| 國立臺灣科技大學 |
2015 |
Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere
|
Liu, T.-Y.;Mukherjee, P.;Ulukus, S.;Lin, S.-C.;Peter Hong, Y.-W. |
| 國立臺灣科技大學 |
2012 |
Secure delegation-based authentication protocol for Wireless roaming service
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 南台科技大學 |
2008-04 |
Secure Direct Communication using Deterministic BB84 Protocol
|
李南逸; T. Hwang; C.M. Li; N.Y. Lee |
| 國立成功大學 |
2008-04 |
Secure direct communication using deterministic BB84 protocol
|
Hwang, Tzonelih; Li, Chuan-Ming; Lee, Narn-Yih |
| 臺大學術典藏 |
2018-09-10T08:08:26Z |
Secure distributed data aggregation
|
Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO |
| 國立臺灣大學 |
2004-02 |
Secure Document Access Architecture based on Distributed Firewall and Proxy Technologies
|
Pan, Chi Chien; Yang, Kai Hsiang; Lee, Tzao Lin |
| 國立臺灣科技大學 |
2014 |
Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
|
Liu T.-Y., Mukherjee P., Ulukus S., Lin S.-C., Hong Y.-W.P. |
| 東海大學 |
2012 |
Secure dynamic access control scheme of PHR in cloud computing
|
Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure e-health system on passive RFID: Outpatient clinic and emergency care
|
Yeh, K.-H.;Lo, N.-W.;Wu, T.-C.;Wang, C. |
| 淡江大學 |
2005-01 |
Secure e-mail protocols providing perfect forward secrecy
|
孫宏民; Sun, Hung-min; 謝濱燦; Hsieh, Bin-tsan; 黃心嘉; Hwang, Shin-jia |
| 國立成功大學 |
2005-01 |
Secure e-mail protocols providing perfect forward secrecy
|
Sun, Hung-Min; Hsieh, Bin-Tsan; Hwang, Hsin-Jia |
| 大葉大學 |
2010-12-16 |
Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems
|
Tsaur, Woei-Jiunn;Tsai, Hsin-Chieh |
| 國立交通大學 |
2014-12-08T15:07:00Z |
Secure encrypted-data aggregation for wireless sensor networks
|
Huang, Shih-I; Shieh, Shiuhpyng; Tygar, J. D. |
| 國立交通大學 |
2014-12-08T15:40:24Z |
Secure error-free steganography for JPEG images
|
Lee, YK; Chen, LH |
| 國立暨南國際大學 |
2009 |
Secure fast WLAN handoff using time-bound delegated authentication?
|
簡宏宇; Chien, HY |
| 朝陽科技大學 |
2013-06-09 |
Secure Fondue 起司鍋具設計
|
廖修平; Shiou_Ping, Liao |
| 國立交通大學 |
2014-12-08T15:21:22Z |
Secure Group Key Management Using Uni-Directional Proxy Re-Encryption Schemes
|
Chen, Yi-Ruei; Tygar, J. D.; Tzeng, Wen-Guey |
| 國立臺灣科技大學 |
2013 |
Secure handover authentication protocol based on bilinear pairings
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣海洋大學 |
2014 |
Secure ID-Based Strong Designated Verifier Signature Scheme for E-Commerce
|
Chi-Kuang Yeh;Han-Yu Lin |
| 臺大學術典藏 |
2020-06-11T06:24:09Z |
Secure image hashing via minimum distortion estimation
|
Hsu, C.-Y.;Lu, C.-S.;Pei, S.-C.; Hsu, C.-Y.; Lu, C.-S.; Pei, S.-C.; SOO-CHANG PEI |
| 國家衛生研究院 |
2023-12-02 |
Secure information and data centres: An exploratory study
|
Pant, P;Anand, K;Onthoni, DD |
| 臺大學術典藏 |
2018-09-10T03:50:41Z |
Secure information by using digital data embedding and spread spectrum techniques
|
C.-D. Chung; CHAR-DIR CHUNG; K.-C. Fan; C.-L. Tsai |
| 國立交通大學 |
2018-08-21T05:52:51Z |
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control
|
Yeh, Lo-Yao; Tsaur, Woei-Jiunn; Huang, Hsin-Han |
| 南台科技大學 |
2005-02 |
Secure Key Agreement Protocols for Three-Party against Guessing Attacks
|
陳炳彰; H.M. Sun and B.C. Chen |
| 國立成功大學 |
2004-02-15 |
Secure key agreement protocols for three-party against guessing attacks
|
Sun, Hung-Min; Chen, Bing-Chang; Hwang, Tzonelih |
| 國立臺灣科技大學 |
2009 |
Secure key management scheme for hierarchical access control based on ECC
|
Lin Y.-L.; Hsu C.-L.; Wu T.-C.; Yen S.-L.; Tseng C.-L. |
| 淡江大學 |
2006-09 |
Secure Key Management Scheme for Wireless LAN
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Chen, Yun-ru |
| 國立交通大學 |
2014-12-08T15:39:32Z |
Secure key-evolving for public key cryptosystems based on the discrete logarithm problem
|
Lu, CF; Shieh, SP |
| 國立臺灣科技大學 |
2017 |
Secure location tracking of femtocells in heterogeneous cellular networks
|
Cheng, S.-M.;Wang, Y.-J.;Chen, Y.-C. |
| 國立交通大學 |
2017-04-21T06:48:59Z |
Secure MIMO Transmission via Compressive Sensing
|
Lin, Chia-Hua; Tsai, Shang-Ho (Lawrence); Lin, Yuan-Pei |
| 國立交通大學 |
2018-08-21T05:53:33Z |
Secure Mobile-Phone Based Visible Light Communications With Different Noise-Ratio Light-Panel
|
Chow, Chi-Wai; Shiu, Ruei-Jie; Liu, Yen-Chun; Yeh, Chien-Hung; Liao, Xin-Lan; Lin, Kun-Hsien; Wang, Yi-Chang; Chen, Yi-Yuan |
| 國立臺灣海洋大學 |
2007-07-11 |
Secure multicast in dynamic environments
|
Chun-Ying Huang;Yun-Peng Chiu;Kuan-Ta Chen;Chin-Laung Lei |
| 國立臺灣大學 |
2007 |
Secure multicast in dynamic environments
|
Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Lei, Chin-Laung |
| 臺大學術典藏 |
2018-09-10T06:35:01Z |
Secure Multicast in Dynamic Environments
|
Chun-Ying Huang; Yun-Peng Chiu; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
| 國立臺灣海洋大學 |
2005 |
Secure Multicast Using Proxy Encryption
|
Yun-Peng Chiu;Chin-Laung Lei;Chun-Ying Huang |
| 臺大學術典藏 |
2018-09-10T05:26:48Z |
Secure Multicast Using Proxy Encryption
|
Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI |
| 亞洲大學 |
2016-07 |
Secure Multicasting of Images via Joint Privacy-Preserving Fingerprinting, Decryption, and Authentication
|
林智揚;Chih-Yang Lin;Kahlil Muchtar; Chia-Hung Yeh;*;Chun-Shien Lu |
| 國立交通大學 |
2014-12-08T15:29:33Z |
Secure Network Mobility (SeNEMO) for Real-Time Applications
|
Chen, Tuan-Che; Chen, Jyh-Cheng; Liu, Zong-Hua |
| 國立高雄師範大學 |
1997-10-15 |
Secure Official Document Mail Systems for Office Automation
|
孫培真;葉道明; C. H. Yang;S. L. Yen;Hwang David Liu;Kuei Liu;B. S. Jeng;K. Y. Chang;M. S. Chang;Y. L. Cheng;J. L. Liang;D. M. Shien |
| 東海大學 |
2005-03-25 |
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
|
林祝興; Chu-Hsing Lin , and Hsiu-Hsia Lin |
| 東海大學 |
2005-03-28 |
Secure one-round tripartite authenticated key agreement protocol from weil pairing??
|
Lin, C.-H., Lin, H.-H. |
| 國立臺灣大學 |
2004-03 |
Secure online examination architecture based on distributed firewall
|
Pan, Chi-Chien; Yang, Kai-Hsiang; Lee, Tzao-Lin |
| 國立政治大學 |
2011-03 |
Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks
|
Sood, Sandeep K. |
| 東海大學 |
2013-10-01 |
Secure PHR access control scheme for healthcare application clouds
|
Liu, C.-H.; Lin, F.-Q.; Chiang, D.-L.; Chen, T.-L.; Chen, C.-S.; Lin, H.-Y.; Chung, Y.-F.; Chen, T.-S. |
| 國立成功大學 |
2018-12 |
Secure Quantum Communication Scheme for Six-Qubit Decoherence-Free States
|
Tsai;Chih-Lun;Hwang;Tzonelih |
| 臺大學術典藏 |
2018-09-10T07:08:27Z |
Secure Quantum Packet Transmission Mechanism for Wireless Networks
|
T. S. Lin; S. Y. Kuo; SY-YEN KUO |
| 實踐大學 |
1997 |
Secure registration protocol for wireless internet
|
Chin, Le-Pond |
| 淡江大學 |
2008-06-17 |
Secure remote control model for information appliances
|
Shieh, Wen-gong; Wang, Jian-min; Horng, Wen-bing |
| 中國文化大學 |
2008 |
Secure remote control model for information appliances
|
謝文恭等著 |
| 國立彰化師範大學 |
2006-06 |
Secure Reputation System Based on Group Transitivity and Peer's Classification for Peer-to-Peer Networks
|
Kone, M. ; Tseng, Yuh-Min; Jan, J. K. |