搜尋
新增篩選器:
使用篩選器讓結果更精確。
符合的文件:
題名 | 作者 | 日期 |
---|---|---|
Statistical Detection for Network Flooding Attacks | Chao, Chi-Shih; Chen, Yu-Sin; Liu, An-Chi | 2006-06-09T02:38:39Z |
Replay and Denial-of-Service Attacks on a New Strong-Password Authentication Scheme | Ku, Wei-Chi; Tsai, Hao-Chuan; Chen, Shuai-Min | 2006-06-08T08:32:11Z |
Forgery Attack on Improved Group Signature Scheme | Hsu, Chien-Lung | 2006-06-08T08:40:43Z |
以位元取代為基礎之數位浮水印強韌性探討 | 張世燕, 等 | 2006-06-12T06:40:45Z |
Color Image Hiding Using Neural Networks with Grey Relation Based on Interpolative Vector Quantization | Chi-Yuan Lin; Chin-Hsing Chen | 2006-06-12T07:06:25Z |
植基於群體廣播橢圓曲線系統 | Wu, Ming-Chang 等 | 2006-06-09T08:35:55Z |
適用電子商務環境之金鑰恢復與託管機制研究 | 曹偉駿; 林幸君 | 2006-06-08T09:13:43Z |
可動態更新金鑰之Mobile IP 安全註冊協定 | 黃明賢; 陳奕明 | 2006-06-12T02:19:30Z |
Combined Private and Public Watermarking in Wavelet Transform Domain | Lou, Der-Chyuan; Liu, Jiang-Lung; Chang, Ming-Chang | 2006-06-09T09:17:29Z |
Enhancement of Known IV attack for WEP-like Systems | Yang, Ching-Nung; Kuo, Chen-Chin; Cheng, Tsung-Yuan | 2006-06-08T09:08:09Z |