瀏覽 的方式: 題名

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 1889 到 1908 筆資料,總共 15457 筆 < 上一頁   下一頁 >
題名作者日期
Cryptanalysis of Authenticated Key Agreement ProtocolsYeh, Her-Tyan; Sun, Hung-Min; Hwang, Tzonelih2006-10-17T03:55:56Z
Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication SchemeKuo, Wen-Chung; Chu, Yu-Shuan; Chen, Bae-Ling2011-03-31T21:48:12Z
Cryptanalysis of Li et al.’s Generalization of Proxy Signature SchemesHwang, Shin-Jia; Chan, Ching-Chung2006-06-09T08:57:43Z
Cryptanalysis of publicly verifiable authenticated encryptionHwang, Ren-Junn; Lai, Chih-Hua; Peng, Jui-Chu2006-06-12T06:52:56Z
Cryptanalysis of Short Secret Exponents Modulo RSA PrimesChen, Chen-Yuan2006-11-13T01:14:35Z
Cryptanalysis on Shim’s tripartite authenticated key agreement protocol from Weil pairingLin, Chu-Hsing; Lin, Hsiu-Hsia2006-10-16T05:38:45Z
Cryptanalysis on Traceability on RSA-Based Partially Signature with Low ComputationWu, Lin-Chuan; Yeh, Yi-Shiung; Liu, Tsann-Shyong2006-10-16T05:34:06Z
Cryptanlysis of Short Secret Exponent and Large Public Exponent of RSAChen, Chien-Yuan2006-10-31T09:01:18Z
Cryptographic Protocols for Sealed-Bid Auctions Without Trusted ServersTzeng, Wen-Guey; Yeh, Nai-Chia; Chen, Rong-Jaye2006-10-16T04:00:49Z
Crystallization Behaviors in Multinary Biodegradable Polymer Composite Comprising Green Nucleation Agent李立鼎10-27-19
CSMA/CP: 一個架構在WDM環狀網路IP封包的存取協定黃文祥; 何日新; 謝錫堃2006-10-16T03:38:04Z
CSSP:An Effective Static Content Placement Policy for Load-Balancing in Video ServerChen, Ju-Kau; Huang, Wen-Shih; Chen, Cheng; Lee, Suh-Yin2006-10-20T18:09:54Z
Currency Risk Hedging for US Stock Investment from Taiwan Perspective呂瑞秋01-05-19
Current Condition of Braille System in Accessible Elevator for Long Term Care Services:By Case of Seven Northern Counties in Taiwan曾亮03-23-19
Current Trends of Vocabulary Teaching and Learning Strategies for EFL SettingsWei-Wei Shen2012/10/17
Customer-oriented Policy for Proxy Management SystemBhattarakosol, Pattarasinee; Srisujjalertwaja, Wijak2006-10-18T07:53:26Z
Cutting Connections in Linear Connection ProofsFronhofer, Bertram2006-10-25T01:05:40Z
CyberLock行銷分析趙伊凌; 潘希和; 蔡念慈; 謝宗翰2010-04-12T19:04:55Z
Cycle Embedding on the Edge Fault Star GraphsLi, Tseng-Kuei2006-10-16T03:55:59Z
Cyclic Spring Protocol A Quorum-Based Approach For Replica ControlCho, Cheng-Hong; Lin, Shi-Hong2006-10-30T06:36:33Z