題名 | 作者 | 日期 |
Efficient Squaring Algorithm for Embedded RISC Processors | Su, Feng-Fu; Hwang, Ren-Junn; Huang, Loang-Shing | 2009-02-10T02:20:53Z |
Enhancing Location Privacy in Wireless Local Area Networks | Chuang, Po-Jen; Deng, Jer-Sheng; Lin, Chih-Shin | 2009-02-10T02:29:54Z |
Analysis and Improvement of Fair Certified E-Mail Delivery Protocol | Lai, Chih-Hua; Hwang, Ren-Junn | 2009-02-10T06:21:13Z |
A DK-PHBT Based Key Management Mechanism in Heterogeneous Wireless Sensor Networks | Wang, ChihHung; Wei, ShihYi | 2009-02-10T02:40:27Z |
Access Control Policy Composition for Resource Federation Networks Using Semantic Web and Resource Description Framework (RDF) | Hu, Vincent C.; Quirolgico, Stephen; Scarfone, Karen | 2009-02-10T02:04:37Z |
Reversible Data Hiding Based on a Sorted VQ Index Table | Yang, Cheng-Hsing; Lin, Yi-Cheng; Wu, Sheng-Chang; Wu, Min-Hao | 2009-02-10T06:37:56Z |
A Deniable Authentication Protocol with Anonymous Sender Protection | Hwang, Shin-Jia; Ma, Juei-Che | 2009-02-10T02:28:29Z |
Data Hiding in Image Mosaics by Visible Boundary Regions and Its Copyright Protection Application against Print-And-Scan Attacks | Lin, Wei-Liang; Tsai, Wen-Hsiang | 2006-10-13T01:21:35Z |
Using a Full Counterpropagation Neural Network for Image Watermarking | Chang, Chuan-Yu; Su, Sheng-Jyun; Wang, Hung-Jen | 2006-10-13T01:22:06Z |
Preventing Information Leakage within Object-Oriented Systems Using RBAC-Based Model | Chou, Shih-Chien; Wu, Chien-Jung | 2006-10-16T05:39:29Z |