題名 | 作者 | 日期 |
A Robust Oblivious Watermarking Technique | Chen, Huang-Chi Jr; Chang, Yu-Wen Jr; Hwang, Rey-Chue Jr | 2011-01-10T00:04:36Z |
An Automated Vulnerability Scanner for Injection Attack Based on Injection Point | Chen, Jan-Min Jr; Wu, Chia-Lun Jr | 2011-01-10T00:06:09Z |
The research of botnet detection and prevention | Lee, Narn-Yih Jr; Chiang, Hung-Jen Jr | 2011-01-10T00:06:18Z |
Cost-Sensitive Defense Strategy Selection for Web Applications | Chen, Jan-Min Jr; Kuan, Fan-Yu Jr; Lin, Jin-Cherng Jr | 2011-01-10T00:06:27Z |
ID-Based Online/Offline Signature From Pairings | Wu, Tzong-Sun Jr; Chen, Yih-Sen Jr; Lin, Kong-Yi Jr | 2011-01-10T02:16:58Z |
Secure Electronic Business Applications in Mobile Agent Based Networks Using Elliptic Curve Cryptosystems | Tsaur, Woei-Jiunn Jr; Tsai, Hsin-Chieh Jr | 2011-01-10T02:17:29Z |
Adaptive Weighting Color Palette Image | Kuo, Wen-Chung Jr; Syu, Wei-De Jr; Cheng, Jiin-Chiou Jr | 2011-01-10T00:04:57Z |
A robust watermarking scheme based on singular value decomposition and quantization technique | Wu, Hsien-Chu Jr; Jang, Ruen-Jie Jr; Liu, Yu-Chi Jr | 2011-01-10T00:04:27Z |
The Design of the En-route Filtering Mechanism with Immediately Lightweight Authentication for Wireless Sensor Networks | Chih-Hung Wang, Tzu-Chieh Wei | 2011-01-19T04:16:29Z |
CDS: Concealed Data Sorting Scheme in Wireless Sensor Networks | Lin, Yue-Hsun; He, Bing-Zhe; Sun, Hung-Min; Chen, Yen-Hsueh | 2011-01-19T04:16:49Z |