顯示 3655 到 3674 筆資料,總共 15457 筆
< 上一頁
下一頁 >
題名 | 作者 | 日期 |
Secure E-Voting System with Collision-Free AID | Wu, Lih-Chyau; Chen, Bae-Ling; Chen, Lih-Woei | 2007-01-29T08:45:28Z |
Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems | Tsaur, Woei-Jiunn Jr; Tsai, Hsin-Chieh Jr | 2011-01-10T02:17:29Z |
Secure HIC System Based on WWW | Kim, Tae-Gap; Choi, Jun-Hyuk; Go, Byung-Do; Ryou, Jae-Cheoul | 2006-10-31T09:02:01Z |
Secure Localization in Wireless Sensor Networks | Fan, You-Sheng; Wang, Chueh; Hsiao, Yu-Kai | 2009-02-10T03:04:33Z |
Secure Schemes for an On-Line Auction Service | Tsaur, Woei-Jiunn; Hu, Kao-Hsin | 2006-10-27T07:08:45Z |
Secure Semi-Fragile Watermarking for Image Authentication Based on Parameterized Integer Wavelet | Wu, Xiaoyun; Huang, Jiwu; Hu, Junquan; Shi, Yun-Qing | 2008-11-10T03:41:03Z |
Secure Server Switching System with extensibility | 王, 鈺勝 Jr; 王, 壘 Jr | 2011-03-25T00:50:48Z |
Securing and Sustaining the First Goal Sustainability Development Goal on Poverty Eradication through Decent Work for Healthcare Services Labor Cooperatives Using Mondragon Business Model | 林瑞發 | 11-28-19 |
Security Analysis and Improvement of E-voting System based on Oblivious Signatures | 左, 瑞麟 Jr; 陳, 淵順 Jr; 詹, 省三 Jr; 陳, 力瑋 Jr | 2011-03-25T00:42:54Z |
Security Analysis of a Remote User Authentication Scheme Using Euclidean Plane for Multi-Server Architecture | Ku, Wei-Chi; Chang, Shen-Tien; Chiang, Min-Hung | 2006-10-13T01:19:44Z |
Security Analysis of a Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing | Horng, Gwoboa; Liu, Chao-Liang; Liu, Hsin-Yu | 2006-10-16T05:38:51Z |
Security Analysis of Two SAS-Like Password Authentication Schemes | Ku, Wei-Chi; Chiang, Min-Hung; Hwang, Chun-Hao | 2006-10-16T08:55:35Z |
SECURITY ARCHITECTURE OF DCOM AND ITS INTERGRATION WITH RBAC | Ahn, Gail-Joon; Sandhu, Ravi | 2006-10-20T02:55:01Z |
Security Enhanced Public Key Encryption with Keyword Search | 丁, 培毅 Jr; 吳, 宗杉 Jr; 溫, 玎薈 Jr | 2011-03-25T00:50:14Z |
Security Enhancement for Robust Password Authenticated Key Agreement Using Smart Cards | Juang, Wen-Shenq; Chen, Sian-Teng | 2007-01-29T08:34:09Z |
Security Handler for a HL/7 Electronic Data Interchange | Chen, T.S.; Liao, B.S.; Lin, M.G. | 2006-10-27T07:06:25Z |
Security Monitoring around a Video Surveillance Car with a Pair of Two-camera Omnidirectional Imaging Devices | Yuan, Pei-Hsuan Jr; Yang, Kuo-Feng Jr; Tsai, Wen-Hsiang Jr | 2011-01-10T02:19:30Z |
Security Weaknesses of Two Dynamic ID-based User Authentication and Key Agreement Schemes for Multi-server Environment | Chuang, Yun-Hsin Jr; Tseng, Yuh-Min Jr | 2011-03-25T00:47:14Z |
Seed: an Embedded Real-Time Operating System for Network Appliances | Wang, Chun-Chiao; Chang, Da-Wei; Chang, Ruei-Chuan | 2006-10-18T07:48:47Z |
SEEKER: An Adaptive and Scalable Location Service for Mobile Ad Hoc Networks | Jiang, Jehn-Ruey; Ling, Wei-Jiun | 2007-01-29 |