| 國立臺灣科技大學 |
2014 |
Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
|
Liu T.-Y., Mukherjee P., Ulukus S., Lin S.-C., Hong Y.-W.P. |
| 東海大學 |
2012 |
Secure dynamic access control scheme of PHR in cloud computing
|
Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure e-health system on passive RFID: Outpatient clinic and emergency care
|
Yeh, K.-H.;Lo, N.-W.;Wu, T.-C.;Wang, C. |
| 淡江大學 |
2005-01 |
Secure e-mail protocols providing perfect forward secrecy
|
孫宏民; Sun, Hung-min; 謝濱燦; Hsieh, Bin-tsan; 黃心嘉; Hwang, Shin-jia |
| 國立成功大學 |
2005-01 |
Secure e-mail protocols providing perfect forward secrecy
|
Sun, Hung-Min; Hsieh, Bin-Tsan; Hwang, Hsin-Jia |
| 大葉大學 |
2010-12-16 |
Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems
|
Tsaur, Woei-Jiunn;Tsai, Hsin-Chieh |
| 國立交通大學 |
2014-12-08T15:07:00Z |
Secure encrypted-data aggregation for wireless sensor networks
|
Huang, Shih-I; Shieh, Shiuhpyng; Tygar, J. D. |
| 國立交通大學 |
2014-12-08T15:40:24Z |
Secure error-free steganography for JPEG images
|
Lee, YK; Chen, LH |
| 國立暨南國際大學 |
2009 |
Secure fast WLAN handoff using time-bound delegated authentication?
|
簡宏宇; Chien, HY |
| 朝陽科技大學 |
2013-06-09 |
Secure Fondue 起司鍋具設計
|
廖修平; Shiou_Ping, Liao |
| 國立交通大學 |
2014-12-08T15:21:22Z |
Secure Group Key Management Using Uni-Directional Proxy Re-Encryption Schemes
|
Chen, Yi-Ruei; Tygar, J. D.; Tzeng, Wen-Guey |
| 國立臺灣科技大學 |
2013 |
Secure handover authentication protocol based on bilinear pairings
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣海洋大學 |
2014 |
Secure ID-Based Strong Designated Verifier Signature Scheme for E-Commerce
|
Chi-Kuang Yeh;Han-Yu Lin |
| 臺大學術典藏 |
2020-06-11T06:24:09Z |
Secure image hashing via minimum distortion estimation
|
Hsu, C.-Y.;Lu, C.-S.;Pei, S.-C.; Hsu, C.-Y.; Lu, C.-S.; Pei, S.-C.; SOO-CHANG PEI |
| 國家衛生研究院 |
2023-12-02 |
Secure information and data centres: An exploratory study
|
Pant, P;Anand, K;Onthoni, DD |
| 臺大學術典藏 |
2018-09-10T03:50:41Z |
Secure information by using digital data embedding and spread spectrum techniques
|
C.-D. Chung; CHAR-DIR CHUNG; K.-C. Fan; C.-L. Tsai |
| 國立交通大學 |
2018-08-21T05:52:51Z |
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control
|
Yeh, Lo-Yao; Tsaur, Woei-Jiunn; Huang, Hsin-Han |
| 南台科技大學 |
2005-02 |
Secure Key Agreement Protocols for Three-Party against Guessing Attacks
|
陳炳彰; H.M. Sun and B.C. Chen |
| 國立成功大學 |
2004-02-15 |
Secure key agreement protocols for three-party against guessing attacks
|
Sun, Hung-Min; Chen, Bing-Chang; Hwang, Tzonelih |
| 國立臺灣科技大學 |
2009 |
Secure key management scheme for hierarchical access control based on ECC
|
Lin Y.-L.; Hsu C.-L.; Wu T.-C.; Yen S.-L.; Tseng C.-L. |
| 淡江大學 |
2006-09 |
Secure Key Management Scheme for Wireless LAN
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Chen, Yun-ru |
| 國立交通大學 |
2014-12-08T15:39:32Z |
Secure key-evolving for public key cryptosystems based on the discrete logarithm problem
|
Lu, CF; Shieh, SP |
| 國立臺灣科技大學 |
2017 |
Secure location tracking of femtocells in heterogeneous cellular networks
|
Cheng, S.-M.;Wang, Y.-J.;Chen, Y.-C. |
| 國立交通大學 |
2017-04-21T06:48:59Z |
Secure MIMO Transmission via Compressive Sensing
|
Lin, Chia-Hua; Tsai, Shang-Ho (Lawrence); Lin, Yuan-Pei |
| 國立交通大學 |
2018-08-21T05:53:33Z |
Secure Mobile-Phone Based Visible Light Communications With Different Noise-Ratio Light-Panel
|
Chow, Chi-Wai; Shiu, Ruei-Jie; Liu, Yen-Chun; Yeh, Chien-Hung; Liao, Xin-Lan; Lin, Kun-Hsien; Wang, Yi-Chang; Chen, Yi-Yuan |