| 國立臺灣科技大學 |
2000 |
Security of the Jan-Tseng integrated schemes of user authentication and access control
|
He, W.H;Wu, T.C |
| 淡江大學 |
2005-09-01 |
Security of Tzeng–Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems
|
黃心嘉; Hwang, Shin-jia; 廖浩志; Liao, Hao-chih |
| 亞洲大學 |
2014-04 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Hsia, 黃明祥 Shu-Yin;Hsia, Shu-Yin;W.P.Yang;Yang, Wei-Pang |
| 亞洲大學 |
201404 |
Security on Improvement of Modified Authenticated Key Agreement Protocol,” INFORMATION - An International Interdisciplinary Journal, vol. 17, no. 4, pp.1173-1178.
|
Anonymous |
| 國立交通大學 |
2014-12-08T15:22:19Z |
Security optical data storage in Fourier holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |
| 國立彰化師範大學 |
2012-03 |
Security Optical Data Storage in Fourier Holograms
|
Su, Wei-Chia; Chen, Yu-Wen; Chen, Yu-Jen; Lin, Shiuan-Huei; Wang, Li-Karn |
| 亞洲大學 |
2001-08 |
Security patrolling in building corridors by multiple-camera computer vision and automatic vehicle navigation techniques
|
R. C. Liu;W. H. Tsai |
| 淡江大學 |
2008 |
Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait
|
白揚恩; Polisensky, Jan |
| 臺大學術典藏 |
2021-08-09T08:34:47Z |
Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD)–A Persuasion and Cognitive Elaboration Perspective
|
Yang X.; Wang X.; Yue W.T.; Sia C.L.; Luo X.; CHOON LING SIA |
| 中國文化大學 |
2017-07 |
Security Price Manipulation in Mergers and Acquisitions via Special Purpose Vehicles
|
吳盈德 |
| 中國文化大學 |
2021-02 |
Security Privacy and Policy for Cryptographic Based Electronic Medical Information System
|
Liu, CH (Liu, Chia-Hui); Huang, YM (Huang, Yao-Min); Chen, TL (Chen, Tzer-Long); Wu, ZY (Wu, Zhen-Yu); Chen, HY (Chen, Hsuan-Yu) |
| 亞洲大學 |
2008-05 |
Security protection of face images transmitted on networks by information hiding techniques
|
D. C. Wu, C. S. Li;W. H. Tsai |
| 亞洲大學 |
2010-01 |
Security protection of software programs by information sharing and authentication techniques using invisible ASCII control codes
|
I. S. Lee;W. H. Tsai |
| 亞洲大學 |
2008-08 |
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
|
I. S. Lee;W. H. Tsai |
| 國立成功大學 |
2020 |
Security Protection with Dynamic Assigned Address Mechanism in Industrial Control Systems
|
Liu, C.-G.;Wu, C.-J.;Liu, I.-H.;Wu, C.-C.;Li, J.-S. |
| 國立政治大學 |
2008 |
Security Relations among China, Japan and Taiwan, 1995-2008
|
羅思婷 |
| 淡江大學 |
2011 |
Security Robot Simulator
|
Hung, W.H.; Liu, Peter; 劉寅春; Kang, S.C. |
| 大葉大學 |
2004-07 |
Security Schemes for Protecting Mobile Agent Based Networks
|
Ho;Tsaur, Woei-Jiunn |
| 佛光大學 |
2009-06-10 |
Security Sector Reform and Its Practices in Taiwan
|
張中勇 |
| 佛光大學 |
2007-03-07 |
Security Sector Reform in Taiwan
|
張中勇 |
| 國立交通大學 |
2018-08-21T05:52:42Z |
Security Semantics Modeling with Progressive Distillation
|
Shen, Zong-Xian; Hsu, Chia-Wei; Shieh, Shiuhpyng Winston |
| 中國科技大學 |
2013-07-20 |
Security Software based on Windows NDIS Filter Drivers
|
Shin-Shung Chen, Tzong-Yih Kuo, Yu-Wen Chen |
| 佛光大學 |
2009-12-25 |
Security Solutions for Critical Dedicated Ethernet Services
|
黃慶圓;Cherng Yeh |
| 佛光大學 |
2009-12-25 |
Security Solutions for Critical Dedicated Ethernet Services
|
黃慶圓;Cherng Yeh |
| 臺大學術典藏 |
2018-09-10T08:46:17Z |
Security Threats in Advanced Metering Infrastructure
|
He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI |