| 國立臺灣科技大學 |
2010 |
Authenticated group key agreement protocol for unbalanced wireless mobile networks
|
Lu C.-F.; Wu T.-C.; Shih T.-F. |
| 東海大學 |
2003 |
Authenticated Key Agreement Based on Elliptic Curve Cryptography
|
林祝興; Chu-hsing Lin and K. L. Hwang |
| 亞洲大學 |
2012-08 |
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
|
黃明祥;Hwang, Min-Shiang |
| 南台科技大學 |
2008-01 |
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings
|
李南逸; N.Y. Lee; C.N. Wu; C.C. Wang |
| 亞洲大學 |
2010-05 |
Authenticated Multiple Keys Exchange Protocol based on Bilinear Pairings
|
李正吉;Lee, Cheng-Chi |
| 國立交通大學 |
2014-12-08T15:25:33Z |
Authenticated public-key distribution over WLAN/cellular dual networks
|
Hwu, JS; Chen, RJ; Lin, YB |
| 國立成功大學 |
2015-03 |
Authenticated Quantum Dialogue Based on Bell States
|
Lin, Ching-Ying; Yang, Chun-Wei; Hwang, Tzonelih |
| 亞洲大學 |
2013-01 |
Authenticated RFID security mechanism based on chaotic maps
|
Cheng, Zi-Yao;Cheng, Zi-Yao;Liu, Yun;Liu, Yun;張真誠;Chang, Chin-Chen;Shih-Chang, C;Chang, Shih-Chang |
| 國立成功大學 |
2016-02 |
Authenticated semi-quantum direct communication protocols using Bell states
|
Luo, Yi-Ping; Hwang, Tzonelih |
| 國立成功大學 |
2014-06 |
Authenticated semi-quantum key distribution protocol using Bell states
|
Yu, Kun-Fei; Yang, Chun-Wei; Liao, Ci-Hong; Hwang, Tzonelih |
| 國立成功大學 |
2016-07 |
Authenticated semi-quantum key distributions without classical channel
|
Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih |
| 臺大學術典藏 |
2021-08-12T02:12:49Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner E;Liao Y.-F;Wagner S.; Wagner E; Liao Y.-F; Wagner S.; YEN-FEN LIAO |
| 臺大學術典藏 |
2021-01-18T09:11:46Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner, Elvis; YEN-FEN LIAO; Wagner, Santoi |
| 國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
| 國立交通大學 |
2014-12-08T15:32:26Z |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics
|
Chang, Chia-Hao; Jang-Liaw, Nian-Hong; Lin, Yeong-Shin; Fang, Yi-Chiao; Shao, Kwang-Tsao |
| 國立臺灣海洋大學 |
2013 |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics.
|
Chia-Hao Chang; Nian-Hong Jang-Liaw; Yeong-Shin Lin; Yi-Chiao Fang; Kwang-Tsao Shao |
| 中國文化大學 |
2007 |
Authentication algorithm based on grid environment
|
蘇金石 |
| 中國文化大學 |
2011 |
Authentication Algorithm Based on Grid Environment
|
陳恆生等著 |
| 國立彰化師範大學 |
2004-06 |
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
|
Tseng, Yuh-Min; Yang, Chou-Chen; Su, Jiann-Haur |
| 國立交通大學 |
2014-12-08T15:10:52Z |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie; Lin, Sian-Jheng; Lin, Ja-Chen |
| 元培科技大學 |
102 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
| 國立高雄第一科技大學 |
2008.10 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
| 國立交通大學 |
2014-12-08T15:30:42Z |
AUTHENTICATION AND CROSS-RECOVERY OF MULTIPLE IMAGES
|
Chen, Lee Shu-Teng; Chen, Shang-Kuan; Lin, Ja-Chen |
| 國立交通大學 |
2014-12-08T15:11:25Z |
Authentication and recovery for wavelet-based semifragile watermarking
|
Tsai, Min-Jen; Chien, Chih-Cheng |
| 國立交通大學 |
2014-12-08T15:48:07Z |
Authentication and recovery of an image by sharing and lattice-embedding
|
Lin, Sian-Jheng; Lin, Ja-Chen |