亞洲大學 |
2012-08 |
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
|
黃明祥;Hwang, Min-Shiang |
南台科技大學 |
2008-01 |
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
|
李南逸; N.Y. Lee; C.N. Wu; C.C. Wang |
亞洲大學 |
2010-05 |
Authenticated Multiple Keys Exchange Protocol based on Bilinear Pairings
|
李正吉;Lee, Cheng-Chi |
國立交通大學 |
2014-12-08T15:25:33Z |
Authenticated public-key distribution over WLAN/cellular dual networks
|
Hwu, JS; Chen, RJ; Lin, YB |
國立成功大學 |
2015-03 |
Authenticated Quantum Dialogue Based on Bell States
|
Lin, Ching-Ying; Yang, Chun-Wei; Hwang, Tzonelih |
亞洲大學 |
2013-01 |
Authenticated RFID security mechanism based on chaotic maps
|
Cheng, Zi-Yao;Cheng, Zi-Yao;Liu, Yun;Liu, Yun;張真誠;Chang, Chin-Chen;Shih-Chang, C;Chang, Shih-Chang |
國立成功大學 |
2016-02 |
Authenticated semi-quantum direct communication protocols using Bell states
|
Luo, Yi-Ping; Hwang, Tzonelih |
國立成功大學 |
2014-06 |
Authenticated semi-quantum key distribution protocol using Bell states
|
Yu, Kun-Fei; Yang, Chun-Wei; Liao, Ci-Hong; Hwang, Tzonelih |
國立成功大學 |
2016-07 |
Authenticated semi-quantum key distributions without classical channel
|
Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih |
臺大學術典藏 |
2021-08-12T02:12:49Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner E;Liao Y.-F;Wagner S.; Wagner E; Liao Y.-F; Wagner S.; YEN-FEN LIAO |
臺大學術典藏 |
2021-01-18T09:11:46Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner, Elvis; YEN-FEN LIAO; Wagner, Santoi |
國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
國立交通大學 |
2014-12-08T15:32:26Z |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics
|
Chang, Chia-Hao; Jang-Liaw, Nian-Hong; Lin, Yeong-Shin; Fang, Yi-Chiao; Shao, Kwang-Tsao |
國立臺灣海洋大學 |
2013 |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics.
|
Chia-Hao Chang; Nian-Hong Jang-Liaw; Yeong-Shin Lin; Yi-Chiao Fang; Kwang-Tsao Shao |
中國文化大學 |
2007 |
Authentication algorithm based on grid environment
|
蘇金石 |
中國文化大學 |
2011 |
Authentication Algorithm Based on Grid Environment
|
陳恆生等著 |
國立彰化師範大學 |
2004-06 |
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
|
Tseng, Yuh-Min; Yang, Chou-Chen; Su, Jiann-Haur |
國立交通大學 |
2014-12-08T15:10:52Z |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie; Lin, Sian-Jheng; Lin, Ja-Chen |
元培科技大學 |
102 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
國立高雄第一科技大學 |
2008.10 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
國立交通大學 |
2014-12-08T15:30:42Z |
AUTHENTICATION AND CROSS-RECOVERY OF MULTIPLE IMAGES
|
Chen, Lee Shu-Teng; Chen, Shang-Kuan; Lin, Ja-Chen |
國立交通大學 |
2014-12-08T15:11:25Z |
Authentication and recovery for wavelet-based semifragile watermarking
|
Tsai, Min-Jen; Chien, Chih-Cheng |
國立交通大學 |
2014-12-08T15:48:07Z |
Authentication and recovery of an image by sharing and lattice-embedding
|
Lin, Sian-Jheng; Lin, Ja-Chen |
淡江大學 |
1996-05 |
Authentication encryption schemes with message linkage
|
Hwang, Shin Jia; Chang, Chin Chen; Yang, Wei Pang |
中華大學 |
2013 |
Authentication Mechanism for Private Cloud of Enterprise
|
吳美玉; Wu, Mei-Yu |