidean algorithm without random oracles
|
Horng, S.-J.;Tzeng, S.-F.;Fan, P.;Wang, X.;Li, T.;Khurram Khan, M. |
| 淡江大學 |
2017年12月1日 |
Secure Data Collection Scheme for Wireless Sensor Networks
|
Hwang, Ren-Junn;Huang, Y. Z. |
| 國立成功大學 |
2022 |
Secure Data Transmission and Image Encryption Based on a Digital-Redesign Sliding Mode Chaos Synchronization
|
Fang, J.-S.;Tsai, J.S.-H.;Yan, J.-J.;Chiang, L.-H.;Guo, S.-M. |
| 淡江大學 |
2015-08-06 |
Secure Data Transmission Scheme for WSNs
|
Hwang, Ren Junn;Huang, Yan Zhi |
| 國立臺灣科技大學 |
2015 |
Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere
|
Liu, T.-Y.;Mukherjee, P.;Ulukus, S.;Lin, S.-C.;Peter Hong, Y.-W. |
| 國立臺灣科技大學 |
2012 |
Secure delegation-based authentication protocol for Wireless roaming service
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 南台科技大學 |
2008-04 |
Secure Direct Communication using Deterministic BB84 Protocol
|
李南逸; T. Hwang; C.M. Li; N.Y. Lee |
| 國立成功大學 |
2008-04 |
Secure direct communication using deterministic BB84 protocol
|
Hwang, Tzonelih; Li, Chuan-Ming; Lee, Narn-Yih |
| 臺大學術典藏 |
2018-09-10T08:08:26Z |
Secure distributed data aggregation
|
Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO |
| 國立臺灣大學 |
2004-02 |
Secure Document Access Architecture based on Distributed Firewall and Proxy Technologies
|
Pan, Chi Chien; Yang, Kai Hsiang; Lee, Tzao Lin |