| 臺大學術典藏 |
2014 |
Sequential combination of robot-assisted therapy and constraint-induced therapy in stroke rehabilitation: A randomized controlled trial
|
Hsieh Y.-W.;Keh-Chung Lin;Horng Y.-S.;Wu C.-Y.;Wu T.-C.;Ku F.-L.; Hsieh Y.-W.; KEH-CHUNG LIN; Horng Y.-S.; Wu C.-Y.; Wu T.-C.; Ku F.-L. |
| 國立臺灣科技大學 |
2013 |
Efficient proxy signature scheme for mobile devices using bilinear pairings
|
Tsai J.-L.; Lo N.-W.; Wu T.-C. |
| 國立臺灣科技大學 |
2013 |
Robust certificateless signature scheme without bilinear pairings
|
Yeh, K.-H.;Tsai, K.-Y.;Kuo, R.-Z.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
New identity-based sequential aggregate signature scheme from RSA
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure handover authentication protocol based on bilinear pairings
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure e-health system on passive RFID: Outpatient clinic and emergency care
|
Yeh, K.-H.;Lo, N.-W.;Wu, T.-C.;Wang, C. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Novel anonymous authentication scheme using smart cards
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Optimal scheduling for retrieval jobs in double-deep AS/RS by evolutionary algorithms
|
Wu, K.-Y.;Xu, S.S.-D.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Comments on IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
|
Chien, H.-Y.;Lee, C.-I.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
A new password-based multi-server authentication scheme robust to password guessing attacks
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Efficient and secure three-party authenticated key exchange protocol for mobile environments
|
Chou, C.-H.;Tsai, K.-Y.;Wu, T.-C.;Yeh, K.-H. |
| 國立臺灣科技大學 |
2013 |
ID-based aggregate proxy signature scheme realizing warrant-based delegation
|
Lin, Y.-C.;Wu, T.-C.;Tsai, J.-L. |
| 國立臺灣科技大學 |
2013 |
Exploring design-fits for the strategic alignment of information systems with business objectives
|
Chou, T.-C.;Weng, P.-D.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
ID-Based authenticated group key agreement protocol from bilinear pairings for wireless mobile devices
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Provably secure gateway-oriented password-based authenticated key exchange protocol resistant to password guessing attacks
|
Chien, H.-Y.;Wu, T.-C.;Yeh, M.-K. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
ID-Based authenticated group key agreement protocol from bilinear pairings for wireless mobile devices
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Information security management for microsoft windows enterprise environments
|
Chang, Y.-C.;Wu, T.-C. |
| 國立政治大學 |
2012-10 |
Project-based learning with an online peer assessment system in a photonics instruction for enhancing led design skills
|
Chang, S.-H.;Wu, T.-C.;You, LiChih |
| 實踐大學 |
2012 |
An Integral Predictive Model of Financial Distress
|
Lee, M.;Wu, T.C. |
| 實踐大學 |
2012 |
Credit risk assessment and decision making by a fusion approach
|
Wu, T.C.;Hsu, M.F. |
| 實踐大學 |
2012 |
REVISITING THE EFFICIENT MARKET HYPOTHESIS FOR AFRICAN COUNTRIES: PANEL SURKSS TEST WITH A FOURIER FUNCTION
|
Zhang, D.X.;Wu, T.C.;Chang, T.Y.;Lee, C.H. |
| 實踐大學 |
2012 |
An Integral Predictive Model of Financial Distress
|
Lee, M.;Wu, T.C. |
| 實踐大學 |
2012 |
Credit risk assessment and decision making by a fusion approach
|
Wu, T.C.;Hsu, M.F. |