| 臺北醫學大學 |
2001 |
Security Mechanism in Medical Informatics By using Enhanced CORBA based Component
|
劉立; Jin-Cheng; Chen; L. Liu |
| 臺大學術典藏 |
2020-05-04T07:53:54Z |
Security Mechanisms and Security-Aware Mapping for Real-Time Distributed Embedded Systems.
|
Lin, Chung-Wei; Lin, Chung-Wei; CHUNG-WEI LIN |
| 亞洲大學 |
2006 |
Security Modeling and Analysis of Mobile Agent Systems
|
Ma, Lu;Ma, Lu;蔡進發;Jeffrey, J.P.Tsai |
| 臺北市立大學 |
2007 |
Security modeling on the supply chain networks
|
Shing, M. L.;幸曼玲;Shing, C. C.;Chen, K. L;Lee, H. |
| 國立成功大學 |
2007-02 |
Security of "asymmetrical quantum key distribution protocol"
|
Li, Chuan-Ming; Hwang, Tzonelih; Lee, Kuo-Chang |
| 國立成功大學 |
2004-01 |
Security of a remote user authentication scheme using smart cards
|
Yeh, Her-Tyan; Sun, Hung-Min; Hsieh, Bin-Tsan |
| 南台科技大學 |
2004-01 |
Security of a Remote User Authentication using Smart Cards
|
葉禾田; Her-Tyan Yeh; H.M. Sun; and B.T. Hsieh |
| 國立成功大學 |
1999-11-25 |
Security of broadcasting cryptosystem in computer networks
|
Sun, Hung-Min |
| 中國文化大學 |
2006 |
Security of efficient password authenticated key agreement using smart cards
|
謝文恭著 |
| 亞洲大學 |
2006-09 |
Security of fragile watermarking scheme for image authentication
|
廖冠捷;Liao, Kuan-Chieh |
| 淡江大學 |
2005-08-05 |
Security of Hsu–Wu's authenticated encryption scheme with (t, n) shared verification
|
黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih |
| 國立交通大學 |
2014-12-08T15:41:32Z |
Security of improvement on methods for protecting password transmission
|
Yang, CC; Chang, TY; Hwang, MS |
| 中國文化大學 |
2005 |
Security of Lee et al.'s remote authentication model of information appliances
|
Shieh, Wen-Gong; Wang, Jian-Min |
| 中國文化大學 |
2005 |
Security of Lee et al.'s remote authentication model of information appliances
|
謝文恭等著 |
| 中國文化大學 |
2009 |
Security of Message Passing Based on Grid Environment
|
陳恆生等著 |
| 南台科技大學 |
2003-03 |
Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications
|
葉禾田; 4. X. Yi; C.K. Siew; H.M. Sun; Her-Tyan Yeh; C. L. Lin and T. Hwang |
| 國立成功大學 |
2003-03 |
Security of Park-Lim key agreement schemes for VSAT satellite communications
|
Yi, Xun; Siew, Chee-Kheong; Sun, Hung-Min; Yeh, Her-Tyan; Lin, Chun-Li; Hwang, Tzonelih |
| 南台科技大學 |
1999-03 |
Security of Shao's signature schemes based on factoring and discrete logarithms
|
李南逸; N.Y. Lee |
| 佛光大學 |
1999-06-01 |
Security of the authenticated multiple-key agreement protocols
|
吳宗杉;He W.H.;Hsu C.L. |
| 國立臺灣科技大學 |
2000 |
Security of the Jan-Tseng integrated schemes of user authentication and access control
|
He, W.H;Wu, T.C |
| 淡江大學 |
2005-09-01 |
Security of Tzeng–Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems
|
黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih |
| 亞洲大學 |
2014-04 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Hsia, 黃明祥 Shu-Yin;Hsia, Shu-Yin;W.P.Yang;Yang, Wei-Pang |
| 亞洲大學 |
201404 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Anonymous |
| 國立交通大學 |
2014-12-08T15:22:19Z |
Security optical data storage in Fourier holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |
| 國立彰化師範大學 |
2012-03 |
Security Optical Data Storage in Fourier Holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |