| 國立成功大學 |
2020-02-15 |
On the Schmid's Law for the electric current-induced deformation: An in situ EBSD study
|
林士剛; LIN, SHIH-KANG;Liu, Yu-chen;Chiu, Shang-Jui |
| 國立臺灣大學 |
1999 |
On the Search for H5O2(superscript +)-centered Water Clusters in the Gas Phase
|
張煥正; 江志強; 張海舟; 王亦生; 林聖賢; 李遠哲 |
| 臺大學術典藏 |
2018-09-10T06:02:47Z |
On the Search of Internet Topology Invariants
|
Lung-De Shyu; Seng-Yong Lau; Polly Huang; POLLY HUANG |
| 國立政治大學 |
1996 |
On the Search of Mobile Agents
|
冷俊武;連耀南 |
| 國立政治大學 |
1996-10 |
On the Search of Mobile Agents, Indoor and Mobile Radio Communications
|
連耀南 |
| 國立臺灣大學 |
1992-09 |
On the Seasonal Variation of the Kuroshio Intrusion onto the East China Sea
|
陳慶生; 王冑; Chern, Ching-Sheng; Wang, Joe |
| 臺大學術典藏 |
2018-09-10T06:21:01Z |
On the second eigenfunctions of the Laplacian in R2
|
Lin, C.-S.; Lin, C.-S.; CHANG-SHOU LIN |
| 淡江大學 |
2004-01 |
On the second eigenvalue of the laplace operator on a spherical band
|
謝忠村; Shieh, Chung-tsun |
| 臺大學術典藏 |
2020-01-06T03:05:59Z |
On the second-order moment turbulence model for simulating a bubble column
|
Zhou, L.X.; Yang, M.; Lian, C.Y.; Fan, L.S.; Lee, D.J.; DUU-JONG LEE |
| 元智大學 |
2009-12 |
On the Second-Order Statistics of a Dual-Hop Weibull Fading Channel
|
趙燿庚; 黃勇達(Karl Y. -T. Huang) |
| 元智大學 |
2009-12 |
On the Second-Order Statistics of a Dual-Hop Weibull Fading Channel
|
趙燿庚; 黃勇達(Karl Y. -T. Huang) |
| 元智大學 |
2012-07 |
On the Second-Order Statistics of Correlated Cascaded Rayleigh Fading Channels
|
Yawgeng Chau; KarlY.-T. Huang |
| 臺大學術典藏 |
2008-10-28T05:50:33Z |
On the Secondary Resonance of a Spinning Disk under Space-Fixed Excitations
|
Sun, Chia-Min; Hua, Chin-Yi; Chen, Jen-San; Chen, Jen-San; Hua, Chin-Yi; Sun, Chia-Min |
| 國立臺灣大學 |
2004 |
On the Secondary Resonance of a Spinning Disk under Space-Fixed Excitations
|
Chen, Jen-San; Hua, Chin-Yi; Sun, Chia-Min |
| 東海大學 |
1997-06 |
On the Secrecy of Image Transmission in Computer Network
|
林祝興; Chu-Hsing Lin, C. Y. Dai and T. S. Wu |
| 國立臺灣大學 |
2012 |
On The Secrecy Rate Region of a Fading Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages and Partial CSIT
|
Lin, Pin-Hsun; Su, Chien-Li; Su, Hsuan-Jung |
| 國立成功大學 |
2005-01 |
On the security enhancement for anonymous secure e-voting over computer network
|
Hwang, Sheng-Yu; Wen, Hsiang-An; Hwang, Tzonelih |
| 國立彰化師範大學 |
2001 |
On the Security Methods for Protecting Password Transmission
|
Tseng, Yuh-Min; JAN, Jinn-Ke; CHIEN, Hung-Yu |
| 國立交通大學 |
2014-12-08T15:36:40Z |
On the security of a certified e-mail scheme with temporal authentication
|
Shao, MH; Zhou, JY; Wang, GL |
| 亞洲大學 |
2009-01 |
On the Security of A Copyright Protection Scheme Based on Visual Cryptography
|
Chen, T. H.;Chang, C. C.;Wu, C. S.;Lou, D. C. |
| 國立臺灣海洋大學 |
2013 |
On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
|
Han-Yu Lin |
| 南台科技大學 |
2003 |
On the Security of A Publicly Verifiable Authenticated Encryption
|
楊政達; Cheng-Ta Yang; Hung-Min Sun |
| 國立政治大學 |
2015-03 |
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
|
左瑞麟; Chen, Chien-Ming;Wu, Tsu-Yang;左瑞麟;Mambo, Masahiro;Wu, Mu-En |
| 國立成功大學 |
2002-01 |
On the security of a variation of Cramer-Shoup's public key scheme
|
Sun, Hung-Min |
| 國立彰化師範大學 |
2008 |
On the Security of an Efficient ID-based Partially Blind Signature Scheme
|
Tseng, Yuh-Min; Wu, T. Y. ; Wu, J. D. |
| 國立彰化師範大學 |
2004-08 |
On the Security of an Efficient Two-pass Key Agreement Protocol
|
Tseng, Yuh-Min |
| 亞洲大學 |
2004-03 |
On the Security of an Enhanced Authentication Key Exchange Protocol
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2004.03 |
On the Security of an Enhanced Authentication Key Exchange Protocol
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2011-04 |
On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol
|
黃明祥;Hwang, Min-Shiang |
| 國立成功大學 |
2011-04 |
On the security of an enhanced UMTS authentication and key agreement protocol
|
Hwang, Min-Shiang; Chong, Song-Kong; Ou, Hsia-Hung |
| 東海大學 |
2003-06-28 |
On the Security of Authenticated Key Agreement Protocols
|
林祝興; Chu-Hsing Lin and T. K. Liu |
| 南台科技大學 |
1993 |
On the security of Blundo-Santis Herzberg-Kutten-Vaccaro-Yung perfectly-secure key distribtion for dynamic coferences
|
李南逸; T. Hwang; N.Y. Lee; M.Y. Ko; C.M. Li; Y.H. Chen |
| 南台科技大學 |
1996 |
On the security of Chang and Wu`s broadcasting cryptosystem for computer networks
|
李南逸; T. Hwang; N.Y. Lee; C.M. Li; C.C. Chang |
| 南台科技大學 |
1996-12 |
On the security of Chang et al. ‘s cryptographic key assignment scheme for access control in a hierarchy
|
李南逸; T. Hwang; N.Y. Lee; C.C. Chang |
| 南台科技大學 |
1999-01 |
On the security of fair blind signature scheme using oblivious transfer
|
李南逸; N.Y. Lee; T. Hwang |
| 國立彰化師範大學 |
2001 |
On the Security of Generalization of Threshold Signature and Authenticated Encryption
|
Tseng, Yuh-Min; JAN, J. K. ; CHIEN, H. Y . |
| 東海大學 |
2005-06-27 |
On the security of ID-based Password Authentication Scheme using Smart Cards and Fingerprints
|
林祝興; Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin and Yi-Yi Lai |
| 東海大學 |
2005-06-27 |
On the security of ID-based password authentication scheme using smart cards and fingerprints??
|
Lin, C.-H., Lin, T.-S., Lin, H.-H., Lai, Y.-Y. |
| 國立彰化師範大學 |
1996-12 |
On the Security of Image Encryption Method
|
Jan, Jinn-Ke; Tseng, Yuh-Min |
| 臺大學術典藏 |
2020-05-04T07:56:16Z |
On the Security of Intra-Car Wireless Sensor Networks.
|
HSIN-MU TSAI; Tonguz, Ozan K.; Lee, Hayan;Tsai, Hsin-Mu;Tonguz, Ozan K.; Lee, Hayan; Tsai, Hsin-Mu |
| 朝陽科技大學 |
2003 |
On the security of mutual authentication and key exchange for low power wireless communications
|
楊伏夷;陳榮靜 |
| 南台科技大學 |
1997-10 |
On the security of Park et al’s key distribution protocol for digital mobile communications
|
李南逸; N.Y. Lee; T. Hwang |
| 亞洲大學 |
2007-05 |
On the Security of Sehkar's Signature Schemes
|
;Lee, Cheng-Chi;Ku, Wei-Han;黃秀園;Huang, Shiow-Yuan |
| 亞洲大學 |
2011-04 |
On The Security Of Self-Certified Public Keys
|
黃明祥;Hwang, Min-Shiang |
| 國立暨南國際大學 |
2012 |
On the security of several Gen2-based protocols without modifying the standards
|
Chen, CS; Chen, CS |
| 國立暨南國際大學 |
2012 |
On the security of several Gen2-based protocols without modifying the standards
|
簡宏宇; Chien, HY |
| 國立成功大學 |
2012-06 |
On the security of several Gen2-based protocols without modifying the standards
|
Lee, Chin-Feng; Chien, Hung-Yu; Laih, Chi-Sung; Chen, Chi-Sheng |
| 國立成功大學 |
2003 |
On the security of some password authentication protocols
|
Hsieh, Bin-Tsan; Sun, Hung-Min; Hwang, Tzonelih |
| 國立成功大學 |
2005-02-01 |
On the security of some proxy blind signature schemes
|
Sun, Hung-Min; Hsieh, Bin-Tsan; Tseng, Shin-Mu |
| 元智大學 |
2003-12 |
On The Security of TETRA
|
周錫增; Yixian Yang; Xiao-Guang Zhou |