|
English
|
正體中文
|
简体中文
|
0
|
|
???header.visitor??? :
52777387
???header.onlineuser??? :
619
???header.sponsordeclaration???
|
|
|
|
???tair.name??? >
???browser.page.title.title???
|
Showing items 748126-748150 of 2348719 (93949 Page(s) Totally) << < 29921 29922 29923 29924 29925 29926 29927 29928 29929 29930 > >> View [10|25|50] records per page
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Wei, Chia-Hui;Wei, Chia-Hui;黃明祥 Y, H.Chin;Chin, Augustin Yeh-hao |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin) |
| 國立政治大學 |
2013.07 |
Security Analysis of Choi et al.'s Certificateless Short Signature Scheme
|
左瑞麟; Tso, Raylin |
| 南台科技大學 |
2001-11 |
Security Analysis of the Generalized Key Agreement and Password Authentication Protocol
|
葉禾田; Her-Tyan Yeh; H.M. Sun and T. Hwang |
| 國立成功大學 |
2001-11 |
Security analysis of the generalized key agreement and password authentication protocol
|
Yeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih |
| 國立交通大學 |
2014-12-08T15:17:00Z |
Security analysis of transformed-key asymmetric watermarking system
|
Chen, IT; Yeh, YS |
| 朝陽科技大學 |
2008 |
Security analysis of Zhang-Wang signature scheme without using one-way hash functions
|
楊伏夷;許明暉 |
| 國立東華大學 |
2008-04 |
Security Analysis on Authentication of Images Using Recursive Visual Cryptography
|
Yang,C.N.; Chen,T.S. |
| 朝陽科技大學 |
2009 |
Security analysis on the security enhancement for anonymous secure e-voting over computer network,
|
楊伏夷;陳皇佑 |
| 元智大學 |
2008-05 |
Security Analyst Following of Recovering Stocks
|
吳瑞萱; Hsiou-wei W. Lin |
| 元智大學 |
2008-05 |
Security Analyst Following of Recovering Stocks
|
吳瑞萱; Hsiou-wei W. Lin |
| 元智大學 |
2011-12-09 |
Security Analysts'' Incentive and Cognitive Processing Bias: Evidence from Analysts'' Recommendations
|
Ruei-Shian Wu; Hsiou-wei Lin |
| 元智大學 |
2011-12 |
Security Analysts'''' Incentive and Cognitive Processing Bias: Evidence from Analysts'''' Recommendations
|
Ruei-Shian Wu; Hsiou-wei Lin |
| 國立臺灣大學 |
2006-08 |
Security Analysts’ Competence in Value and Glamour
|
Lin, Hsiou-wei; Wu, Ray-hsuan |
| 臺大學術典藏 |
1999-08 |
Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies
|
Lin, Hsiou-Wei W; Lin, Hsiou-wei W |
| 國立臺灣大學 |
1999-08 |
Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies
|
Lin, Hsiou-wei W |
| 元智大學 |
Dec-14 |
Security analysts’ incentive and cognitive processing bias: evidence from analysts’ recommendations
|
Ruei-Shian Wu; H.W. Lin |
| 臺大學術典藏 |
2020-02-15T03:52:25Z |
Security analysts’ incentive and cognitive processing bias: Evidence from analysts’ recommendations
|
Wu R.-S.;Lin H.-W.W.; Wu R.-S.; Lin H.-W.W.; HSIOU-WEI W. LIN |
| 國立臺灣大學 |
1998-04 |
Security and Auditing in VPN and its Trends
|
Lei, C. L. |
| 亞洲大學 |
2015/05 |
Security and Communication Networks
|
李正吉; Lee, Cheng-Chi |
| 亞洲大學 |
2018-01 |
Security and Efficiency Enhancement of Robust ID based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
|
李正吉;Lee, Cheng-Chi |
| 國立高雄師範大學 |
2005 |
Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms
|
楊中皇; Chung-Huang Yang;Hikaru Morita;Tatsuaki Okamoto |
| 國立交通大學 |
2015-12-02T02:59:31Z |
Security and privacy in unified communications: Challenges and solutions
|
Karopoulos, Georgios; Portokalidis, Georgios; Domingo-Ferrer, Josep; Lin, Ying-Dar; Geneiatakis, Dimitris; Kambourakis, Georgios |
| 亞洲大學 |
2020-01-20 |
Security and Privacy in Wireless Sensor Networks: Advances and Challenges
|
李正吉; Lee, Cheng-Chi |
| 臺北醫學大學 |
2007 |
Security and Privacy Protection Protocol for Shared Medical Records
|
Kuo-Ching Liua;Hui-Feng Huangb |
Showing items 748126-748150 of 2348719 (93949 Page(s) Totally) << < 29921 29922 29923 29924 29925 29926 29927 29928 29929 29930 > >> View [10|25|50] records per page
|