題名 | 作者 | 日期 |
Mutually Identity Authentications in GSM-based Anonymous Communications | Wang, Shiuh-Jeng; Tsai, Yuh-Ren; Chou, Lei-Sheng; Lin, I-Shan | 2008-11-11T07:38:18Z |
An Architecture for Multi-Agent COTS Software Integration Systems | Fang, Guo-Ming; Lin, Jim-Min; Hong, Zeng-Wei; Chin, Kai-Yi | 2008-11-10T08:42:03Z |
Design and Implementation of a Secure Instant Messaging Service based on Elliptic-Curve Cryptography | Yang, Chung-Huang; Kuo, Tzong-Yih; Ahn, TaeNam; Lee, Chia-Pei | 2008-11-11T09:05:05Z |
A Multi-Key Encryption Scheme for the Next Generation Wireless Network | Hung, Chia-Chen; Chen, Yi-Cyuan; Gau, Ruei-Liang; Wu, Cheng-Lin; Wu, Eric Hsiaokuang | 2008-11-12T06:46:47Z |
Visualizing Phylogenetic Trees by Spring-Embedder Models | Lin, Yaw-Ling; Yu, Po-Shun | 2008-11-11T08:03:06Z |
Single Nucleotide Polymorphism Mapping Using Multi-Layer Unique Markers | Hsu, Fang Rong; Shia, Wei-Chung | 2008-11-11T08:23:18Z |
Finding Homologous Sequences in Genomic Databases | Lee, Hsiao Ping; Sheu, Tzu Fang; Tsai, Yin Te; Tang, Chuan Yi | 2008-11-11T08:41:00Z |
Detecting Denial of Service Attacks in Sensor Networks | Lai, Gu Hsin; Chen, Chia-Mei | 2008-11-11T09:00:44Z |
Design and Implementation of Service Discovery Architecture | Yang, Feng-Chao; Chang, Chia-Hao; Chang, Cheng-Li | 2008-11-11T06:55:47Z |
Application Behavior Analysis by Stateful Automata Mechanism | Huang, Nen-Fu; Feng, Yi-Hsuan | 2008-11-11T08:57:23Z |