| 國立交通大學 |
2014-12-08T15:06:13Z |
Properties of vortex propagation in a niobium film with spacing-graded density of pinning sites
|
Horng, Lance; Wu, T. C.; Wu, J. C.; Cao, R.; Yang, T. J. |
| 國立交通大學 |
2014-12-08T15:05:30Z |
Optical characteristics of silver film on the moth-eye structure
|
Ting, C. J.; Tsai, H. Y.; Chou, C. P.; Lin, H. Y.; Wu, T. C. |
| 國立臺灣科技大學 |
2014 |
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2014 |
Developing a not-reached adaptive test with K-Nearest Neighbor method to evaluate examinees' ability
|
Chang, Y.-C.;Wu, T.-C. |
| 臺大學術典藏 |
2014 |
Toll-like receptor agonist imiquimod facilitates antigen-specific CD8+ T-cell accumulation in the genital tract leading to tumor control through IFN�^
|
Soong R.-S.; Song L.; Trieu J.; Knoff J.; He L.; Tsai Y.-C.; Huh W.; Chang Y.-N.; WEN-FANG CHENG; Roden R.B.S.; Wu T.-C.; Trimble C.L.; Hung C.-F. |
| 臺大學術典藏 |
2014 |
Sequential combination of robot-assisted therapy and constraint-induced therapy in stroke rehabilitation: A randomized controlled trial
|
Hsieh Y.-W.;Keh-Chung Lin;Horng Y.-S.;Wu C.-Y.;Wu T.-C.;Ku F.-L.; Hsieh Y.-W.; KEH-CHUNG LIN; Horng Y.-S.; Wu C.-Y.; Wu T.-C.; Ku F.-L. |
| 國立臺灣科技大學 |
2013 |
Efficient proxy signature scheme for mobile devices using bilinear pairings
|
Tsai J.-L.; Lo N.-W.; Wu T.-C. |
| 國立臺灣科技大學 |
2013 |
Robust certificateless signature scheme without bilinear pairings
|
Yeh, K.-H.;Tsai, K.-Y.;Kuo, R.-Z.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
New identity-based sequential aggregate signature scheme from RSA
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure handover authentication protocol based on bilinear pairings
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure e-health system on passive RFID: Outpatient clinic and emergency care
|
Yeh, K.-H.;Lo, N.-W.;Wu, T.-C.;Wang, C. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Novel anonymous authentication scheme using smart cards
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Optimal scheduling for retrieval jobs in double-deep AS/RS by evolutionary algorithms
|
Wu, K.-Y.;Xu, S.S.-D.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Comments on IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
|
Chien, H.-Y.;Lee, C.-I.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
A new password-based multi-server authentication scheme robust to password guessing attacks
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Efficient and secure three-party authenticated key exchange protocol for mobile environments
|
Chou, C.-H.;Tsai, K.-Y.;Wu, T.-C.;Yeh, K.-H. |
| 國立臺灣科技大學 |
2013 |
ID-based aggregate proxy signature scheme realizing warrant-based delegation
|
Lin, Y.-C.;Wu, T.-C.;Tsai, J.-L. |
| 國立臺灣科技大學 |
2013 |
Exploring design-fits for the strategic alignment of information systems with business objectives
|
Chou, T.-C.;Weng, P.-D.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
ID-Based authenticated group key agreement protocol from bilinear pairings for wireless mobile devices
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Provably secure gateway-oriented password-based authenticated key exchange protocol resistant to password guessing attacks
|
Chien, H.-Y.;Wu, T.-C.;Yeh, M.-K. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
ID-Based authenticated group key agreement protocol from bilinear pairings for wireless mobile devices
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Information security management for microsoft windows enterprise environments
|
Chang, Y.-C.;Wu, T.-C. |
| 國立政治大學 |
2012-10 |
Project-based learning with an online peer assessment system in a photonics instruction for enhancing led design skills
|
Chang, S.-H.;Wu, T.-C.;You, LiChih |