搜尋
新增篩選器:
使用篩選器讓結果更精確。
符合的文件:
題名 | 作者 | 日期 |
---|---|---|
Reputation Based Intrusion Detection System with Threshold Cryptography for Wireless Mobile Ad Hoc Networks | Wang, ChihHung; Chin, Shan | 2009-02-10T02:41:01Z |
Sharing an Image with Variable-size Shadows | Shyu, ShyongJian; Chuang, Chun-Chieh; Chen, Ying-Ru | 2009-02-10T06:28:53Z |
An Access Control Model for Workflows Offering Dynamic Features and Interoperability Ability | Chou, Shih-Chien; Wu, Chien-Jung | 2006-10-16T05:39:46Z |
Comments on A Remote User Authentication Scheme Using Smart Cards with Forward Secrecy | Chen, Yi-Hwa; Jan, Jinn-Ke | 2006-10-16T05:38:28Z |
Network Security Management with SecurityPolicies | Sivasubramanian, Vinoth | 2009-02-10T06:38:10Z |
A Veriable Secure Metering Scheme with Shadow-Self-Refreshing | Cheng, Jiin-Chiou; Chen, Jiun-Ming; Laih, Chi-Sung | 2009-02-10T03:59:57Z |
Cryptanalysis of an anonymous user identification and key distribution scheme | Yang, Fuw-Yi | 2006-10-16T05:38:21Z |
以安全性考量的空間域浮水印策略 | 楊政興; 謝祥志; 翁麒耀 | 2006-10-16T09:38:04Z |
探索
關鍵字