Skip navigation
首頁
查詢/瀏覽
資料類型
瀏覽文件透過:
日期
作者
題名
關鍵字
幫助
我的 DSpace
接受 E-mail 通知
編輯個人資料
逢甲大學校園典藏知識庫
Feng Chia University Institutional Repository
搜尋
搜尋:
整個系統
2. 期刊
ICS國際計算機會議
International Journal of Business Environment
Journal of Computers
NCS全國計算機會議
經濟與管理論叢
逢甲人文社會學報
for
目前的篩選器:
標題
作者
關鍵字
日期
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
等於
包含
ID
不等於
不包含
非 ID
標題
作者
關鍵字
日期
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
等於
包含
ID
不等於
不包含
非 ID
標題
作者
關鍵字
日期
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
等於
包含
ID
不等於
不包含
非 ID
開始新的搜尋
新增篩選器:
使用篩選器讓結果更精確。
標題
作者
關鍵字
日期
Has File(s)
???jsp.search.filter.original_bundle_filenames???
???jsp.search.filter.original_bundle_descriptions???
等於
包含
ID
不等於
不包含
非 ID
第 1 到 10 筆結果,共 22 筆。
上一頁
1
2
3
下一頁
符合的文件:
題名
作者
日期
Watermarking Damage to Risk Multimedia in Intellectual Property Systems
Ke, Hung-Jui
;
Wang, Shiuh-Jeng
;
Chiang, Wen-Ya
2009-02-09T08:32:39Z
Efficient Squaring Algorithm for Embedded RISC Processors
Su, Feng-Fu
;
Hwang, Ren-Junn
;
Huang, Loang-Shing
2009-02-10T02:20:53Z
Enhancing Location Privacy in Wireless Local Area Networks
Chuang, Po-Jen
;
Deng, Jer-Sheng
;
Lin, Chih-Shin
2009-02-10T02:29:54Z
Analysis and Improvement of Fair Certified E-Mail Delivery Protocol
Lai, Chih-Hua
;
Hwang, Ren-Junn
2009-02-10T06:21:13Z
A DK-PHBT Based Key Management Mechanism in Heterogeneous Wireless Sensor Networks
Wang, ChihHung
;
Wei, ShihYi
2009-02-10T02:40:27Z
Access Control Policy Composition for Resource Federation Networks Using Semantic Web and Resource Description Framework (RDF)
Hu, Vincent C.
;
Quirolgico, Stephen
;
Scarfone, Karen
2009-02-10T02:04:37Z
Reversible Data Hiding Based on a Sorted VQ Index Table
Yang, Cheng-Hsing
;
Lin, Yi-Cheng
;
Wu, Sheng-Chang
;
Wu, Min-Hao
2009-02-10T06:37:56Z
A Deniable Authentication Protocol with Anonymous Sender Protection
Hwang, Shin-Jia
;
Ma, Juei-Che
2009-02-10T02:28:29Z
Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable Recipient
Lin, Han-Yu
;
Wu, Tzong-Sun
2009-02-10T02:32:52Z
Performance Evaluation of Two Secure Communication Schemes on Vehicular Ad Hoc Networks
Lo, N.W.
;
Yang, Chu-Hsiang
;
Yeh, Kuo-Hui
2009-02-10T06:29:06Z
探索
作者
3
Hwang, Ren-Junn
3
Hwang, Shin-Jia
2
Wang, ChihHung
2
Wang, Chueh
1
Chai, Ming-Jhang
1
Chen, Jiun-Ming
1
Chen, Ying-Ru
1
Cheng, Jiin-Chiou
1
Chiang, Wen-Ya
1
Chin, Shan
.
下一步 >
關鍵字
2
concurrent signatures
1
Access Control
1
Access control
1
Anonymity
1
anonymous authentication,
1
AODV
1
authenticated encryption
1
authentication
1
Average Node Degree
1
bilinear pairings
.
下一步 >
提供全文
22
true