題名 | 作者 | 日期 |
A Study on Industrial Control System Risk Assessment | Farn, Kwo-Jean; Wang, Yen-Fang; Lin, Shu-Kuo; Yang, Chung-Huang; Huang, Chien-Cheng | 2009-02-10T02:24:36Z |
Secure Localization in Wireless Sensor Networks | Fan, You-Sheng; Wang, Chueh; Hsiao, Yu-Kai | 2009-02-10T03:04:33Z |
Pseudonym-based Anonymous PKI with Short Group Signature | Lee, Sokjoon; Chung, Byung-Ho | 2009-02-10T02:24:21Z |
Practical anonymous proxy signature schemes without trusted alias issuers | Hwang, Shin-Jia; Hsu, Pi-Hung | 2009-02-09T08:38:29Z |
An Energy-Efficient En-route Filtering False Data Scheme in Wireless Sensor Networks | Wang, Chueh; Hwang, Ren-Junn; Liu, Yu-Hang | 2009-02-10T02:21:13Z |
Network Virus Propagation Model Based on Variable Propagation Rate | Jin, Cong; Deng, Qing-Hua; Liu, Jun | 2009-02-10T04:00:12Z |
A Secure Dynamic Conference Scheme with Anonymity for Mobile Communications | Hwang, Shin-Jia; Chai, Ming-Jhang | 2009-02-10T06:20:54Z |
Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Function | Hsu, Chien-Lung; Tsai, Pei-Ling; Chou, Yen-Chun | 2009-02-09T08:32:57Z |
Reputation Based Intrusion Detection System with Threshold Cryptography for Wireless Mobile Ad Hoc Networks | Wang, ChihHung; Chin, Shan | 2009-02-10T02:41:01Z |
Sharing an Image with Variable-size Shadows | Shyu, ShyongJian; Chuang, Chun-Chieh; Chen, Ying-Ru | 2009-02-10T06:28:53Z |