| 朝陽科技大學 |
2009-10 |
Attack and Improve the Zhao-Liu Authenticated Encryption Scheme
|
江茂綸; Ting-Yi Chang |
| 臺大學術典藏 |
2021-08-15T00:08:43Z |
Attack Is the Best Defense: A Multi-Mode Poisoning PUF Against Machine Learning Attacks
|
Lin, Chia Chih; MING-SYAN CHEN |
| 臺大學術典藏 |
2018-09-10T06:35:08Z |
Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment
|
C. M. Yu; C. C. Li; C. S. Lu; D. T. Lee; S. Y. Kuo; SY-YEN KUO |
| 元智大學 |
2012-05 |
Attack-Resistant Wireless Localization Using An Inclusive Disjunction Model
|
Shih-Hau Fang; Chung-Chih Chuang; Chiapin Wang |
| 中華大學 |
2009 |
Attacking and defending perspective of e-Crime behavior and psychology: A systemic dynamic simulation approach
|
邱登裕; Chiu, Deng-Yiv |
| 中華大學 |
2010 |
Attacking and Defending Perspective of E-Crime Behavior and Psychology: A Systemic Dynamic Simulation Approach
|
邱登裕; Chiu, Deng-Yiv |
| 國立臺灣大學 |
2004-02 |
Attacking Visible Watermarking Schemes
|
Huang, Chun-Hsiang; Wu, Ja-Ling |
| 臺大學術典藏 |
2018-09-10T04:49:33Z |
Attacking visible watermarking schemes
|
Huang, C.-H.; Wu, J.-L.; Huang, C.-H.; Wu, J.-L.; JA-LING WU |
| 亞洲大學 |
2005 |
Attacks and Countermeasures in Software System Security
|
Jeffrey J. P. Tsai;L. Ma |
| 國立成功大學 |
2014-02 |
Attacks and Improvement on "Quantum Direct Communication with Mutual Authentication"
|
Lin, Tzu-Han; Yang, Chun-Wei; Hwang, Tzonelih |
| 國立成功大學 |
2001-09 |
Attacks and solutions on strong-password authentication
|
Lin, Chun-Li; Sun, Hung-Min; Hwang, Tzonelih |
| 國立高雄師範大學 |
2004 |
Attacks on a threshold proxy signature scheme based on the RSA cryptosystem
|
吳明倫; Yuh-Dauh Lyuu;Ming-Luen Wu |
| 臺大學術典藏 |
2004 |
Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen; Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 臺大學術典藏 |
2004 |
Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
|
Yuh-Dauh Lyuu; Ming-Luen Wu; Yuh-Dauh Lyuu; Ming-Luen Wu |
| 國立臺灣大學 |
2004 |
Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
|
Lyuu, Yuh-Dauh; Wu, Ming-Luen |
| 國立臺灣大學 |
2004 |
Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
|
Yuh-Dauh Lyuu; Ming-Luen Wu |
| 亞洲大學 |
2007-04 |
Attacks on Provably Secure Proxy-protected Signature Schemes based on Factoring
|
Wu, C. C. ; Chang, C. C. |
| 淡江大學 |
2012-06-15 |
Attacks on the Ruler in Surrey's “Of Sardanapalus' Dishonorable Life and Miserable Death” and Shelley's “Feelings of a Republican on the Fall of Bonaparte”
|
包俊傑 |
| 國立彰化師範大學 |
1999-07 |
Attacks on Threshold Signature Schemes with Traceable Signers
|
Tseng, Yuh-Min; Jan, J. K. |
| 國立臺灣大學 |
2002 |
Attained Adult Height in Juvenile Rheumatoid Arthritis with or without Corticosteroid Treatment
|
楊曜旭; 林于粲; 江伯倫; YANG, YAO-HSU; LIN, YU-TSAN; CHIANG, BOR-LUEN |
| 臺大學術典藏 |
2020-06-27T06:40:13Z |
Attained adult height in juvenile rheumatoid arthritis with or without corticosteroid treatment
|
Wang S.-J.;Yang Y.-H.;Lin Y.-T.;Yang C.-M.;Bor-Luen Chiang; Wang S.-J.; Yang Y.-H.; Lin Y.-T.; Yang C.-M.; BOR-LUEN CHIANG |
| 臺大學術典藏 |
2021-01-06T08:24:06Z |
Attained adult height in juvenile rheumatoid arthritis with or without corticosteroid treatment
|
Wang S.-J.;Yao-Hsu Yang;Lin Y.-T.;Yang C.-M.;Chiang B.-L.; Wang S.-J.; YAO-HSU YANG; Lin Y.-T.; Yang C.-M.; Chiang B.-L. |
| 臺大學術典藏 |
2021-07-02T03:42:43Z |
Attained adult height in juvenile rheumatoid arthritis with or without corticosteroid treatment
|
Wang S.-J.; Yang Y.-H.; Lin Y.-T.; Yang C.-M.; BOR-LUEN CHIANG |
| 國立成功大學 |
2007-10 |
Attaining a homogeneous microstructure of a ZnO-Based multilayer varistor by constrained sintering
|
Lee, Wen-His; Chen, Wei-Ting; Su, Chi-Yi |
| 臺北醫學大學 |
2009 |
Attaining good end-of-life care in intensive care units in Taiwan-the dilemma and the strategy
|
賴允亮; Shih-Yi Lee; Chung-Lieh Hung; Jun-Hua Lee; Shou-Chuan Shih; Yu-Ling Weng; Wen-Han Chang; Yueh-Hsiu Ho; Wen-Chu Huang; Yuen-Liang Lai |