| 臺大學術典藏 |
2018-09-10T08:36:18Z |
Authentication of domestic Taiwan rice varieties based on fingerprinting analysis of microsatellite DNA markers
|
Chuang, H.-Y. and Lur, H.-S. and Hwu, K.-K. and Chang, M.-C.; KAE-KANG HWU |
| 中國醫藥大學 |
2007-12-01 |
Authentication of Evolvulus species in Taiwan:(Evolvulus alsinoides and Evolvulus glomeratus)
|
陳弘偉(Hung-Wei Chen); 張瓊之(Chiung-Chih Chang); 李昭瑩(cylee); 邱泰惠 |
| 亞洲大學 |
2009-08 |
Authentication of H.264 surveillance videos by hiding tree-structured macroblock decomposition information
|
S. H. Hung;W. H. Tsai |
| 國立成功大學 |
2023--APR |
Authentication of Lung CT-Scan Data in NIfTI Format Using LWT, Hessenberg Decomposition, and Affine Transform
|
Singh;Udham, Kamred;Kumar;Ankit;Singh;Teekam |
| 國立成功大學 |
2024-04-2 |
Authentication of Lung CT-Scan Data in NIfTI Format Using LWT, Hessenberg Decomposition, and Affine Transform
|
Singh;Udham, Kamred;Kumar;Ankit;Singh;Teekam |
| 國立交通大學 |
2014-12-08T15:44:22Z |
Authentication of mobile users in third generation mobile systems
|
Tzeng, ZJ; Tzeng, WG |
| 國立成功大學 |
2022-02 |
Authentication of NIfTI Neuroimages Using Lifting Wavelet Transform, Arnold Cat Map, Z-Transform, and Hessenberg Decomposition
|
Singh;Udham, Kamred;Hsieh;Sun-Yuan;Swarup;Chetan;Singh;Teekam |
| 亞洲大學 |
2006-08 |
Authentication of surveillance video sequences and contents by hiding motion vector information
|
K. F. Chien;W. H. Tsai |
| 義守大學 |
2017-12 |
Authentication Protocol Design and Low-Cost Key Encryption Function Implementation for Wireless Sensor Networks
|
Shao-I Chu;Yu-Jung Huang;Wei-Cheng Lin |
| 中國文化大學 |
2013 |
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices
|
Chang, YF (Chang, Ya-Fen); Tai, WL (Tai, Wei-Liang); Chen, CC (Chen, Chia-Chen) |
| 國立交通大學 |
2014-12-08T15:46:01Z |
Authentication protocols for the broadband ISDN billing system
|
Lo, CC; Yeh, YC |
| 國立交通大學 |
2014-12-08T15:16:42Z |
Authentication protocols using Hoover-Kausik's software token
|
Ku, Wei-Chi; Lee, Hui-Lung |
| 國立成功大學 |
2015-11-10 |
Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels
|
Chin, Wen-Long (William); Le, Trong Nghia; Tseng, Chun-Lin |
| 南台科技大學 |
2009 |
Authentication Schemes for Mobile RFID
|
楊政達; Cheng-Ta Yang; Hung-Min Sun; Shuai-Min Chen; Chen-En Lu |
| 亞洲大學 |
2005-08 |
Authentication Schemes with No Verification Table
|
Chang, Y. F. ; Chang, C. C |
| 國立臺灣科技大學 |
2012 |
Authentication using graphical password in cloud
|
Guo, M.-H.;Liaw, H.-T.;Hsiao, L.-L.;Huang, C.-Y.;Yen, C.-T. |
| 國立交通大學 |
2014-12-08T15:13:08Z |
Authentication vector management for UMTS
|
Wu, Lin-Yi; Lin, Yi-Bing |
| 國立臺灣科技大學 |
2013 |
Authentication with low-cost RFID tags in mobile networks
|
Yen, C.-T.;Guo, M.-H.;Lo, N.-W.;Deng, D.-J. |
| 國立臺灣科技大學 |
2018 |
Authentication with what you see and remember in the Internet of Things
|
Chiu, W.;Su, C.;Fan, C.-Y.;Chen, Chen C.-M.;Yeh, K.-H. |
| 國立政治大學 |
2013.09 |
Authentication, Authorization and File Synchronization for Hybrid Cloud-Security Foundation Centric to Google Apps, Hadoop and Linux Local Hosts
|
姜國輝; Chiang ,Jonannes K. |
| 國立政治大學 |
2013-07 |
Authentication, authorization and file synchronization in hybrid cloud: On case of Google Docs, Hadoop and Linux local hosts
|
Chiang, Johannes K.;Yen, Eric H. W.;Chen, Yen Hua; 姜國輝 |
| 中華大學 |
2006 |
Authenticity and Decontextualization: A Preliminary Survey of Zhang Ailing's Views on Love, Life, and Literature
|
陳雅書; Chen, Ya-shu |
| 國立交通大學 |
2014-12-08T15:20:45Z |
Authenticity Preservation with Histogram-Based Reversible Data Hiding and Quadtree Concepts
|
Huang, Hsiang-Cheh; Fang, Wai-Chi |
| 國立成功大學 |
2017 |
Authenticity, experience, and loyalty in the festival context: Evidence from the San Fermin festival, Spain
|
Girish;V, G.;Chen;Ching-Fu |
| 國立成功大學 |
2015-09-17 |
Authentification method for a communication network
|
Hwang, Tzone-Lih;Prosanta, Gope |