English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4200048      Online Users : 872
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    THUIR >  Browse by Title

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 5626-5650 of 27924. (1117 Page(s) Totally)
    << < 221 222 223 224 225 226 227 228 229 230 > >>
    View [10|25|50] records per page
    DateTitleAuthors
    2006-12-04 A Secure and Efficient Model for Network Defensive Systems 林祝興; Chu-Hsing Lin, Fuu-Cheng Jiang, Yen-Lin Huang, and Chih-Hsiung Huang
    2012-03-26 Secure authentication scheme for supporting healthcare in wireless sensor networks Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B
    2012 A secure authentication scheme for telecare medicine information systems Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., Chung, Y.
    2013 A Secure Authentication System for Controlling Traffic Lights for Ambulances Yi-Li Huang(黃宜豊), I-Long Lin, Fang-YieLeu(呂芳懌), Jung-Chun Liu(劉榮春),Fuu-Cheng Jiang(江輔政), William Cheng-Chung Chu(朱正忠), Chao-Tung Yang(楊朝棟), Miao-Heng Chen
    2013-10-22 Secure authorization for controlling access via key management scheme Hsiao, T.-C.; Chen, T.-L.; Chen, C.-S.; Xu, F.-S.; Tsui, S.; Chung, Y.-F.; Chen, T.-S.
    1994-07-00 Secure Communication for Users in Specified Access Instances 林祝興
    2012-07-04 A secure communication over wireless environments by using a data connection core Wei, K.-C., Huang, Y.-L., Leu, F.-Y.
    2012-07-04 A secure communication over wireless environments by using a data connection core Wei, K.-C., Huang, Y.-L., Leu, F.-Y.
    2013 A secure communication over wireless environments by using a data connection core? Huang, Y.-L., Leu, F.-Y., Wei, K.-C.
    2011 A secure conference key protocol over ecc-based grey systems Chen, T.-L., Chung, Y.-F., Lin, F.Y.S.
    2012-08-20 A secure data encryption method by employing a feedback encryption mechanism and three-dimensional operation?? Huang, Y.-L., Leu, F.-Y., Dai, C.-R.
    2012 Secure dynamic access control scheme of PHR in cloud computing Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
    2011 A Secure Integrated Medical Information System Hsiao, T.-C., Wu, Z.-Y., Chung, Y.-F., Chen, T.-S., Horng, G.-B.
    2011 A Secure Integrated Medical Information System Hsiao, T.-C.a, Wu, Z.-Y.b, Chung, Y.-F.c, Chen, T.-S.d , Horng, G.-B.
    2005-03-25 Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing 林祝興; Chu-Hsing Lin , and Hsiu-Hsia Lin
    2005-03-28 Secure one-round tripartite authenticated key agreement protocol from weil pairing?? Lin, C.-H., Lin, H.-H.
    2013-10-01 Secure PHR access control scheme for healthcare application clouds Liu, C.-H.; Lin, F.-Q.; Chiang, D.-L.; Chen, T.-L.; Chen, C.-S.; Lin, H.-Y.; Chung, Y.-F.; Chen, T.-S.
    2006-12-04 A Secure Protocol for Mobile IP Using Smartcards 林祝興; Chu-Hsing Lin, Chien-Liang Tsai, and Chen-Yu Lee
    2008-03-25 Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks 林祝興; Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Jean Chou
    2008-03-25 Secure routing protocol with malicious nodes detection for ad hoc networks?? Lin, C.-H., Lai, W.-S., Huang, Y.-L., Chou, M.-C.
    2003-12-14 A Secure Scheme for Users Classification and Contents Protection in Video-on-demand Systems 林祝興; Chu-Hsing Lin, J. S. Chou, T. Y. Lee
    2010 A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents 陳澤雄; Huang, J.Y., Chung, Y.F., Chen, T.S., and Liao, I.E
    2010 A secure time-bound hierarchical key management scheme based on ECC for mobile agents Huang, J.-Y.a , Chung, Y.-F.b , Chen, T.-S.c , Liao, I.-E.
    2013-10-28 A secure wireless communication system integrating PRNG and Diffie-Hellman PKDS by using a data connection core Huang, Y.-L.; Leu, F.-Y.; Liu, J.-C.; Lo, L.-J.; Chu, W.C.-C.
    2011-07 Seed distribution of eleven tree species in a tropical forest in Taiwan. Lin, Y.-C. , Lin,P.-J, Wang, H.-H. and Sun, I.-F..; 孫義方、林宜靜
    Showing items 5626-5650 of 27924. (1117 Page(s) Totally)
    << < 221 222 223 224 225 226 227 228 229 230 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback