| 國立成功大學 |
2005-01 |
Secure e-mail protocols providing perfect forward secrecy
|
Sun, Hung-Min; Hsieh, Bin-Tsan; Hwang, Hsin-Jia |
| 大葉大學 |
2010-12-16 |
Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems
|
Tsaur, Woei-Jiunn;Tsai, Hsin-Chieh |
| 國立交通大學 |
2014-12-08T15:07:00Z |
Secure encrypted-data aggregation for wireless sensor networks
|
Huang, Shih-I; Shieh, Shiuhpyng; Tygar, J. D. |
| 國立交通大學 |
2014-12-08T15:40:24Z |
Secure error-free steganography for JPEG images
|
Lee, YK; Chen, LH |
| 國立暨南國際大學 |
2009 |
Secure fast WLAN handoff using time-bound delegated authentication?
|
簡宏宇; Chien, HY |
| 朝陽科技大學 |
2013-06-09 |
Secure Fondue 起司鍋具設計
|
廖修平; Shiou_Ping, Liao |
| 國立交通大學 |
2014-12-08T15:21:22Z |
Secure Group Key Management Using Uni-Directional Proxy Re-Encryption Schemes
|
Chen, Yi-Ruei; Tygar, J. D.; Tzeng, Wen-Guey |
| 國立臺灣科技大學 |
2013 |
Secure handover authentication protocol based on bilinear pairings
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣海洋大學 |
2014 |
Secure ID-Based Strong Designated Verifier Signature Scheme for E-Commerce
|
Chi-Kuang Yeh;Han-Yu Lin |
| 臺大學術典藏 |
2020-06-11T06:24:09Z |
Secure image hashing via minimum distortion estimation
|
Hsu, C.-Y.;Lu, C.-S.;Pei, S.-C.; Hsu, C.-Y.; Lu, C.-S.; Pei, S.-C.; SOO-CHANG PEI |
| 國家衛生研究院 |
2023-12-02 |
Secure information and data centres: An exploratory study
|
Pant, P;Anand, K;Onthoni, DD |
| 臺大學術典藏 |
2018-09-10T03:50:41Z |
Secure information by using digital data embedding and spread spectrum techniques
|
C.-D. Chung; CHAR-DIR CHUNG; K.-C. Fan; C.-L. Tsai |
| 國立交通大學 |
2018-08-21T05:52:51Z |
Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control
|
Yeh, Lo-Yao; Tsaur, Woei-Jiunn; Huang, Hsin-Han |
| 南台科技大學 |
2005-02 |
Secure Key Agreement Protocols for Three-Party against Guessing Attacks
|
陳炳彰; H.M. Sun and B.C. Chen |
| 國立成功大學 |
2004-02-15 |
Secure key agreement protocols for three-party against guessing attacks
|
Sun, Hung-Min; Chen, Bing-Chang; Hwang, Tzonelih |
| 國立臺灣科技大學 |
2009 |
Secure key management scheme for hierarchical access control based on ECC
|
Lin Y.-L.; Hsu C.-L.; Wu T.-C.; Yen S.-L.; Tseng C.-L. |
| 淡江大學 |
2006-09 |
Secure Key Management Scheme for Wireless LAN
|
黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Chen, Yun-ru |
| 國立交通大學 |
2014-12-08T15:39:32Z |
Secure key-evolving for public key cryptosystems based on the discrete logarithm problem
|
Lu, CF; Shieh, SP |
| 國立臺灣科技大學 |
2017 |
Secure location tracking of femtocells in heterogeneous cellular networks
|
Cheng, S.-M.;Wang, Y.-J.;Chen, Y.-C. |
| 國立交通大學 |
2017-04-21T06:48:59Z |
Secure MIMO Transmission via Compressive Sensing
|
Lin, Chia-Hua; Tsai, Shang-Ho (Lawrence); Lin, Yuan-Pei |
| 國立交通大學 |
2018-08-21T05:53:33Z |
Secure Mobile-Phone Based Visible Light Communications With Different Noise-Ratio Light-Panel
|
Chow, Chi-Wai; Shiu, Ruei-Jie; Liu, Yen-Chun; Yeh, Chien-Hung; Liao, Xin-Lan; Lin, Kun-Hsien; Wang, Yi-Chang; Chen, Yi-Yuan |
| 國立臺灣海洋大學 |
2007-07-11 |
Secure multicast in dynamic environments
|
Chun-Ying Huang;Yun-Peng Chiu;Kuan-Ta Chen;Chin-Laung Lei |
| 國立臺灣大學 |
2007 |
Secure multicast in dynamic environments
|
Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Lei, Chin-Laung |
| 臺大學術典藏 |
2018-09-10T06:35:01Z |
Secure Multicast in Dynamic Environments
|
Chun-Ying Huang; Yun-Peng Chiu; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
| 國立臺灣海洋大學 |
2005 |
Secure Multicast Using Proxy Encryption
|
Yun-Peng Chiu;Chin-Laung Lei;Chun-Ying Huang |
| 臺大學術典藏 |
2018-09-10T05:26:48Z |
Secure Multicast Using Proxy Encryption
|
Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI |
| 亞洲大學 |
2016-07 |
Secure Multicasting of Images via Joint Privacy-Preserving Fingerprinting, Decryption, and Authentication
|
林智揚;Chih-Yang Lin;Kahlil Muchtar; Chia-Hung Yeh;*;Chun-Shien Lu |
| 國立交通大學 |
2014-12-08T15:29:33Z |
Secure Network Mobility (SeNEMO) for Real-Time Applications
|
Chen, Tuan-Che; Chen, Jyh-Cheng; Liu, Zong-Hua |
| 國立高雄師範大學 |
1997-10-15 |
Secure Official Document Mail Systems for Office Automation
|
孫培真;葉道明; C. H. Yang;S. L. Yen;Hwang David Liu;Kuei Liu;B. S. Jeng;K. Y. Chang;M. S. Chang;Y. L. Cheng;J. L. Liang;D. M. Shien |
| 東海大學 |
2005-03-25 |
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
|
林祝興; Chu-Hsing Lin , and Hsiu-Hsia Lin |
| 東海大學 |
2005-03-28 |
Secure one-round tripartite authenticated key agreement protocol from weil pairing??
|
Lin, C.-H., Lin, H.-H. |
| 國立臺灣大學 |
2004-03 |
Secure online examination architecture based on distributed firewall
|
Pan, Chi-Chien; Yang, Kai-Hsiang; Lee, Tzao-Lin |
| 國立政治大學 |
2011-03 |
Secure Password Based Authentication Protocol to Thwart Online Dictionary Attacks
|
Sood, Sandeep K. |
| 東海大學 |
2013-10-01 |
Secure PHR access control scheme for healthcare application clouds
|
Liu, C.-H.; Lin, F.-Q.; Chiang, D.-L.; Chen, T.-L.; Chen, C.-S.; Lin, H.-Y.; Chung, Y.-F.; Chen, T.-S. |
| 國立成功大學 |
2018-12 |
Secure Quantum Communication Scheme for Six-Qubit Decoherence-Free States
|
Tsai;Chih-Lun;Hwang;Tzonelih |
| 臺大學術典藏 |
2018-09-10T07:08:27Z |
Secure Quantum Packet Transmission Mechanism for Wireless Networks
|
T. S. Lin; S. Y. Kuo; SY-YEN KUO |
| 實踐大學 |
1997 |
Secure registration protocol for wireless internet
|
Chin, Le-Pond |
| 淡江大學 |
2008-06-17 |
Secure remote control model for information appliances
|
Shieh, Wen-gong; Wang, Jian-min; Horng, Wen-bing |
| 中國文化大學 |
2008 |
Secure remote control model for information appliances
|
謝文恭等著 |
| 國立彰化師範大學 |
2006-06 |
Secure Reputation System Based on Group Transitivity and Peer's Classification for Peer-to-Peer Networks
|
Kone, M. ; Tseng, Yuh-Min; Jan, J. K. |
| 南華大學 |
2007-08 |
Secure resource sharing on cross-organization collaboration using a novel trust method
|
王昌斌;Wang, Chin-Bin;Chen, Tsung-Yi;Chen, Yuh-Min;Chu, Hui-Chuan;Yang, Huimei |
| 國立成功大學 |
2007-08 |
Secure resource sharing on cross-organization collaboration using a novel trust method
|
Chen, Tsung-Yi; Chen, Yuh-Min; Wang, Chin-Bin; Chu, Hui-Chuan; Yang, Hui-Mei |
| 國立中山大學 |
1997 |
Secure Rewarding Schemes
|
Chun-I Fan;Chin-Laung Lei |
| 國立臺灣大學 |
1997-01 |
Secure rewarding schemes
|
Fan, Chun-I; Lei, Chin-Laung |
| 國立臺灣大學 |
1997-01 |
Secure Rewarding Schemes
|
Fan, C. I.; Lei, C. L. |
| 東海大學 |
2008-03-25 |
Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks
|
林祝興; Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Jean Chou |
| 東海大學 |
2008-03-25 |
Secure routing protocol with malicious nodes detection for ad hoc networks??
|
Lin, C.-H., Lai, W.-S., Huang, Y.-L., Chou, M.-C. |
| 大葉大學 |
2000-12 |
Secure Schemes for an On-Line Auction Service
|
Hu, Kao-Hsin;Tsaur, Woei-Jiunn |
| 亞洲大學 |
2010 |
Secure Short Message Service Based on QR-Code
|
Tzu-Ying,Yang |
| 中國文化大學 |
2010 |
Secure Site Authentication and Message Transmission Based on Grid Environment
|
陳恆生等著 |