瀏覽 的方式: 題名

跳到: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
或是輸入前幾個字:  
顯示 3655 到 3674 筆資料,總共 15457 筆 < 上一頁   下一頁 >
題名作者日期
Secure E-Voting System with Collision-Free AIDWu, Lih-Chyau; Chen, Bae-Ling; Chen, Lih-Woei2007-01-29T08:45:28Z
Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve CryptosystemsTsaur, Woei-Jiunn Jr; Tsai, Hsin-Chieh Jr2011-01-10T02:17:29Z
Secure HIC System Based on WWWKim, Tae-Gap; Choi, Jun-Hyuk; Go, Byung-Do; Ryou, Jae-Cheoul2006-10-31T09:02:01Z
Secure Localization in Wireless Sensor NetworksFan, You-Sheng; Wang, Chueh; Hsiao, Yu-Kai2009-02-10T03:04:33Z
Secure Schemes for an On-Line Auction ServiceTsaur, Woei-Jiunn; Hu, Kao-Hsin2006-10-27T07:08:45Z
Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer WaveletWu, Xiaoyun; Huang, Jiwu; Hu, Junquan; Shi, Yun-Qing2008-11-10T03:41:03Z
Secure Server Switching System with extensibility王, 鈺勝 Jr; 王, 壘 Jr2011-03-25T00:50:48Z
Securing and Sustaining the First Goal Sustainability Development Goal on Poverty Eradication through Decent Work for Healthcare Services Labor Cooperatives Using Mondragon Business Model林瑞發11-28-19
Security Analysis and Improvement of E-voting System based on Oblivious Signatures左, 瑞麟 Jr; 陳, 淵順 Jr; 詹, 省三 Jr; 陳, 力瑋 Jr2011-03-25T00:42:54Z
Security Analysis of a Remote User Authentication Scheme Using Euclidean Plane for Multi-Server ArchitectureKu, Wei-Chi; Chang, Shen-Tien; Chiang, Min-Hung2006-10-13T01:19:44Z
Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil PairingHorng, Gwoboa; Liu, Chao-Liang; Liu, Hsin-Yu2006-10-16T05:38:51Z
Security Analysis of Two SAS-Like Password Authentication SchemesKu, Wei-Chi; Chiang, Min-Hung; Hwang, Chun-Hao2006-10-16T08:55:35Z
SECURITY ARCHITECTURE OF DCOM AND ITS INTERGRATION WITH RBACAhn, Gail-Joon; Sandhu, Ravi2006-10-20T02:55:01Z
Security Enhanced Public Key Encryption with Keyword Search丁, 培毅 Jr; 吳, 宗杉 Jr; 溫, 玎薈 Jr2011-03-25T00:50:14Z
Security Enhancement for Robust Password Authenticated Key Agreement Using Smart CardsJuang, Wen-Shenq; Chen, Sian-Teng2007-01-29T08:34:09Z
Security Handler for a HL/7 Electronic Data InterchangeChen, T.S.; Liao, B.S.; Lin, M.G.2006-10-27T07:06:25Z
Security Monitoring around a Video Surveillance Car with a Pair of Two-camera Omnidirectional Imaging DevicesYuan, Pei-Hsuan Jr; Yang, Kuo-Feng Jr; Tsai, Wen-Hsiang Jr2011-01-10T02:19:30Z
Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server EnvironmentChuang, Yun-Hsin Jr; Tseng, Yuh-Min Jr2011-03-25T00:47:14Z
Seed: an Embedded Real-Time Operating System for Network AppliancesWang, Chun-Chiao; Chang, Da-Wei; Chang, Ruei-Chuan2006-10-18T07:48:47Z
SEEKER: An Adaptive and Scalable Location Service for Mobile Ad Hoc NetworksJiang, Jehn-Ruey; Ling, Wei-Jiun2007-01-29