題名 | 作者 | 日期 |
Security Enhancement for Robust Password Authenticated Key Agreement Using Smart Cards | Juang, Wen-Shenq; Chen, Sian-Teng | 2007-01-29T08:34:09Z |
The Never Ending Story: A Collaborative Narrative Storylog | Chen, Jhao-Ling; Liang, Rung-Huei | 2007-01-29T07:41:08Z |
Haplotype Block Partitioning and TagSNP Selection on Human Chromosome 21 | Chen, Wen-Pei; Lin, Yaw-Ling; Lee, Tso-Ching | 2007-02-01T03:27:00Z |
A 500MHz, 8-Stage Pipeline RISC Microprocessor Design with Sub-Computing | Hu, Ya-Lun; Chang, Ming-Ku; Chen, Tien-Fu; Shiu, Fang-Yu; Cheng, You-Hsiang | 2007-01-25T06:12:32Z |
IP-Based DRM - A Fair and Privacy Preserving DRM Framework | Sun, Hung-Min; Wang, King-Hang; Kao, Yih-Sien | 2007-01-29T08:07:43Z |
Hamiltonian-Laceability in Star Graphs with Conditional Edge Faults | Tsai, Ping-Ying; Fu, Jung-Sheng; Chen, Gen-Huey | 2007-01-26T01:07:16Z |
A Model for Achieving the Goals of Requirement Development Process Area in CMMI Level3 on Workflow Applications | Wang, Ching Huey; Wang, Feng Jian | 2007-01-26T02:57:04Z |
Using Random Bit Authentication to Defend IEEE 802.11 DoS Attacks | Lee, Ying-Sung; Chien, Hsien-Te; Tsai, Wen-Nung | 2007-01-29T07:55:52Z |
On the Extension of Wiener Attack on RSA with Short Secret-Exponents | Sun, Hung-Min; Wu, Mu-En; Chen, Shiuan-Tung | 2007-01-29T08:40:54Z |
A Coverage and Connectivity Approach to Node Optimum Clustering in Wireless Sensor Networks | Wang, Ying-Hong; Yu, Chin-Yung; Huang, Shi-Yi | 2007-01-26T07:53:22Z |