| 淡江大學 |
2012-05-30 |
Security Flaws in Zhang and Xu Improved Concurrent Signature Scheme
|
黃心嘉; Hwang, Shin-jia; Lee, Yen-Shih Lee |
| 淡江大學 |
2013-08-23 |
Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures
|
黃心嘉 |
| 臺大學術典藏 |
2017 |
Security implications of redirection trail in popular websites worldwide
|
Kim, T.H.-J.; Lin, W.-H.; HSU-CHUN HSIAO; Jeng, W.; Hsiao, H.-C.; Chang, L. |
| 臺大學術典藏 |
2020-05-04T07:56:32Z |
Security Implications of Redirection Trail in Popular Websites Worldwide.
|
HSU-CHUN HSIAO; Lin, Wei-Hsi; Kim, Tiffany Hyun-Jin; Jeng, Wei; Hsiao, Hsu-Chun; Chang, Li; Chang, Li;Hsiao, Hsu-Chun;Jeng, Wei;Kim, Tiffany Hyun-Jin;Lin, Wei-Hsi |
| 國立成功大學 |
2007 |
Security in Distributed and Networking Systems
|
陳曉華; Guojun Wang; Jie Ouyang; Minyi Guo |
| 國立政治大學 |
1996-11 |
Security in East Asia and Taiwan's Role
|
何思因 |
| 國立政治大學 |
1996-09 |
Security in East Asia and Taiwan's Role
|
Ho, Szu-Yin |
| 淡江大學 |
2007-06 |
Security in Eastern Asia- Let’s Start with Human Right
|
鄭欽模 |
| 國立成功大學 |
2015-08 |
Security in Space Information Networks
|
Jiang, Chunxiao; Wang, Xuexia; Wang, Jian; Chen, Hsiao-Hwa; Ren, Yong |
| 淡江大學 |
1998-10 |
Security in the Taiwan strait
|
翁明賢 |
| 國立成功大學 |
2008-08 |
Security in wireless sensor networks
|
Du, Xiaojiang; Chen, Hsiao-Hwa |
| 臺北市立大學 |
2006 |
Security Issues in Customer Relationship Management Systems。
|
Lee, H., Chen;K. L., Shing;C, C. C.;Shing, M. L.;幸曼玲 |
| 國立交通大學 |
2014-12-08T15:27:18Z |
Security issues on B-ISDN billing system
|
Lo, CC; Yeh, YC |
| 國立臺灣大學 |
1997 |
Security Management for ATM Networks
|
Lei, C. L. |
| 亞洲大學 |
2007 |
Security Management System For Critical Prison By Using RFID
|
Ahmad Syaukani |
| 臺北醫學大學 |
2001 |
Security Mechanism in Medical Informatics By using Enhanced CORBA based Component
|
劉立; Jin-Cheng; Chen; L. Liu |
| 臺大學術典藏 |
2020-05-04T07:53:54Z |
Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems.
|
Lin, Chung-Wei; Lin, Chung-Wei; CHUNG-WEI LIN |
| 亞洲大學 |
2006 |
Security Modeling and Analysis of Mobile Agent Systems
|
Ma, Lu;Ma, Lu;蔡進發;Jeffrey, J.P.Tsai |
| 臺北市立大學 |
2007 |
Security modeling on the supply chain networks
|
Shing, M. L.;幸曼玲;Shing, C. C.;Chen, K. L;Lee, H. |
| 國立成功大學 |
2007-02 |
Security of "asymmetrical quantum key distribution protocol"
|
Li, Chuan-Ming; Hwang, Tzonelih; Lee, Kuo-Chang |
| 國立成功大學 |
2004-01 |
Security of a remote user authentication scheme using smart cards
|
Yeh, Her-Tyan; Sun, Hung-Min; Hsieh, Bin-Tsan |
| 南台科技大學 |
2004-01 |
Security of a Remote User Authentication using Smart Cards
|
葉禾田; Her-Tyan Yeh; H.M. Sun; and B.T. Hsieh |
| 國立成功大學 |
1999-11-25 |
Security of broadcasting cryptosystem in computer networks
|
Sun, Hung-Min |
| 中國文化大學 |
2006 |
Security of efficient password authenticated key agreement using smart cards
|
謝文恭著 |
| 亞洲大學 |
2006-09 |
Security of fragile watermarking scheme for image authentication
|
廖冠捷;Liao, Kuan-Chieh |