| 國立臺灣大學 |
2002-05-01 |
Securities Regulation in Korea
|
林仁光 |
| 國立臺灣大學 |
2010-01-01 |
Securities Regulation in Taiwan
|
林仁光 |
| 國立臺灣大學 |
2003-01-01 |
Securities Regulation in Taiwan
|
林仁光 |
| 國立臺灣大學 |
2000-11-01 |
Securities Regulation in Taiwan
|
林仁光 |
| 國立臺灣大學 |
2006-02 |
Securities Regulation in Taiwan(International Securities Regulation)
|
林仁光 |
| 國立高雄第一科技大學 |
2011.10 |
Securitisation of Crossover Risk in Reverse Mortgages
|
Huang, Hong-Chih;Wang, Chou-Wen;Miao, Yuan-Chi; 王昭文 |
| 國立政治大學 |
2011-10 |
Securitisation of Crossover Risk in Reverse Mortgages
|
Huang,Hong-Chih ;Wang,Chou-Wen ;Miao,Yuan-Chi; 黃泓智;王昭文;苗莞琦 |
| 國立政治大學 |
2011.1 |
Securitisation of Crossover Risk in Reverse Mortgages
|
黃泓智;王昭文;苗莞琦; Huang, Hong-Chih ; Wang, Chou-Wen ; Miao, Yuan-Chi |
| 國立臺灣大學 |
2001-02-12 |
Securitisation of Insurance Risk and Relevant Regulatory Issues
|
汪信君 |
| 國立中山大學 |
2007-07 |
Securitization in life Insurance with Mortality Dependence and Stochastic Interest Rate
|
David Shyu |
| 國立成功大學 |
2010-06-15 |
Securitization Militarization and Gender Issue in T�rkiye
|
安愛潔; Atalay, Ece Selma |
| 國立政治大學 |
2017-09 |
Securitization of Food Issues in the UN and China's Food Security Governance
|
林義鈞; Lin, Scott Y. |
| 淡江大學 |
2017-01 |
Securitization Revised: Power Estimation Model of Actors
|
劉泰廷 |
| 國立政治大學 |
2017-03 |
Securitization, House Prices, and Bank Lending Standards. (In Chinese. With English summary.)
|
張興華; Chiang, Yeong-Yuh; Chang, Hsing-Hua; Tseng, Ping-Lun |
| 國立政治大學 |
2017-03 |
Securitization, House Prices, and Bank Lending Standards. (In Chinese. With English summary.) 資產證券化, 房屋價格, 與銀行貸放標準
|
張興華; Chiang, Yeong-Yuh; Chang, Hsing-Hua; Tseng, Ping-Lun |
| 國立成功大學 |
2010-06-15 |
Securitization, Militarization, and Gender Issue in T�rkiye
|
安愛潔; Atalay, Ece Selma |
| 國立臺灣大學 |
2004 |
Security
|
Tsay, Yih-Kuen |
| 中國文化大學 |
2021-11 |
Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks
|
Chang, Ya-Fen; Chen, Huan-Wen; Chang, Ting-Yu; Tai, Wei-Liang |
| 國立臺灣科技大學 |
2014 |
Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition
|
Guo, J.-M.;Prasetyo, H. |
| 亞洲大學 |
2013-07 |
Security Analysis and Improvement of a new Ultra-lightweight RFID Protocol
|
Xu Zhuang;Zhi-Hui Wang;Chin-Chen Chang;Yan Zhu |
| 國立政治大學 |
2014-10 |
Security analysis and improvement of femtocell access control
|
Chen, C.-M.;Wu, T.-Y.;Tso, Ray-Lin;Wu, M.-E.; 左瑞麟 |
| 淡江大學 |
2010-09 |
Security Analysis and Improvement of Remote User Authentication Scheme without Using Smart Cards
|
洪文斌; Horng, Wen-bing |
| 淡江大學 |
2010-12 |
Security Analysis and Improvement of the Remote User Authentication Scheme without Using Smart Cards
|
Horng, Wen-Bing; Shieh, Wen-Gong |
| 國立政治大學 |
2013.11 |
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol
|
左瑞麟; Tso, Raylin |
| 國立政治大學 |
2012 |
Security analysis concerning the random numbers of threshold ring signatures
|
Huang, Kaibin;Tso, Ray-Lin; 左瑞麟 |
| 國立政治大學 |
2011-12 |
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures
|
黃凱彬;左瑞麟 |
| 國立政治大學 |
2016-10 |
Security analysis of a NTRU-based mutual authentication scheme
|
左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio |
| 亞洲大學 |
2004-06 |
Security Analysis of a Threshold Access Control Scheme Based on Smart Cards
|
劉兆樑;Liu, Chao-Liang |
| 亞洲大學 |
2004 |
Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing
|
劉兆樑;Liu, Chao-Liang |
| 國立政治大學 |
2015-08 |
Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments
|
左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Y, H.Chin Augustin Yeh-hao Chin |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Chia-Hui Wei(Chia-Hui Wei); 黃明祥; Y, H.Chin(Augustin Yeh-hao Chin) |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Wei, Chia-Hui;Wei, Chia-Hui;黃明祥 Y, H.Chin;Chin, Augustin Yeh-hao |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Chia-Hui Wei;Chia-Hui Wei;黃明祥;Y, H. Chin;Augustin Yeh-hao Chin |
| 亞洲大學 |
2015-05 |
Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection
|
Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin) |
| 國立政治大學 |
2013.07 |
Security Analysis of Choi et al.'s Certificateless Short Signature Scheme
|
左瑞麟; Tso, Raylin |
| 南台科技大學 |
2001-11 |
Security Analysis of the Generalized Key Agreement and Password Authentication Protocol
|
葉禾田; Her-Tyan Yeh; H.M. Sun and T. Hwang |
| 國立成功大學 |
2001-11 |
Security analysis of the generalized key agreement and password authentication protocol
|
Yeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih |
| 國立交通大學 |
2014-12-08T15:17:00Z |
Security analysis of transformed-key asymmetric watermarking system
|
Chen, IT; Yeh, YS |
| 朝陽科技大學 |
2008 |
Security analysis of Zhang-Wang signature scheme without using one-way hash functions
|
楊伏夷;許明暉 |
| 國立東華大學 |
2008-04 |
Security Analysis on Authentication of Images Using Recursive Visual Cryptography
|
Yang,C.N.; Chen,T.S. |
| 朝陽科技大學 |
2009 |
Security analysis on the security enhancement for anonymous secure e-voting over computer network,
|
楊伏夷;陳皇佑 |
| 元智大學 |
2008-05 |
Security Analyst Following of Recovering Stocks
|
吳瑞萱; Hsiou-wei W. Lin |
| 元智大學 |
2008-05 |
Security Analyst Following of Recovering Stocks
|
吳瑞萱; Hsiou-wei W. Lin |
| 元智大學 |
2011-12-09 |
Security Analysts'' Incentive and Cognitive Processing Bias: Evidence from Analysts'' Recommendations
|
Ruei-Shian Wu; Hsiou-wei Lin |
| 元智大學 |
2011-12 |
Security Analysts'''' Incentive and Cognitive Processing Bias: Evidence from Analysts'''' Recommendations
|
Ruei-Shian Wu; Hsiou-wei Lin |
| 國立臺灣大學 |
2006-08 |
Security Analysts’ Competence in Value and Glamour
|
Lin, Hsiou-wei; Wu, Ray-hsuan |
| 臺大學術典藏 |
1999-08 |
Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies
|
Lin, Hsiou-Wei W; Lin, Hsiou-wei W |
| 國立臺灣大學 |
1999-08 |
Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies
|
Lin, Hsiou-wei W |
| 臺大學術典藏 |
2020-02-15T03:52:25Z |
Security analysts’ incentive and cognitive processing bias: Evidence from analysts’ recommendations
|
Wu R.-S.;Lin H.-W.W.; Wu R.-S.; Lin H.-W.W.; HSIOU-WEI W. LIN |