English  |  正體中文  |  简体中文  |  Total items :2856565  
Visitors :  53420912    Online Users :  663
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

Jump to: [ Chinese Items ] [ 0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
or enter the first few letters:   

Showing items 748201-748225 of 2348973  (93959 Page(s) Totally)
<< < 29924 29925 29926 29927 29928 29929 29930 29931 29932 29933 > >>
View [10|25|50] records per page

Institution Date Title Author
國立政治大學 2015-08 Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments 左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Y, H.Chin Augustin Yeh-hao Chin
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Chia-Hui Wei(Chia-Hui Wei); 黃明祥; Y, H.Chin(Augustin Yeh-hao Chin)
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Wei, Chia-Hui;Wei, Chia-Hui;黃明祥 Y, H.Chin;Chin, Augustin Yeh-hao
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Chia-Hui Wei;Chia-Hui Wei;黃明祥;Y, H. Chin;Augustin Yeh-hao Chin
亞洲大學 2015-05 Security Analysis of an Enhanced Mobile Agent Device for RFID Privacy Protection Wei), Chia-Hui Wei(Chia-Hui;黃明祥;Y, H. Chin(Augustin Yeh-hao Chin)
國立政治大學 2013.07 Security Analysis of Choi et al.'s Certificateless Short Signature Scheme 左瑞麟; Tso, Raylin
南台科技大學 2001-11 Security Analysis of the Generalized Key Agreement and Password Authentication Protocol 葉禾田; Her-Tyan Yeh; H.M. Sun and T. Hwang
國立成功大學 2001-11 Security analysis of the generalized key agreement and password authentication protocol Yeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih
國立交通大學 2014-12-08T15:17:00Z Security analysis of transformed-key asymmetric watermarking system Chen, IT; Yeh, YS
朝陽科技大學 2008 Security analysis of Zhang-Wang signature scheme without using one-way hash functions 楊伏夷;許明暉
國立東華大學 2008-04 Security Analysis on Authentication of Images Using Recursive Visual Cryptography Yang,C.N.; Chen,T.S.
朝陽科技大學 2009 Security analysis on the security enhancement for anonymous secure e-voting over computer network, 楊伏夷;陳皇佑
元智大學 2008-05 Security Analyst Following of Recovering Stocks 吳瑞萱; Hsiou-wei W. Lin
元智大學 2008-05 Security Analyst Following of Recovering Stocks 吳瑞萱; Hsiou-wei W. Lin
元智大學 2011-12-09 Security Analysts'' Incentive and Cognitive Processing Bias: Evidence from Analysts'' Recommendations Ruei-Shian Wu; Hsiou-wei Lin
元智大學 2011-12 Security Analysts'''' Incentive and Cognitive Processing Bias: Evidence from Analysts'''' Recommendations Ruei-Shian Wu; Hsiou-wei Lin
國立臺灣大學 2006-08 Security Analysts’ Competence in Value and Glamour Lin, Hsiou-wei; Wu, Ray-hsuan
臺大學術典藏 1999-08 Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies Lin, Hsiou-Wei W; Lin, Hsiou-wei W
國立臺灣大學 1999-08 Security Analysts’ Earnings Forecasts and Recommendations for Regulated Companies Lin, Hsiou-wei W
元智大學 Dec-14 Security analysts’ incentive and cognitive processing bias: evidence from analysts’ recommendations Ruei-Shian Wu; H.W. Lin
臺大學術典藏 2020-02-15T03:52:25Z Security analysts’ incentive and cognitive processing bias: Evidence from analysts’ recommendations Wu R.-S.;Lin H.-W.W.; Wu R.-S.; Lin H.-W.W.; HSIOU-WEI W. LIN
國立臺灣大學 1998-04 Security and Auditing in VPN and its Trends Lei, C. L.
亞洲大學 2015/05 Security and Communication Networks 李正吉; Lee, Cheng-Chi
亞洲大學 2018-01 Security and Efficiency Enhancement of Robust ID based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks 李正吉;Lee, Cheng-Chi

Showing items 748201-748225 of 2348973  (93959 Page(s) Totally)
<< < 29924 29925 29926 29927 29928 29929 29930 29931 29932 29933 > >>
View [10|25|50] records per page