| 國立成功大學 |
2016-07 |
Authenticated semi-quantum key distributions without classical channel
|
Li, Chuan-Ming; Yu, Kun-Fei; Kao, Shih-Hung; Hwang, Tzonelih |
| 臺大學術典藏 |
2021-08-12T02:12:49Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner E;Liao Y.-F;Wagner S.; Wagner E; Liao Y.-F; Wagner S.; YEN-FEN LIAO |
| 臺大學術典藏 |
2021-01-18T09:11:46Z |
Authenticated Spoken Texts for L2 Listening Tests
|
Wagner, Elvis; YEN-FEN LIAO; Wagner, Santoi |
| 國立臺灣科技大學 |
1996 |
Authenticating passwords over an insecure channel
|
Wu, T.C;Sung, H.S |
| 國立交通大學 |
2014-12-08T15:32:26Z |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics
|
Chang, Chia-Hao; Jang-Liaw, Nian-Hong; Lin, Yeong-Shin; Fang, Yi-Chiao; Shao, Kwang-Tsao |
| 國立臺灣海洋大學 |
2013 |
Authenticating the use of dried seahorses in the traditional Chinese medicine market in Taiwan using molecular forensics.
|
Chia-Hao Chang; Nian-Hong Jang-Liaw; Yeong-Shin Lin; Yi-Chiao Fang; Kwang-Tsao Shao |
| 中國文化大學 |
2007 |
Authentication algorithm based on grid environment
|
蘇金石 |
| 中國文化大學 |
2011 |
Authentication Algorithm Based on Grid Environment
|
陳恆生等著 |
| 國立彰化師範大學 |
2004-06 |
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
|
Tseng, Yuh-Min; Yang, Chou-Chen; Su, Jiann-Haur |
| 國立交通大學 |
2014-12-08T15:10:52Z |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie; Lin, Sian-Jheng; Lin, Ja-Chen |
| 元培科技大學 |
102 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
| 國立高雄第一科技大學 |
2008.10 |
Authentication and cross-recovery for multiple images
|
Chang, Yu-Jie;Lin, Sian-Jheng;Lin, Ja-Chen |
| 國立交通大學 |
2014-12-08T15:30:42Z |
AUTHENTICATION AND CROSS-RECOVERY OF MULTIPLE IMAGES
|
Chen, Lee Shu-Teng; Chen, Shang-Kuan; Lin, Ja-Chen |
| 國立交通大學 |
2014-12-08T15:11:25Z |
Authentication and recovery for wavelet-based semifragile watermarking
|
Tsai, Min-Jen; Chien, Chih-Cheng |
| 國立交通大學 |
2014-12-08T15:48:07Z |
Authentication and recovery of an image by sharing and lattice-embedding
|
Lin, Sian-Jheng; Lin, Ja-Chen |
| 淡江大學 |
1996-05 |
Authentication encryption schemes with message linkage
|
Hwang, Shin Jia; Chang, Chin Chen; Yang, Wei Pang |
| 中華大學 |
2013 |
Authentication Mechanism for Private Cloud of Enterprise
|
吳美玉; Wu, Mei-Yu |
| 元智大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
Yi-Hui Chen; Pei-Yu Lin |
| 元智大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
Yi-Hui Chen; Pei-Yu Lin |
| 亞洲大學 |
2012-09 |
Authentication Mechanism for Secret Sharing Using Boolean Operation
|
陳宜惠;Chen, Yi-Hui |
| 國立交通大學 |
2014-12-08T15:39:57Z |
Authentication of 3-D polygonal meshes
|
Lin, HY; Liao, HYM; Lu, CS; Lin, JC |
| 亞洲大學 |
2007-01 |
Authentication of Binary Document Images Based on Embedding the BCH Codes of Watermarks
|
Ming-Kao Hsu;Da-Chun Wu |
| 國立高雄第一科技大學 |
2007.01 |
Authentication of Binary Document Images Based on Embedding the BCH Codes of Watermarks
|
Wu, Da-chun;Hsu, Ming-kao |
| 中國醫藥大學 |
2007-12-01 |
Authentication of Centipeda minima in Taiwan
|
曾懷慶(Huai-Ching Tseng); 張瓊之(Chiung-Chih Cang); 李昭瑩(cylee); 邱泰惠 |
| 臺北醫學大學 |
2002 |
Authentication of Chinese medicinal materials by DNA technology: Authentication of the components from a mixture of herbal materials
|
鄭可大; Cheng KT |