| 淡江大學 |
2005-08-05 |
Security of Hsu–Wu's authenticated encryption scheme with (t, n) shared verification
|
黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih |
| 國立交通大學 |
2014-12-08T15:41:32Z |
Security of improvement on methods for protecting password transmission
|
Yang, CC; Chang, TY; Hwang, MS |
| 中國文化大學 |
2005 |
Security of Lee et al.'s remote authentication model of information appliances
|
Shieh, Wen-Gong; Wang, Jian-Min |
| 中國文化大學 |
2005 |
Security of Lee et al.'s remote authentication model of information appliances
|
謝文恭等著 |
| 中國文化大學 |
2009 |
Security of Message Passing Based on Grid Environment
|
陳恆生等著 |
| 南台科技大學 |
2003-03 |
Security of Park-Lim Key Agreement Schemes for VSAT Satellite Communications
|
葉禾田; 4. X. Yi; C.K. Siew; H.M. Sun; Her-Tyan Yeh; C. L. Lin and T. Hwang |
| 國立成功大學 |
2003-03 |
Security of Park-Lim key agreement schemes for VSAT satellite communications
|
Yi, Xun; Siew, Chee-Kheong; Sun, Hung-Min; Yeh, Her-Tyan; Lin, Chun-Li; Hwang, Tzonelih |
| 南台科技大學 |
1999-03 |
Security of Shao's signature schemes based on factoring and discrete logarithms
|
李南逸; N.Y. Lee |
| 佛光大學 |
1999-06-01 |
Security of the authenticated multiple-key agreement protocols
|
吳宗杉;He W.H.;Hsu C.L. |
| 國立臺灣科技大學 |
2000 |
Security of the Jan-Tseng integrated schemes of user authentication and access control
|
He, W.H;Wu, T.C |
| 淡江大學 |
2005-09-01 |
Security of Tzeng–Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems
|
黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih |
| 亞洲大學 |
2014-04 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Hsia, 黃明祥 Shu-Yin;Hsia, Shu-Yin;W.P.Yang;Yang, Wei-Pang |
| 亞洲大學 |
201404 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Anonymous |
| 國立交通大學 |
2014-12-08T15:22:19Z |
Security optical data storage in Fourier holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |
| 國立彰化師範大學 |
2012-03 |
Security Optical Data Storage in Fourier Holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |
| 亞洲大學 |
2001-08 |
Security patrolling in building corridors by multiple-camera computer vision and automatic vehicle navigation techniques
|
R. C. Liu;W. H. Tsai |
| 淡江大學 |
2008 |
Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait
|
白揚恩; Polisensky, Jan |
| 臺大學術典藏 |
2021-08-09T08:34:47Z |
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective
|
Yang X.; Wang X.; Yue W.T.; Sia C.L.; Luo X.; CHOON LING SIA |
| 中國文化大學 |
2017-07 |
Security Price Manipulation in Mergers and Acquisitions via Special Purpose Vehicles
|
吳盈德 |
| 中國文化大學 |
2021-02 |
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System
|
Liu, CH (Liu, Chia-Hui); Huang, YM (Huang, Yao-Min); Chen, TL (Chen, Tzer-Long); Wu, ZY (Wu, Zhen-Yu); Chen, HY (Chen, Hsuan-Yu) |
| 亞洲大學 |
2008-05 |
Security protection of face images transmitted on networks by information hiding techniques
|
D. C. Wu, C. S. Li;W. H. Tsai |
| 亞洲大學 |
2010-01 |
Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes
|
I. S. Lee;W. H. Tsai |
| 亞洲大學 |
2008-08 |
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
|
I. S. Lee;W. H. Tsai |
| 國立成功大學 |
2020 |
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems
|
Liu, C.-G.;Wu, C.-J.;Liu, I.-H.;Wu, C.-C.;Li, J.-S. |
| 國立政治大學 |
2008 |
Security Relations among China, Japan and Taiwan, 1995-2008
|
羅思婷 |