English  |  正體中文  |  简体中文  |  总笔数 :0  
造访人次 :  53339990    在线人数 :  618
教育部委托研究计画      计画执行:国立台湾大学图书馆
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
关于TAIR

浏览

消息

著作权

相关连结

跳至: [ 中文 ] [ 数字0-9 ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
请输入前几个字:   

显示项目 633391-633440 / 2348964 (共46980页)
<< < 12663 12664 12665 12666 12667 12668 12669 12670 12671 12672 > >>
每页显示[10|25|50]项目

机构 日期 题名 作者
臺大學術典藏 2020-05-04T08:07:24Z On the Satisfiability of Two-Variable Logic over Data Words. David, Claire;Libkin, Leonid;Tan, Tony; David, Claire; Libkin, Leonid; Tan, Tony; TONY TAN
臺大學術典藏 2022-05-24T06:12:24Z On the scale effect of thrust deduction in a judicious self-propulsion procedure for a moderate-speed containership Lin T.-Y.;Kouh J.-S.; Lin T.-Y.; Kouh J.-S.; TSUNG-YUEH LIN
淡江大學 1977 On the scaling factor in the renormalization group 潘朝闊; 石育民; 周東川; 李文雄; 自然科學研究小組; Rinse Research Group
臺大學術典藏 2019-12-20T01:18:36Z On the scattering of magnon boundstates Chen, H.-Y.;Dorey, N.;Okamura, K.; Chen, H.-Y.; Dorey, N.; Okamura, K.; HENG-YU CHEN
國立成功大學 2020-02-15 On the Schmid's Law for the electric current-induced deformation: An in situ EBSD study 林士剛; LIN, SHIH-KANG;Liu, Yu-chen;Chiu, Shang-Jui
國立成功大學 2020-02-15 On the Schmid's Law for the electric current-induced deformation: An in situ EBSD study Liu;Yu-chen;Lin;Shih-kang;Chiu;Shang-Jui
國立臺灣大學 1999 On the Search for H5O2(superscript +)-centered Water Clusters in the Gas Phase 張煥正; 江志強; 張海舟; 王亦生; 林聖賢; 李遠哲
臺大學術典藏 2018-09-10T06:02:47Z On the Search of Internet Topology Invariants Lung-De Shyu; Seng-Yong Lau; Polly Huang; POLLY HUANG
國立政治大學 1996 On the Search of Mobile Agents 冷俊武;連耀南
國立政治大學 1996-10 On the Search of Mobile Agents, Indoor and Mobile Radio Communications 連耀南
國立臺灣大學 1992-09 On the Seasonal Variation of the Kuroshio Intrusion onto the East China Sea 陳慶生; 王冑; Chern, Ching-Sheng; Wang, Joe
臺大學術典藏 2018-09-10T06:21:01Z On the second eigenfunctions of the Laplacian in R2 Lin, C.-S.; Lin, C.-S.; CHANG-SHOU LIN
淡江大學 2004-01 On the second eigenvalue of the laplace operator on a spherical band 謝忠村; Shieh, Chung-tsun
臺大學術典藏 2020-01-06T03:05:59Z On the second-order moment turbulence model for simulating a bubble column Zhou, L.X.; Yang, M.; Lian, C.Y.; Fan, L.S.; Lee, D.J.; DUU-JONG LEE
元智大學 2009-12 On the Second-Order Statistics of a Dual-Hop Weibull Fading Channel 趙燿庚; 黃勇達(Karl Y. -T. Huang)
元智大學 2009-12 On the Second-Order Statistics of a Dual-Hop Weibull Fading Channel 趙燿庚; 黃勇達(Karl Y. -T. Huang)
元智大學 2012-07 On the Second-Order Statistics of Correlated Cascaded Rayleigh Fading Channels Yawgeng Chau; KarlY.-T. Huang
臺大學術典藏 2008-10-28T05:50:33Z On the Secondary Resonance of a Spinning Disk under Space-Fixed Excitations Sun, Chia-Min; Hua, Chin-Yi; Chen, Jen-San; Chen, Jen-San; Hua, Chin-Yi; Sun, Chia-Min
國立臺灣大學 2004 On the Secondary Resonance of a Spinning Disk under Space-Fixed Excitations Chen, Jen-San; Hua, Chin-Yi; Sun, Chia-Min
東海大學 1997-06 On the Secrecy of Image Transmission in Computer Network 林祝興; Chu-Hsing Lin, C. Y. Dai and T. S. Wu
國立臺灣大學 2012 On The Secrecy Rate Region of a Fading Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages and Partial CSIT Lin, Pin-Hsun; Su, Chien-Li; Su, Hsuan-Jung
國立成功大學 2005-01 On the security enhancement for anonymous secure e-voting over computer network Hwang, Sheng-Yu; Wen, Hsiang-An; Hwang, Tzonelih
國立彰化師範大學 2001 On the Security Methods for Protecting Password Transmission Tseng, Yuh-Min; JAN, Jinn-Ke; CHIEN, Hung-Yu
國立交通大學 2014-12-08T15:36:40Z On the security of a certified e-mail scheme with temporal authentication Shao, MH; Zhou, JY; Wang, GL
亞洲大學 2009-01 On the Security of A Copyright Protection Scheme Based on Visual Cryptography Chen, T. H.;Chang, C. C.;Wu, C. S.;Lou, D. C.
國立臺灣海洋大學 2013 On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems Han-Yu Lin
南台科技大學 2003 On the Security of A Publicly Verifiable Authenticated Encryption 楊政達; Cheng-Ta Yang; Hung-Min Sun
國立政治大學 2015-03 On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks 左瑞麟; Chen, Chien-Ming;Wu, Tsu-Yang;左瑞麟;Mambo, Masahiro;Wu, Mu-En
國立成功大學 2002-01 On the security of a variation of Cramer-Shoup's public key scheme Sun, Hung-Min
國立彰化師範大學 2008 On the Security of an Efficient ID-based Partially Blind Signature Scheme Tseng, Yuh-Min; Wu, T. Y. ; Wu, J. D.
國立彰化師範大學 2004-08 On the Security of an Efficient Two-pass Key Agreement Protocol Tseng, Yuh-Min
亞洲大學 2004-03 On the Security of an Enhanced Authentication Key Exchange Protocol 黃明祥;Hwang, Min-Shiang
亞洲大學 2004.03 On the Security of an Enhanced Authentication Key Exchange Protocol 黃明祥;Hwang, Min-Shiang
亞洲大學 2011-04 On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol 黃明祥;Hwang, Min-Shiang
國立成功大學 2011-04 On the security of an enhanced UMTS authentication and key agreement protocol Hwang, Min-Shiang; Chong, Song-Kong; Ou, Hsia-Hung
東海大學 2003-06-28 On the Security of Authenticated Key Agreement Protocols 林祝興; Chu-Hsing Lin and T. K. Liu
南台科技大學 1993 On the security of Blundo-Santis Herzberg-Kutten-Vaccaro-Yung perfectly-secure key distribtion for dynamic coferences 李南逸; T. Hwang; N.Y. Lee; M.Y. Ko; C.M. Li; Y.H. Chen
南台科技大學 1996 On the security of Chang and Wu`s broadcasting cryptosystem for computer networks 李南逸; T. Hwang; N.Y. Lee; C.M. Li; C.C. Chang
南台科技大學 1996-12 On the security of Chang et al. ‘s cryptographic key assignment scheme for access control in a hierarchy 李南逸; T. Hwang; N.Y. Lee; C.C. Chang
南台科技大學 1999-01 On the security of fair blind signature scheme using oblivious transfer 李南逸; N.Y. Lee; T. Hwang
國立彰化師範大學 2001 On the Security of Generalization of Threshold Signature and Authenticated Encryption Tseng, Yuh-Min; JAN, J. K. ; CHIEN, H. Y .
東海大學 2005-06-27 On the security of ID-based Password Authentication Scheme using Smart Cards and Fingerprints 林祝興; Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin and Yi-Yi Lai
東海大學 2005-06-27 On the security of ID-based password authentication scheme using smart cards and fingerprints?? Lin, C.-H., Lin, T.-S., Lin, H.-H., Lai, Y.-Y.
國立彰化師範大學 1996-12 On the Security of Image Encryption Method Jan, Jinn-Ke; Tseng, Yuh-Min
臺大學術典藏 2020-05-04T07:56:16Z On the Security of Intra-Car Wireless Sensor Networks. HSIN-MU TSAI; Tonguz, Ozan K.; Lee, Hayan;Tsai, Hsin-Mu;Tonguz, Ozan K.; Lee, Hayan; Tsai, Hsin-Mu
朝陽科技大學 2003 On the security of mutual authentication and key exchange for low power wireless communications 楊伏夷;陳榮靜
南台科技大學 1997-10 On the security of Park et al’s key distribution protocol for digital mobile communications 李南逸; N.Y. Lee; T. Hwang
亞洲大學 2007-05 On the Security of Sehkar's Signature Schemes ;Lee, Cheng-Chi;Ku, Wei-Han;黃秀園;Huang, Shiow-Yuan
亞洲大學 2011-04 On The Security Of Self-Certified Public Keys 黃明祥;Hwang, Min-Shiang
國立成功大學 2012-06 On the security of several Gen2-based protocols without modifying the standards Lee, Chin-Feng; Chien, Hung-Yu; Laih, Chi-Sung; Chen, Chi-Sheng

显示项目 633391-633440 / 2348964 (共46980页)
<< < 12663 12664 12665 12666 12667 12668 12669 12670 12671 12672 > >>
每页显示[10|25|50]项目