English  |  正體中文  |  简体中文  |  0  
???header.visitor??? :  52323950    ???header.onlineuser??? :  1023
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

???jsp.browse.items-by-title.jump??? [ ???jsp.browse.general.jump2chinese??? ] [ ???jsp.browse.general.jump2numbers??? ] [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
???jsp.browse.items-by-title.enter???   

Showing items 213461-213485 of 2348511  (93941 Page(s) Totally)
<< < 8534 8535 8536 8537 8538 8539 8540 8541 8542 8543 > >>
View [10|25|50] records per page

Institution Date Title Author
南台科技大學 2007-03 Attachment of Stem Cells on Porous Chitosan Scaffold Crosslinked by Na5P3O10 林鴻儒; H. R. Lin; K. S. Chen; S. C. Chen; C. H. Lee; S. H. Chiou; T. L. Chang ; T. H. Wu
淡江大學 2008 Attachment of tumor cells to the micropatterns of glutaraldehyde (GA)-crosslinked gelatin Ou, Yu-cheng; Hsu, Chih-wen; 楊龍杰; Yang, Lung-jieh; Han, Hsieh-cheng; Liu, Yi-wen; Chen, Chien-yuan
臺大學術典藏 2020-07-10T08:16:55Z Attachment security, affect regulation, and defensive responses to mood induction Posada, G.; Ridgeway, D.; KENG-LING LAY; Waters, E.; Lay, K. L.;Waters, E.;Posada, G.;Ridgeway, D.; Lay, K. L.
臺大學術典藏 2018-09-10T05:19:28Z Attachment security, affect regulation, and defensive responses to mood induction. Lay, K.L.;Waters, E.;Posada, G.;Ridgeway, D.; Lay, K.L.; Waters, E.; Posada, G.; Ridgeway, D.; KENG-LING LAY
國立臺灣大學 1995 Attachment security, affect regulation, and defensive responses to mood Induction. In E. Waters, B. E. Vaughn, G. Posada, and K. Kondo-Ikemura (Eds.), Caregiving, Cultural, and Cognitive Perspectives on Secure-Base Behavior and Working Mode Lay, K. L.; Waters, E.; Posada, G.; Ridgeway, D.
亞洲大學 2015 Attachment Styles and Meaning Reconstruction of Adults who Experienced Bereavement in Adolescence Chang, Min-Chun
臺大學術典藏 2018-09-10T08:31:06Z Attachment systems for implant overdenture: Influence of implant inclination on retentive and lateral forces Yang, T.-C. Maeda, Y. Gonda, T. Kotecha, S.; TSUNG-CHIEH YANG
臺大學術典藏 2021-07-08T00:20:49Z Attachment systems for implant overdenture: Influence of implant inclination on retentive and lateral forces TSUNG-CHIEH YANG; Maeda Y.; Gonda T.; Kotecha S.
朝陽科技大學 2009-10 Attack and Improve the Zhao-Liu Authenticated Encryption Scheme 江茂綸; Ting-Yi Chang
臺大學術典藏 2021-08-15T00:08:43Z Attack Is the Best Defense: A Multi-Mode Poisoning PUF Against Machine Learning Attacks Lin, Chia Chih; MING-SYAN CHEN
臺大學術典藏 2018-09-10T06:35:08Z Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment C. M. Yu; C. C. Li; C. S. Lu; D. T. Lee; S. Y. Kuo; SY-YEN KUO
元智大學 2012-05 Attack-Resistant Wireless Localization Using An Inclusive Disjunction Model Shih-Hau Fang; Chung-Chih Chuang; Chiapin Wang
中華大學 2009 Attacking and defending perspective of e-Crime behavior and psychology: A systemic dynamic simulation approach 邱登裕; Chiu, Deng-Yiv
中華大學 2010 Attacking and Defending Perspective of E-Crime Behavior and Psychology: A Systemic Dynamic Simulation Approach 邱登裕; Chiu, Deng-Yiv
國立臺灣大學 2004-02 Attacking Visible Watermarking Schemes Huang, Chun-Hsiang; Wu, Ja-Ling
臺大學術典藏 2018-09-10T04:49:33Z Attacking visible watermarking schemes Huang, C.-H.; Wu, J.-L.; Huang, C.-H.; Wu, J.-L.; JA-LING WU
亞洲大學 2005 Attacks and Countermeasures in Software System Security Jeffrey J. P. Tsai;L. Ma
國立成功大學 2014-02 Attacks and Improvement on "Quantum Direct Communication with Mutual Authentication" Lin, Tzu-Han; Yang, Chun-Wei; Hwang, Tzonelih
國立成功大學 2001-09 Attacks and solutions on strong-password authentication Lin, Chun-Li; Sun, Hung-Min; Hwang, Tzonelih
國立高雄師範大學 2004 Attacks on a threshold proxy signature scheme based on the RSA cryptosystem 吳明倫; Yuh-Dauh Lyuu;Ming-Luen Wu
臺大學術典藏 2004 Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Lyuu, Yuh-Dauh; Wu, Ming-Luen; Lyuu, Yuh-Dauh; Wu, Ming-Luen
臺大學術典藏 2004 Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Yuh-Dauh Lyuu; Ming-Luen Wu; Yuh-Dauh Lyuu; Ming-Luen Wu
國立臺灣大學 2004 Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Lyuu, Yuh-Dauh; Wu, Ming-Luen
國立臺灣大學 2004 Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Yuh-Dauh Lyuu; Ming-Luen Wu
亞洲大學 2007-04 Attacks on Provably Secure Proxy-protected Signature Schemes based on Factoring Wu, C. C. ; Chang, C. C.

Showing items 213461-213485 of 2348511  (93941 Page(s) Totally)
<< < 8534 8535 8536 8537 8538 8539 8540 8541 8542 8543 > >>
View [10|25|50] records per page