| 元智大學 |
2008-05 |
Security Analyst Following of Recovering Stocks
|
吳瑞萱; Hsiou-wei W. Lin |
| 元智大學 |
2011-12-09 |
Security Analysts'' Incentive and Cognitive Processing Bias: Evidence from Analysts'' Recommendations
|
Ruei-Shian Wu; Hsiou-wei Lin |
| 元智大學 |
2011-12 |
Security Analysts'''' Incentive and Cognitive Processing Bias: Evidence from Analysts'''' Recommendations
|
Ruei-Shian Wu; Hsiou-wei Lin |
| 國立臺灣大學 |
2006-08 |
Security Analysts’ Competence in Value and Glamour
|
Lin, Hsiou-wei; Wu, Ray-hsuan |
| 臺大學術典藏 |
1999-08 |
Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies
|
Lin, Hsiou-Wei W; Lin, Hsiou-wei W |
| 國立臺灣大學 |
1999-08 |
Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies
|
Lin, Hsiou-wei W |
| 元智大學 |
Dec-14 |
Security analysts’ incentive and cognitive processing bias: evidence from analysts’ recommendations
|
Ruei-Shian Wu; H.W. Lin |
| 臺大學術典藏 |
2020-02-15T03:52:25Z |
Security analysts’ incentive and cognitive processing bias: Evidence from analysts’ recommendations
|
Wu R.-S.;Lin H.-W.W.; Wu R.-S.; Lin H.-W.W.; HSIOU-WEI W. LIN |
| 國立臺灣大學 |
1998-04 |
Security and Auditing in VPN and its Trends
|
Lei, C. L. |
| 亞洲大學 |
2015/05 |
Security and Communication Networks
|
李正吉; Lee, Cheng-Chi |
| 亞洲大學 |
2018-01 |
Security and Efficiency Enhancement of Robust ID based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
|
李正吉;Lee, Cheng-Chi |
| 國立高雄師範大學 |
2005 |
Security and Performance Evaluation of ESIGN and RSA on IC Cards by Using Byte-Unit Modular Algorithms
|
楊中皇; Chung-Huang Yang;Hikaru Morita;Tatsuaki Okamoto |
| 國立交通大學 |
2015-12-02T02:59:31Z |
Security and privacy in unified communications: Challenges and solutions
|
Karopoulos, Georgios; Portokalidis, Georgios; Domingo-Ferrer, Josep; Lin, Ying-Dar; Geneiatakis, Dimitris; Kambourakis, Georgios |
| 亞洲大學 |
2020-01-20 |
Security and Privacy in Wireless Sensor Networks: Advances and Challenges
|
李正吉; Lee, Cheng-Chi |
| 臺北醫學大學 |
2007 |
Security and Privacy Protection Protocol for Shared Medical Records
|
Kuo-Ching Liua;Hui-Feng Huangb |
| 中國醫藥大學 |
2007-11-16 |
Security and Privacy Protection Protocol for Shared Medical Records
|
劉國慶; 黃慧鳳(Hui-Feng Huang) |
| 中國醫藥大學 |
2007-11-16 |
Security and Privacy Protection Protocol for Shared Medical Records
|
劉國慶; 黃慧鳳(Hui-Feng Huang) |
| 淡江大學 |
2004-03 |
Security and Privacy Technologies for Distance Education Applications
|
施國琛 |
| 國立成功大學 |
2024 |
Security and Privacy Threats of O-RAN for Home Healthcare
|
Tang;B, -H.;Liu;I, -H.;Chen;H, -H.;Li;J, -S. |
| 淡江大學 |
2009 |
Security and prosperity in East Asia and the world
|
Tai, Wan-Chin; Zhao, Quansheng |
| 國立交通大學 |
2019-04-03T06:42:08Z |
Security approach to controlling access to personal health records in healthcare service
|
Chen, Tzer-Long; Liao, Yu-Ting; Chang, Yi-Fan; Hwang, Jen-Hung |
| 國立政治大學 |
1996-12 |
Security Arrangements in the Asia-Pacific Region
|
Lin, Cheng-Yi; 林正義 |
| 國立交通大學 |
2014-12-08T15:12:53Z |
Security aspects of mobile phone virus: a critical survey
|
Shih, Dong-Her; Lin, Binshan; Chiang, Hslu-Sen; Shih, Ming-Hung |
| 臺大學術典藏 |
2021-07-15T05:33:11Z |
Security assessment of taiwan solid wood product supply
|
CHYI-RONG CHIOU; Chan, Wei Hsun; Wu, Meng Shan; Lin, Jiunn Cheng |
| 臺大學術典藏 |
2021-07-26T09:44:08Z |
Security assessment of taiwan solid wood product supply
|
Chiou C.-R;Chan W.-H;Wu M.-S;Lin J.-C.; Chiou C.-R; Chan W.-H; Wu M.-S; Lin J.-C.; CHYI-RONG CHIOU |
| 國立臺灣科技大學 |
2013 |
Security attacks on the wavelet transform and singular value decomposition image watermarking
|
Guo, J.-M.;Prasetyo, H. |
| 國立交通大學 |
2015-07-21T08:28:56Z |
Security authentication using phase-encoded nanoparticle structures and polarized light
|
Carnicer, Artur; Hassanfiroozi, Amir; Latorre-Carmona, Pedro; Huang, Yi-Pai; Javidi, Bahram |
| 國立政治大學 |
2012 |
Security balancing for IT-enabled service innovation
|
Wu, Sou-Chein;Chen, A.H.-C.;Chu, H.-C. |
| 國立臺灣大學 |
2007 |
Security Biosignal Transmission based on Face Recognition for Telemedicine
|
Chien, Jen-Chien; Wang, Jeng-Pang; Cho, Chien-Lung; Chong, Fok-Ching |
| 佛光大學 |
2005-09-05 |
Security Challenges to the 21st Century Policing in Taiwan
|
張中勇 |
| 佛光大學 |
2005-12 |
Security Challenges to the 21st Century Policing in Taiwan
|
張中勇 |
| 國立成功大學 |
2008-12-18 |
Security co-existence of wireless sensor networks and RFID for pervasive computing
|
Sun, Bo; Xiao, Yang; Li, Chung Chih; Chen, Hsiao-Hwa; Yang, T. Andrew |
| 淡江大學 |
2016-03-16 |
Security Concerns and Currency Competition
|
Ray, Ou-Yang |
| 臺大學術典藏 |
2020-05-04T07:53:53Z |
Security concerns for automotive communication and software architecture.
|
Yu, Huafeng;Lin, Chung-Wei; Yu, Huafeng; Lin, Chung-Wei; CHUNG-WEI LIN |
| 臺大學術典藏 |
1990-07 |
Security Constrained Unit Commitment
|
Hsu, Yuan-Yih; Hsu, Yuan-Yih |
| 國立臺灣大學 |
1990-07 |
Security Constrained Unit Commitment
|
許源浴; Hsu, Yuan-Yih |
| 國立高雄師範大學 |
2013-07-17 |
Security Content Automation Protocol 於iPhone上之應用
|
陳長明; Chang-Min Chen |
| 淡江大學 |
2007-07 |
Security Cooperation among ASEAN, China and the United States (1967~2007): Evolution of Security Concept
|
Lin, Joyce Juo-yu |
| 淡江大學 |
2003-11-15 |
Security cooperation framework and mechanism in Southeast Asia
|
林若雩; Lin, Juo-yu |
| 淡江大學 |
1996 |
Security Cooperation in Southeast Asia: Singapore's Perspective
|
Shee, Poon-kim |
| 淡江大學 |
2017 |
Security cooperation in the Asia-Pacific region : assessing the efficacy of the asean regional forum
|
羅蘭德;Sikua, Roland Ueteri |
| 淡江大學 |
2008-03-10 |
Security Cooperations between the US and ASEAN-from Constructivist Perspective
|
林若雩; Lin, Juo-yu |
| 亞洲大學 |
2007 |
Security Cryptography for Low-Cost RFID Tags
|
Yorheza R. Widi |
| 亞洲大學 |
2014-07-09 |
Security Dealer’s Trading Behaviors: Test of the House Money Effect and Break-Even Effect
|
Hsu, Wei-Ting |
| 亞洲大學 |
2008-01 |
Security Design for Three-Party Encrypted Key Exchange Protocol Using Smart Cards
|
Chang, C. C.;Lee, J. S.;Cheng, T. F |
| 國立高雄大學 |
2008 |
Security Engineering for Software
|
王學亮 |
| 淡江大學 |
2001-06 |
Security Enhanced Packet Video with Dynamic Multicast Throughput Adjustment
|
吳庭育; Chao, H.C.; Chen, J.L. |
| 國立交通大學 |
2014-12-08T15:20:33Z |
Security Enhancement by Adopting the Chaotic System for Wavelet Tree Based Digital Image Watermarking
|
Tsai, Min-Jen |
| 亞洲大學 |
2005-08 |
Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2005.08 |
Security Enhancement for a Dynamic ID-based Remote User Authentication Scheme
|
黃明祥;Hwang, Min-Shiang |