亞洲大學 |
2012-08 |
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
|
黃明祥;Hwang, Min-Shiang |
南台科技大學 |
2008-01 |
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
|
李南逸; N.Y. Lee; C.N. Wu; C.C. Wang |
亞洲大學 |
2010-05 |
Authenticated Multiple Keys Exchange Protocol based on Bilinear Pairings
|
李正吉;Lee, Cheng-Chi |
國立交通大學 |
2014-12-08T15:25:33Z |
Authenticated public-key distribution over WLAN/cellular dual networks
|
Hwu, JS; Chen, RJ; Lin, YB |
國立成功大學 |
2015-03 |
Authenticated Quantum Dialogue Based on Bell States
|
Lin, Ching-Ying; Yang, Chun-Wei; Hwang, Tzonelih |
亞洲大學 |
2013-01 |
Authenticated RFID security mechanism based on chaotic maps
|
Cheng, Zi-Yao;Cheng, Zi-Yao;Liu, Yun;Liu, Yun;張真誠;Chang, Chin-Chen;Shih-Chang, C;Chang, Shih-Chang |
國立成功大學 |
2016-02 |
Authenticated semi-quantum direct communication protocols using Bell states
|
Luo, Yi-Ping; Hwang, Tzonelih |
國立成功大學 |
2014-06 |
Authenticated semi-quantum key distribution protocol using Bell states
|
Yu, Kun-Fei; Yang, Chun-Wei; Liao, Ci-Hong; Hwang, Tzonelih |
國立成功大學 |
2016-07 |
Authenticated semi-quantum key distributions without classical channel
|
Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih |
臺大學術典藏 |
2021-08-12T02:12:49Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner E;Liao Y.-F;Wagner S.; Wagner E; Liao Y.-F; Wagner S.; YEN-FEN LIAO |
臺大學術典藏 |
2021-01-18T09:11:46Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner, Elvis; YEN-FEN LIAO; Wagner, Santoi |
國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
國立交通大學 |
2014-12-08T15:32:26Z |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics
|
Chang, Chia-Hao; Jang-Liaw, Nian-Hong; Lin, Yeong-Shin; Fang, Yi-Chiao; Shao, Kwang-Tsao |
國立臺灣海洋大學 |
2013 |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics.
|
Chia-Hao Chang; Nian-Hong Jang-Liaw; Yeong-Shin Lin; Yi-Chiao Fang; Kwang-Tsao Shao |
中國文化大學 |
2007 |
Authentication algorithm based on grid environment
|
蘇金石 |
中國文化大學 |
2011 |
Authentication Algorithm Based on Grid Environment
|
陳恆生等著 |
國立彰化師範大學 |
2004-06 |
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
|
Tseng, Yuh-Min; Yang, Chou-Chen; Su, Jiann-Haur |
國立交通大學 |
2014-12-08T15:10:52Z |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie; Lin, Sian-Jheng; Lin, Ja-Chen |
元培科技大學 |
102 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
國立高雄第一科技大學 |
2008.10 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
國立交通大學 |
2014-12-08T15:30:42Z |
AUTHENTICATION AND CROSS-RECOVERY OF MULTIPLE IMAGES
|
Chen, Lee Shu-Teng; Chen, Shang-Kuan; Lin, Ja-Chen |
國立交通大學 |
2014-12-08T15:11:25Z |
Authentication and recovery for wavelet-based semifragile watermarking
|
Tsai, Min-Jen; Chien, Chih-Cheng |
國立交通大學 |
2014-12-08T15:48:07Z |
Authentication and recovery of an image by sharing and lattice-embedding
|
Lin, Sian-Jheng; Lin, Ja-Chen |
淡江大學 |
1996-05 |
Authentication encryption schemes with message linkage
|
Hwang, Shin Jia; Chang, Chin Chen; Yang, Wei Pang |
中華大學 |
2013 |
Authentication Mechanism for Private Cloud of Enterprise
|
吳美玉; Wu, Mei-Yu |
元智大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
Yi-Hui Chen; Pei-Yu Lin |
元智大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
Yi-Hui Chen; Pei-Yu Lin |
亞洲大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
陳宜惠;Chen, Yi-Hui |
國立交通大學 |
2014-12-08T15:39:57Z |
Authentication of 3-D polygonal meshes
|
Lin, HY; Liao, HYM; Lu, CS; Lin, JC |
亞洲大學 |
2007-01 |
Authentication of Binary Document Images Based on Embedding the BCH Codes of Watermarks
|
Ming-Kao Hsu;Da-Chun Wu |
國立高雄第一科技大學 |
2007.01 |
Authentication of Binary Document Images Based on Embedding the BCH Codes of Watermarks
|
Wu, Da-chun;Hsu, Ming-kao |
中國醫藥大學 |
2007-12-01 |
Authentication of Centipeda minima in Taiwan
|
曾懷慶(Huai-Ching Tseng); 張瓊之(Chiung-Chih Cang); 李昭瑩(cylee); 邱泰惠 |
臺北醫學大學 |
2002 |
Authentication of Chinese medicinal materials by DNA technology: Authentication of the components from a mixture of herbal materials
|
鄭可大; Cheng KT |
中山醫學大學 |
2013 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
Huang, Yu-Ru; Yin, Mei-Chin; Hsieh, You-Liang; Yeh, Yen-Hung; Yang, Ya-Chen; Chung, Yun-Lung; Hsieh, Cheng-Hong Euan |
亞洲大學 |
201312 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
謝承紘;Hsieh, Cheng-Hong |
亞洲大學 |
2014-01 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
謝承紘;Hsieh, Cheng-Hong |
亞洲大學 |
2014 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
黃鈺茹;Huang, Yu-Ru;殷梅津;YIN, MEI-CHIN;謝宥諒;Hsieh, H.S.;葉彥宏;Yeh, Yen-Hung;楊雅甄;Yang, Ya-Chen;鐘云隆;Chung, Yun-Lung;謝承紘;*, Cheng-Hong Hsieh |
亞洲大學 |
201401 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
Yu-Ru Huang;Mei-Chin Yin;You-Liang Hsieh;Yen-Hung Yeh;Ya-Chen Yang;Yun-Lung Chung;Cheng-Hong Euan Hsieh |
亞洲大學 |
2014 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
黃鈺茹(Yu-Ru Huang); 殷梅津(YIN, MEI-CHIN); 謝宥諒(Hsieh H.S.); 葉彥宏(Yen-Hung Yeh); 楊雅甄(Ya-Chen Yang); 鐘云隆(Yun-Lung Chung); 謝承紘(Cheng-Hong Hsieh)* |
亞洲大學 |
201401 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
Yu-Ru Huang;Mei-Chin Yin;You-Liang Hsieh;Yen-Hung Yeh;Ya-Chen Yang;Yun-Lung Chung;Cheng-Hong Euan Hsieh |
中國醫藥大學 |
2014-01 |
Authentication of consumer fraud in Taiwanese fish products by molecular trace evidence and forensically informative nucleotide sequencing
|
(Yu-Ru Huang);殷梅津(YIN, MEI-CHIN);(You-Liang Hsieh);(Yen-Hung Yeh);(Ya-Chen Yang);(Yun-Lung Chung);(Cheng-Hong, Euan Hsieh)* |
中國醫藥大學 |
2007-12-01 |
Authentication of Desmodium sequax WALL. and Phyllodium pulchellum L. in Taiwan
|
張肇元(Chao-Yuan Chang); 蔡仁傑(Jen-Chieh Tsai); 李昭瑩(cylee); 邱泰惠 |
臺大學術典藏 |
2018-09-10T08:36:18Z |
Authentication of domestic Taiwan rice varieties based on fingerprinting analysis of microsatellite DNA markers
|
Chuang, H.-Y. and Lur, H.-S. and Hwu, K.-K. and Chang, M.-C.; KAE-KANG HWU |
臺大學術典藏 |
2018-09-10T08:36:20Z |
Authentication of domestic Taiwan rice varieties based on fingerprinting analysis of microsatellite DNA markers
|
Chuang, H.-Y. and Lur, H.-S. and Hwu, K.-K. and Chang, M.-C.; MEN-CHI CHANG |
中國醫藥大學 |
2007-12-01 |
Authentication of Evolvulus species in Taiwan:(Evolvulus alsinoides and Evolvulus glomeratus)
|
陳弘偉(Hung-Wei Chen); 張瓊之(Chiung-Chih Chang); 李昭瑩(cylee); 邱泰惠 |
亞洲大學 |
2009-08 |
Authentication of H.264 surveillance videos by hiding tree-structured macroblock decomposition information
|
S. H. Hung;W. H. Tsai |
國立成功大學 |
2023--APR |
Authentication of Lung CT-Scan Data in NIfTI Format Using LWT, Hessenberg Decomposition, and Affine Transform
|
Singh;Udham, Kamred;Kumar;Ankit;Singh;Teekam |
國立交通大學 |
2014-12-08T15:44:22Z |
Authentication of mobile users in third generation mobile systems
|
Tzeng, ZJ; Tzeng, WG |
國立成功大學 |
2022-02 |
Authentication of NIfTI Neuroimages Using Lifting Wavelet Transform, Arnold Cat Map, Z-Transform, and Hessenberg Decomposition
|
Singh;Udham, Kamred;Hsieh;Sun-Yuan;Swarup;Chetan;Singh;Teekam |
亞洲大學 |
2006-08 |
Authentication of surveillance video sequences and contents by hiding motion vector information
|
K. F. Chien;W. H. Tsai |