| 元智大學 |
2009-12 |
On the Second-Order Statistics of a Dual-Hop Weibull Fading Channel
|
趙燿庚; 黃勇達(Karl Y. -T. Huang) |
| 元智大學 |
2009-12 |
On the Second-Order Statistics of a Dual-Hop Weibull Fading Channel
|
趙燿庚; 黃勇達(Karl Y. -T. Huang) |
| 元智大學 |
2012-07 |
On the Second-Order Statistics of Correlated Cascaded Rayleigh Fading Channels
|
Yawgeng Chau; KarlY.-T. Huang |
| 臺大學術典藏 |
2008-10-28T05:50:33Z |
On the Secondary Resonance of a Spinning Disk under Space-Fixed Excitations
|
Sun, Chia-Min; Hua, Chin-Yi; Chen, Jen-San; Chen, Jen-San; Hua, Chin-Yi; Sun, Chia-Min |
| 國立臺灣大學 |
2004 |
On the Secondary Resonance of a Spinning Disk under Space-Fixed Excitations
|
Chen, Jen-San; Hua, Chin-Yi; Sun, Chia-Min |
| 東海大學 |
1997-06 |
On the Secrecy of Image Transmission in Computer Network
|
林祝興; Chu-Hsing Lin, C. Y. Dai and T. S. Wu |
| 國立臺灣大學 |
2012 |
On The Secrecy Rate Region of a Fading Multiple-Antenna Gaussian Broadcast Channel with Confidential Messages and Partial CSIT
|
Lin, Pin-Hsun; Su, Chien-Li; Su, Hsuan-Jung |
| 國立成功大學 |
2005-01 |
On the security enhancement for anonymous secure e-voting over computer network
|
Hwang, Sheng-Yu; Wen, Hsiang-An; Hwang, Tzonelih |
| 國立彰化師範大學 |
2001 |
On the Security Methods for Protecting Password Transmission
|
Tseng, Yuh-Min; JAN, Jinn-Ke; CHIEN, Hung-Yu |
| 國立交通大學 |
2014-12-08T15:36:40Z |
On the security of a certified e-mail scheme with temporal authentication
|
Shao, MH; Zhou, JY; Wang, GL |
| 亞洲大學 |
2009-01 |
On the Security of A Copyright Protection Scheme Based on Visual Cryptography
|
Chen, T. H.;Chang, C. C.;Wu, C. S.;Lou, D. C. |
| 國立臺灣海洋大學 |
2013 |
On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems
|
Han-Yu Lin |
| 南台科技大學 |
2003 |
On the Security of A Publicly Verifiable Authenticated Encryption
|
楊政達; Cheng-Ta Yang; Hung-Min Sun |
| 國立政治大學 |
2015-03 |
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
|
左瑞麟; Chen, Chien-Ming;Wu, Tsu-Yang;左瑞麟;Mambo, Masahiro;Wu, Mu-En |
| 國立成功大學 |
2002-01 |
On the security of a variation of Cramer-Shoup's public key scheme
|
Sun, Hung-Min |
| 國立彰化師範大學 |
2008 |
On the Security of an Efficient ID-based Partially Blind Signature Scheme
|
Tseng, Yuh-Min; Wu, T. Y. ; Wu, J. D. |
| 國立彰化師範大學 |
2004-08 |
On the Security of an Efficient Two-pass Key Agreement Protocol
|
Tseng, Yuh-Min |
| 亞洲大學 |
2004-03 |
On the Security of an Enhanced Authentication Key Exchange Protocol
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2004.03 |
On the Security of an Enhanced Authentication Key Exchange Protocol
|
黃明祥;Hwang, Min-Shiang |
| 亞洲大學 |
2011-04 |
On the Security of an Enhanced UMTS Authentication and Key Agreement Protocol
|
黃明祥;Hwang, Min-Shiang |
| 國立成功大學 |
2011-04 |
On the security of an enhanced UMTS authentication and key agreement protocol
|
Hwang, Min-Shiang; Chong, Song-Kong; Ou, Hsia-Hung |
| 東海大學 |
2003-06-28 |
On the Security of Authenticated Key Agreement Protocols
|
林祝興; Chu-Hsing Lin and T. K. Liu |
| 南台科技大學 |
1993 |
On the security of Blundo-Santis Herzberg-Kutten-Vaccaro-Yung perfectly-secure key distribtion for dynamic coferences
|
李南逸; T. Hwang; N.Y. Lee; M.Y. Ko; C.M. Li; Y.H. Chen |
| 南台科技大學 |
1996 |
On the security of Chang and Wu`s broadcasting cryptosystem for computer networks
|
李南逸; T. Hwang; N.Y. Lee; C.M. Li; C.C. Chang |
| 南台科技大學 |
1996-12 |
On the security of Chang et al. ‘s cryptographic key assignment scheme for access control in a hierarchy
|
李南逸; T. Hwang; N.Y. Lee; C.C. Chang |