| 國立臺灣海洋大學 |
2008 |
Autecology of Antennospora (Fungi: Ascomycota: Sordariomycetidae: Halosphaeriales) and its phylogeny
|
Ka-Lai Pang;E. B. Gareth Jones;Lilian L P Vrijmoed |
| 國立臺灣海洋大學 |
2008 |
Autecology of Antennospora salina (Ascomycota, Fungi) and its phylogeny
|
Pang K. L.;Vrijmoed L. L. P.;Jones E. B. G. |
| 國立東華大學 |
2011 |
Authentic Assessment of Aesthetic Caring Education and Talents Cultivation through A-R-T Action Research
|
羅美蘭 |
| 臺大學術典藏 |
2019-12-25T05:53:14Z |
Authentic Leadership and Employee Voice Behavior: A Multi-Level Psychological Process
|
Hsiung, H.-H.; Hsiung, H.-H.; HSIN-HUA HSIUNG |
| 國立交通大學 |
2014-12-08T15:35:45Z |
Authentic Mode-Toggled Detector with Fast Transient Response under Wide Load Range Buck-Boost Converter
|
Lin, Moris; Huang, Yung-Sheng; Ehrhart, Andreas; Lee, Yu-Huei; Chiu, Chao-Chang; Wicht, Bernhard; Chen, Ke-Horng |
| 國立臺灣大學 |
2009-09 |
Authentic-Blue Phosphorescent Iridium(III) Complexes Bearing Both Hydride and Benzyl Diphenylphosphine; Control of the Emission Efficiency by Ligand Coordination Geometry
|
Chiu, Yuan-Chieh; Lin, Chen-Huey; Hung, Jui-Yi; Chi, Yun; Cheng, Yi-Ming; Wang, Kang-Wei; Chung, Min-Wen; Lee, Gene-Hsiang; Chou, Pi-Tai |
| 臺大學術典藏 |
2018-09-10T07:34:05Z |
Authentic-blue phosphorescent iridium(III) complexes bearing both hydride and benzyl diphenylphosphine; Control of the emission efficiency by ligand coordination geometry
|
Chiu, Y.-C.; Lin, C.-H.; Hung, J.-Y.; Chi, Y.; Cheng, Y.-M.; Wang, K.-W.; Chung, M.-W.; Lee, G.-H.; Chou, P.-T.; PI-TAI CHOU; Chiu, Y.-C.; Lin, C.-H.; Hung, J.-Y.; Chi, Y.; Cheng, Y.-M.; Wang, K.-W.; Chung, M.-W.; Lee, G.-H.; Chou, P.-T. |
| 國立臺灣海洋大學 |
2012 |
Authenticated encryption scheme based on Paillier system with verifiable public keys
|
Tzong-Sun Wu;Yih-Sen Chen;Han-Yu Lin;Tang-Kai Chang |
| 國立臺灣科技大學 |
1998 |
Authenticated encryption scheme with (t, n) shared verification
|
Hsu, C.L;Wu, T.C |
| 佛光大學 |
1999-05-01 |
Authenticated encryption schemes with double linkage
|
吳宗杉;Wu T.C.;He W.H. |
| 佛光大學 |
1999-05-01 |
Authenticated encryption schemes with double linkage
|
吳宗杉;Wu T.C.;He W.H. |
| 國立交通大學 |
2014-12-08T15:02:38Z |
Authenticated encryption schemes with message linkage
|
Hwang, SJ; Chang, CC; Yang, WP |
| 國立交通大學 |
2019-04-02T05:59:09Z |
Authenticated encryption schemes with message linkage
|
Hwang, SJ; Chang, CC; Yang, WP |
| 亞洲大學 |
2005-03 |
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
|
Huang, C. H.;Lee, C. Y.;Lin, C. H.;Chang, C. C.;Chen, K. L. |
| 東海大學 |
2005-03-25 |
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures
|
林祝興; Chu-Hsing Lin, Chi-Hsiung Huang, Chia-Yin Lee, Chin-Chen Chang, and Kuo-Lun Chen |
| 東海大學 |
2005-03-28 |
Authenticated encryption schemes with message linkage for threshold signatures?
|
Huang, C.-H., Lee, C.-Y., Lin, C.-H., Chang, C.-C., Chen, K.-L. |
| 國立彰化師範大學 |
2003-01 |
Authenticated Encryption Schemes with Message Linkages for Message Flows
|
Tseng, Yuh-Min; Jan, Jinn-Ke; Chien, Hung-Yu |
| 國立彰化師範大學 |
2000-05 |
Authenticated Encryption Schemes with Message Linkages for Message Flows
|
Tseng, Yuh-Min; Jan, J. K. ; Chien, H. Y. |
| 亞洲大學 |
2005-09 |
Authenticated Encryption Schemes: Current Status and Key Issues
|
黃明祥;Hwang, Min-Shiang |
| 國立臺灣科技大學 |
2010 |
Authenticated group key agreement protocol for unbalanced wireless mobile networks
|
Lu C.-F.; Wu T.-C.; Shih T.-F. |
| 東海大學 |
2003 |
Authenticated Key Agreement Based on Elliptic Curve Cryptography
|
林祝興; Chu-hsing Lin and K. L. Hwang |
| 亞洲大學 |
2012-08 |
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
|
黃明祥;Hwang, Min-Shiang |
| 南台科技大學 |
2008-01 |
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
|
李南逸; N.Y. Lee; C.N. Wu; C.C. Wang |
| 亞洲大學 |
2010-05 |
Authenticated Multiple Keys Exchange Protocol based on Bilinear Pairings
|
李正吉;Lee, Cheng-Chi |
| 國立交通大學 |
2014-12-08T15:25:33Z |
Authenticated public-key distribution over WLAN/cellular dual networks
|
Hwu, JS; Chen, RJ; Lin, YB |
| 國立成功大學 |
2015-03 |
Authenticated Quantum Dialogue Based on Bell States
|
Lin, Ching-Ying; Yang, Chun-Wei; Hwang, Tzonelih |
| 亞洲大學 |
2013-01 |
Authenticated RFID security mechanism based on chaotic maps
|
Cheng, Zi-Yao;Cheng, Zi-Yao;Liu, Yun;Liu, Yun;張真誠;Chang, Chin-Chen;Shih-Chang, C;Chang, Shih-Chang |
| 國立成功大學 |
2016-02 |
Authenticated semi-quantum direct communication protocols using Bell states
|
Luo, Yi-Ping; Hwang, Tzonelih |
| 國立成功大學 |
2014-06 |
Authenticated semi-quantum key distribution protocol using Bell states
|
Yu, Kun-Fei; Yang, Chun-Wei; Liao, Ci-Hong; Hwang, Tzonelih |
| 國立成功大學 |
2016-07 |
Authenticated semi-quantum key distributions without classical channel
|
Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih |
| 臺大學術典藏 |
2021-08-12T02:12:49Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner E;Liao Y.-F;Wagner S.; Wagner E; Liao Y.-F; Wagner S.; YEN-FEN LIAO |
| 臺大學術典藏 |
2021-01-18T09:11:46Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner, Elvis; YEN-FEN LIAO; Wagner, Santoi |
| 國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
| 國立交通大學 |
2014-12-08T15:32:26Z |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics
|
Chang, Chia-Hao; Jang-Liaw, Nian-Hong; Lin, Yeong-Shin; Fang, Yi-Chiao; Shao, Kwang-Tsao |
| 國立臺灣海洋大學 |
2013 |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics.
|
Chia-Hao Chang; Nian-Hong Jang-Liaw; Yeong-Shin Lin; Yi-Chiao Fang; Kwang-Tsao Shao |
| 中國文化大學 |
2007 |
Authentication algorithm based on grid environment
|
蘇金石 |
| 中國文化大學 |
2011 |
Authentication Algorithm Based on Grid Environment
|
陳恆生等著 |
| 國立彰化師範大學 |
2004-06 |
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
|
Tseng, Yuh-Min; Yang, Chou-Chen; Su, Jiann-Haur |
| 國立交通大學 |
2014-12-08T15:10:52Z |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie; Lin, Sian-Jheng; Lin, Ja-Chen |
| 元培科技大學 |
102 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
| 國立高雄第一科技大學 |
2008.10 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
| 國立交通大學 |
2014-12-08T15:30:42Z |
AUTHENTICATION AND CROSS-RECOVERY OF MULTIPLE IMAGES
|
Chen, Lee Shu-Teng; Chen, Shang-Kuan; Lin, Ja-Chen |
| 國立交通大學 |
2014-12-08T15:11:25Z |
Authentication and recovery for wavelet-based semifragile watermarking
|
Tsai, Min-Jen; Chien, Chih-Cheng |
| 國立交通大學 |
2014-12-08T15:48:07Z |
Authentication and recovery of an image by sharing and lattice-embedding
|
Lin, Sian-Jheng; Lin, Ja-Chen |
| 淡江大學 |
1996-05 |
Authentication encryption schemes with message linkage
|
Hwang, Shin Jia; Chang, Chin Chen; Yang, Wei Pang |
| 中華大學 |
2013 |
Authentication Mechanism for Private Cloud of Enterprise
|
吳美玉; Wu, Mei-Yu |
| 元智大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
Yi-Hui Chen; Pei-Yu Lin |
| 元智大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
Yi-Hui Chen; Pei-Yu Lin |
| 亞洲大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
陳宜惠;Chen, Yi-Hui |
| 國立交通大學 |
2014-12-08T15:39:57Z |
Authentication of 3-D polygonal meshes
|
Lin, HY; Liao, HYM; Lu, CS; Lin, JC |