English  |  正體中文  |  简体中文  |  Total items :2856565  
Visitors :  53392488    Online Users :  871
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

Jump to: [ Chinese Items ] [ 0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
or enter the first few letters:   

Showing items 748031-748080 of 2348973  (46980 Page(s) Totally)
<< < 14956 14957 14958 14959 14960 14961 14962 14963 14964 14965 > >>
View [10|25|50] records per page

Institution Date Title Author
元培科技大學 2009 Secure communication based on a hybrid of chaos and ICA encryptions Wei-ching Chen; John Yuan
淡江大學 2001-01 Secure Communication for Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design Lian, Kuang-yow; Chiu, Chian-song; Chiang, Tung-sheng; Liu, Peter
大葉大學 2011-11 Secure Communication for Electronic Business Applications in Mobile Agent Networks Tsaur, Woei-Jiunn
東海大學 1994-07-00 Secure Communication for Users in Specified Access Instances 林祝興
國立交通大學 2014-12-08T15:46:04Z Secure communication mechanisms for GSM networks Lo, CC; Chen, YJ
國立交通大學 2015-07-21T08:29:22Z Secure communication zone for white-light LED visible light communication Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung; Chen, Chung-Yen; Lin, Chao-Nan; Hsu, Dar-Zu
中華大學 2009 Secure communications and data management in ubiquitous services 許慶賢; Hsu, Ching-Hsien
亞洲大學 2007-08 Secure Communications for Cluster-based Ad Hoc Networks Using Node Identities Lee, J. S. ; Chang, C. C.
國立成功大學 2009-11 Secure Communications in Local Multipoint Distribution Service (LMDS) Networks Anastasopoulos, Markos P.; Petraki, Dionysia K.; Chen, Hsiao-Hwa
中原大學 2001 Secure Communications of Chaotic Systems with Robust Performance via Fuzzy Observer-Based Design Kuang-Yow Lian;Chian-Song Chiu;Tung-Sheng Chiang;Peter Liu
國立臺灣大學 2005-11 Secure content delivery using key composition Huang, Chun-Ying; Chiu, Yun-Peng; Chen, Kuan-Ta; Chiou, Hann-Huei; Lei, Chin-Laung
臺大學術典藏 2018-09-10T05:26:49Z Secure Content Delivery using Key Composition C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI
國立臺灣海洋大學 2015 Secure Content Distribution Using Multi-hop Proxy Re-encryption Han-Yu Lin
國立成功大學 2020 Secure Content-Based Image Retrieval in the Cloud with Key Confidentiality Li, J.-S.;Liu, I.-H.;Tsai, C.-J.;Su, Z.-Y.;Li, C.-F.;Liu, C.-G.
國立臺灣海洋大學 2009 Secure Convertible Authenticated Encryption Scheme Based on RSA. Tzong-Sun Wu;Han-Yu Lin
國立臺灣科技大學 2013 Secure convertible undeniable signature scheme using extended Euclidean algorithm without random oracles Horng, S.-J.;Tzeng, S.-F.;Fan, P.;Wang, X.;Li, T.;Khurram Khan, M.
淡江大學 2017年12月1日 Secure Data Collection Scheme for Wireless Sensor Networks Hwang, Ren-Junn;Huang, Y. Z.
國立成功大學 2022 Secure Data Transmission and Image Encryption Based on a Digital-Redesign Sliding Mode Chaos Synchronization Fang, J.-S.;Tsai, J.S.-H.;Yan, J.-J.;Chiang, L.-H.;Guo, S.-M.
淡江大學 2015-08-06 Secure Data Transmission Scheme for WSNs Hwang, Ren Junn;Huang, Yan Zhi
國立臺灣科技大學 2015 Secure degrees of freedom of MIMO Rayleigh block fading wiretap channels with no CSI anywhere Liu, T.-Y.;Mukherjee, P.;Ulukus, S.;Lin, S.-C.;Peter Hong, Y.-W.
國立臺灣科技大學 2012 Secure delegation-based authentication protocol for Wireless roaming service Tsai, J.-L.;Lo, N.-W.;Wu, T.-C.
南台科技大學 2008-04 Secure Direct Communication using Deterministic BB84 Protocol 李南逸; T. Hwang; C.M. Li; N.Y. Lee
國立成功大學 2008-04 Secure direct communication using deterministic BB84 protocol Hwang, Tzonelih; Li, Chuan-Ming; Lee, Narn-Yih
臺大學術典藏 2018-09-10T08:08:26Z Secure distributed data aggregation Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO
國立臺灣大學 2004-02 Secure Document Access Architecture based on Distributed Firewall and Proxy Technologies Pan, Chi Chien; Yang, Kai Hsiang; Lee, Tzao Lin
國立臺灣科技大學 2014 Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere Liu T.-Y., Mukherjee P., Ulukus S., Lin S.-C., Hong Y.-W.P.
東海大學 2012 Secure dynamic access control scheme of PHR in cloud computing Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
國立臺灣科技大學 2013 Secure e-health system on passive RFID: Outpatient clinic and emergency care Yeh, K.-H.;Lo, N.-W.;Wu, T.-C.;Wang, C.
淡江大學 2005-01 Secure e-mail protocols providing perfect forward secrecy 孫宏民; Sun, Hung-min; 謝濱燦; Hsieh, Bin-tsan; 黃心嘉; Hwang, Shin-jia
國立成功大學 2005-01 Secure e-mail protocols providing perfect forward secrecy Sun, Hung-Min; Hsieh, Bin-Tsan; Hwang, Hsin-Jia
大葉大學 2010-12-16 Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems Tsaur, Woei-Jiunn;Tsai, Hsin-Chieh
國立交通大學 2014-12-08T15:07:00Z Secure encrypted-data aggregation for wireless sensor networks Huang, Shih-I; Shieh, Shiuhpyng; Tygar, J. D.
國立交通大學 2014-12-08T15:40:24Z Secure error-free steganography for JPEG images Lee, YK; Chen, LH
國立暨南國際大學 2009 Secure fast WLAN handoff using time-bound delegated authentication? 簡宏宇; Chien, HY
朝陽科技大學 2013-06-09 Secure Fondue 起司鍋具設計 廖修平; Shiou_Ping, Liao
國立交通大學 2014-12-08T15:21:22Z Secure Group Key Management Using Uni-Directional Proxy Re-Encryption Schemes Chen, Yi-Ruei; Tygar, J. D.; Tzeng, Wen-Guey
國立臺灣科技大學 2013 Secure handover authentication protocol based on bilinear pairings Tsai, J.-L.;Lo, N.-W.;Wu, T.-C.
國立臺灣海洋大學 2014 Secure ID-Based Strong Designated Verifier Signature Scheme for E-Commerce Chi-Kuang Yeh;Han-Yu Lin
臺大學術典藏 2020-06-11T06:24:09Z Secure image hashing via minimum distortion estimation Hsu, C.-Y.;Lu, C.-S.;Pei, S.-C.; Hsu, C.-Y.; Lu, C.-S.; Pei, S.-C.; SOO-CHANG PEI
國家衛生研究院 2023-12-02 Secure information and data centres: An exploratory study Pant, P;Anand, K;Onthoni, DD
臺大學術典藏 2018-09-10T03:50:41Z Secure information by using digital data embedding and spread spectrum techniques C.-D. Chung; CHAR-DIR CHUNG; K.-C. Fan; C.-L. Tsai
國立交通大學 2018-08-21T05:52:51Z Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control Yeh, Lo-Yao; Tsaur, Woei-Jiunn; Huang, Hsin-Han
南台科技大學 2005-02 Secure Key Agreement Protocols for Three-Party against Guessing Attacks 陳炳彰; H.M. Sun and B.C. Chen
國立成功大學 2004-02-15 Secure key agreement protocols for three-party against guessing attacks Sun, Hung-Min; Chen, Bing-Chang; Hwang, Tzonelih
國立臺灣科技大學 2009 Secure key management scheme for hierarchical access control based on ECC Lin Y.-L.; Hsu C.-L.; Wu T.-C.; Yen S.-L.; Tseng C.-L.
淡江大學 2006-09 Secure Key Management Scheme for Wireless LAN 黃仁俊; Hwang, Ren-junn; Lai, Chih-hua; Chen, Yun-ru
國立交通大學 2014-12-08T15:39:32Z Secure key-evolving for public key cryptosystems based on the discrete logarithm problem Lu, CF; Shieh, SP
國立臺灣科技大學 2017 Secure location tracking of femtocells in heterogeneous cellular networks Cheng, S.-M.;Wang, Y.-J.;Chen, Y.-C.
國立交通大學 2017-04-21T06:48:59Z Secure MIMO Transmission via Compressive Sensing Lin, Chia-Hua; Tsai, Shang-Ho (Lawrence); Lin, Yuan-Pei
國立交通大學 2018-08-21T05:53:33Z Secure Mobile-Phone Based Visible Light Communications With Different Noise-Ratio Light-Panel Chow, Chi-Wai; Shiu, Ruei-Jie; Liu, Yen-Chun; Yeh, Chien-Hung; Liao, Xin-Lan; Lin, Kun-Hsien; Wang, Yi-Chang; Chen, Yi-Yuan

Showing items 748031-748080 of 2348973  (46980 Page(s) Totally)
<< < 14956 14957 14958 14959 14960 14961 14962 14963 14964 14965 > >>
View [10|25|50] records per page