| 淡江大學 |
2013-08 |
Secular Variation in Rainfall Intensity and Temperature in Eastern Australia
|
Chen, Yi-Ru;Yu, Bofu;Jenkins, Graham |
| 國立東華大學 |
2004-07 |
Secularized Nourishment for Immortality: A Daoist Cookbook from Late Ming China
|
蘇恆安; Heng-an Su |
| 國立高雄第一科技大學 |
2014.08 |
Secure and Efficient Digital Rights Management Mechanisms with Privacy Protection
|
Huang, Jheng-jia;Lu, Pei-chun;Juang, Wen-shenq;Fan, Chun-i;Lin, Zheng-yang;Lin, Chun-hung; 莊文勝 |
| 國立臺灣科技大學 |
2020 |
Secure and efficient firmware update for increasing IoT-enabled smart devices
|
Lu, C.-H.;Liu, C.-H.;Chen, Z.-H. |
| 朝陽科技大學 |
2025-08 |
Secure and Efficient Graduate Employment: A Consortium Blockchain Framework with InterPlanetary File System for Privacy-Preserving Resume Management and Efficient Talent-Employer Matching
|
Chen, Chin-Ling; Zeng, Kuang-Wei; Chen, Hsing-Chung; Deng, Yong-Yuan; Lee, Chin-Feng; Huang, Der-Chen; Liu, Ling-Chun; 陳金鈴 |
| 淡江大學 |
2009-01 |
Secure and efficient group key management with shared key derivation
|
Lin, Jen-Chiun; Huang, Kuo-Hsuan; Lai, Feipei; Lee, Hung-Chang |
| 國立臺灣大學 |
2009 |
Secure and efficient group key management with shared key derivation
|
Lin, Jen-Chiun; Huang, Kuo-Hsuan; Lai, Feipei; Lee, Hung-Chang |
| 臺大學術典藏 |
2018-09-10T07:43:12Z |
Secure and Efficient Group Key Management with Shared Key Derivation
|
J. C. Lin,;K. H. Huang,;F. P. Lai,;H. C. Lee,; J. C. Lin,; K. H. Huang,; F. P. Lai,; H. C. Lee,; FEI-PEI LAI |
| 亞洲大學 |
2016-01 |
Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues
|
Wang), Feng Wang(Feng;CHang)*, 張真誠(Chin-Chen;Lin), Changlu Lin(Changlu;Chang), Shih-Chang C(Shih-Chang |
| 亞洲大學 |
2016-01 |
Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues
|
Wang, Feng;Wang, Feng;張真誠;CHang, Chin-Chen;*;Lin, Changlu;Lin, Changlu;Shih-Chang, Chang C;Chang, Shih-Chang |
| 亞洲大學 |
2016-01 |
Secure and Efficient Identity-Based Proxy Multi-Signature Using Cubic Residues
|
Chang;, Feng Wang;Feng Wang;張真誠;Chin-Chen CHang;*;Changlu Lin;Changlu Lin;Shih-Chang C;Shih-Chang |
| 朝陽科技大學 |
2004 |
Secure and Efficient Key Exchange Protocols for Low Power Wireless Communications
|
楊伏夷;詹進科 |
| 國立成功大學 |
2008-07 |
Secure and efficient time synchronization in heterogeneous sensor networks
|
Du, Xiaojiang; Guizani, Mohsen; Xiao, Yang; Chen, Hsiao-Hwa |
| 國立臺灣科技大學 |
2010 |
Secure and efficient time-bound key assignment scheme for access control in hierarchical structure
|
Lin Y.L;Wu, T.C;Hsu, C.L |
| 南台科技大學 |
2005-06 |
Secure and efficient web metering scheme
|
李南逸; N.Y. Lee; M.F. Lee |
| 國立交通大學 |
2019-04-02T06:00:23Z |
Secure and Fast Encryption (SAFE) with Classical Random Number Generators
|
Deng, Lih-Yuan; Shiau, Jyh-Jen Horng; Lu, Henry Horng-Shing; Bowman, Dale |
| 國立交通大學 |
2014-12-08T15:26:44Z |
Secure and invisible data hiding in 2-color images
|
Tseng, YC; Pan, HK |
| 國立臺灣大學 |
1996-05 |
Secure and Practical Electrical Voting Scheme for Real World Environments
|
Juang, W. S.; Lei, C. L. |
| 臺大學術典藏 |
2020-06-11T06:24:21Z |
Secure and robust SIFT
|
Hsu, C.-Y.;Lu, C.-S.;Pei, S.-C.; Hsu, C.-Y.; Lu, C.-S.; Pei, S.-C.; SOO-CHANG PEI |
| 臺大學術典藏 |
2018-09-10T08:17:58Z |
Secure and robust SIFT with resistance to chosen-plaintext attack
|
Chao-Yung Hsu;Chun-Shien Lu;S. C. Pei; Chao-Yung Hsu; Chun-Shien Lu; S. C. Pei; SOO-CHANG PEI |
| 國立交通大學 |
2014-03-01 |
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment
|
Lin, Ying-Dar; Shih, Tzung-Bi; Wu, Yu-Sung; Lai, Yuan-Cheng |
| 國立臺灣科技大學 |
2014 |
Secure and transparent network traffic replay, redirect, and relay in a dynamic malware analysis environment
|
Lin, Y.-D.;Shih, T.-B.;Wu, Y.-S.;Lai, Y.-C. |
| 國立臺灣科技大學 |
2012 |
Secure anonymous authentication protocol with unlinkability for mobile wireless environment
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2013 |
Secure anonymous authentication scheme without verification table for mobile satellite communication systems
|
Tsai, J.-L.;Lo, N.-W.;Wu, T.-C. |
| 國立臺灣科技大學 |
2016 |
Secure Anonymous Key Distribution Scheme for Smart Grid
|
Tsai, J.-L;Lo, N.-W. |
| 國立成功大學 |
2023 |
Secure Authentication in an IoT-Based Healthcare Environment with Strong Anonymity and Unclonable Device
|
Nurkifli, E.H.;Hwang, T. |
| 亞洲大學 |
2008-09 |
Secure Authentication Protocols for Mobile Commerce Transactions
|
Lee, J.S.;Chang, Y.F.;Chang, C.C. |
| 國立交通大學 |
2014-12-08T15:16:00Z |
Secure authentication protocols resistant to guessing attacks
|
Luo, Jia-Ning; Shieh, Shiuhpyng; Shen, Ji-Chiang |
| 淡江大學 |
2007-09 |
Secure Authentication Scheme for RFID
|
黃仁俊 |
| 東海大學 |
2012-03-26 |
Secure authentication scheme for supporting healthcare in wireless sensor networks
|
Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B |
| 東海大學 |
2013-10-22 |
Secure authorization for controlling access via key management scheme
|
Hsiao, T.-C.; Chen, T.-L.; Chen, C.-S.; Xu, F.-S.; Tsui, S.; Chung, Y.-F.; Chen, T.-S. |
| 國立臺灣科技大學 |
2016 |
Secure BLE-based Authentication for Micropayment using Wearable Device
|
鄭偉祥 |
| 國立交通大學 |
2014-12-08T15:26:21Z |
Secure bootstrapping and routing in an IPv6-based ad hoc network
|
Tseng, YC; Jiang, JR; Lee, JH |
| 國立交通大學 |
2014-12-08T15:49:14Z |
Secure broadcasting in large networks
|
Sun, HM; Shieh, SP |
| 國立暨南國際大學 |
2012 |
Secure centralized spectrum sensing for cognitive radio networks
|
周耀新; Chou, YH |
| 國立臺灣海洋大學 |
2016 |
Secure Certificateless Two-Party Key Agreement with Short Message
|
Han-Yu Lin |
| 國立臺灣科技大學 |
2015 |
Secure chaotic maps-based authenticated key agreement protocol without smartcard for multi-server environments
|
Tsai, J.-L.;Lo, N.-W. |
| 臺大學術典藏 |
2018-09-10T15:20:15Z |
Secure client side watermarking with limited key size
|
JA-LING WU; Wu, J.-L.; Lin, Y.-H.; Sun, J.-H.; Sun, J.-H.;Lin, Y.-H.;Wu, J.-L. |
| 國立臺灣科技大學 |
2018 |
Secure color image encryption algorithm based on chaotic signals and its FPGA realization
|
Yang, C.-H.;Huang, S.-J. |
| 元培科技大學 |
2009 |
Secure communication based on a hybrid of chaos and ICA encryptions
|
Wei-ching Chen; John Yuan |
| 淡江大學 |
2001-01 |
Secure Communication for Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Lian, Kuang-yow; Chiu, Chian-song; Chiang, Tung-sheng; Liu, Peter |
| 大葉大學 |
2011-11 |
Secure Communication for Electronic Business Applications in Mobile Agent Networks
|
Tsaur, Woei-Jiunn |
| 東海大學 |
1994-07-00 |
Secure Communication for Users in Specified Access Instances
|
林祝興 |
| 國立交通大學 |
2014-12-08T15:46:04Z |
Secure communication mechanisms for GSM networks
|
Lo, CC; Chen, YJ |
| 國立交通大學 |
2015-07-21T08:29:22Z |
Secure communication zone for white-light LED visible light communication
|
Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu |
| 中華大學 |
2009 |
Secure communications and data management in ubiquitous services
|
許慶賢; Hsu, Ching-Hsien |
| 亞洲大學 |
2007-08 |
Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities
|
Lee, J. S. ; Chang, C. C. |
| 國立成功大學 |
2009-11 |
Secure Communications in Local Multipoint Distribution Service (LMDS) Networks
|
Anastasopoulos, Markos P.; Petraki, Dionysia K.; Chen, Hsiao-Hwa |
| 中原大學 |
2001 |
Secure Communications of Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design
|
Kuang-Yow Lian;Chian-Song Chiu;Tung-Sheng Chiang;Peter Liu |