題名 | 作者 | 日期 |
Detection of Reversible Data Hiding Scheme Based on Histogram Feature Codes | Lou, Der-Chyuan; Hu, Chen-Hao; Chiu, Chung-Cheng; Chang, Te-Jen | 2011-03-31T21:48:33Z |
Cryptanalysis of Hsiang-Shih’s Secure Dynamic ID Based Remote User Authentication Scheme | Kuo, Wen-Chung; Chu, Yu-Shuan; Chen, Bae-Ling | 2011-03-31T21:48:12Z |
多關鍵字可搜尋對稱式加密法之改善 | 陳昱圻; 陳國璋; 何宗翰; 洪國寶 | 2011-03-31T21:48:39Z |
SSL VPN 伺服器OpenVPN 的安全設定考量 | 沈慧宇; 黃文傑; 莊展源 | 2011-03-31T21:48:06Z |
將iStore觀念溶入網路空間之設計 | 金明浩; 張勝欽; 陳建宏; 白敏賢 | 2011-03-31T21:48:25Z |
Sharing Secret Image Based on Bit Plane | Tso, Hao-Kuan; Lou, Der-Chyuan; Wu, Chia-Long | 2011-03-31T21:48:46Z |
2-party 及 3-party 匿名式認證金鑰 | 廖文立; 簡宏宇 | 2011-03-31T21:48:19Z |
Design of an RFID-based Retail Inventory Management System using an improved Trusted Reader Protocol | 陳, 育毅 Jr; 詹, 進科 Jr; 顧, 純菁 Jr | 2011-03-24T23:40:39Z |
A Secure Inter-Domain Handover Authentication Scheme for Wireless Network | Hwang, Ren Junn Jr; Shiau, Sheng Hua Jr; Chen, Kuan Yu Jr | 2011-03-24T23:38:35Z |
PC及PDA操作平台之即時通訊之證據關聯分析研究 | 高, 大宇 Jr; 劉, 心玫 Jr; 王, 旭正 Jr | 2011-03-25T00:45:03Z |