English |
正體中文
|
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4200048 Online Users : 872
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of THUIR
International College
Tunghai University
College of Arts
College of Science
College of Engineering
College of Management
College of Social Sciences
College of Agriculture
College of Fine Arts and Creative Design
College of Law
The Administrative Unit
Outstanding Academic Papers by Students
Global Research & Education on Environment and Society
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
Browse all
Communities
& Collections
Title
Date
Authors
Relevant Link
東海大學首頁 THU
東海圖書館 THULIB
東海碩博士論文建檔
東海碩博士論文查詢
臺灣學術機構典藏系統
機構典藏計畫網站
解壓縮軟體
Adobe Reader
THUIR
>
Browse by Title
Loading...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 5626-5650 of 27924. (1117 Page(s) Totally)
<<
<
221
222
223
224
225
226
227
228
229
230
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2006-12-04
A Secure and Efficient Model for Network Defensive Systems
林祝興
;
Chu-Hsing Lin, Fuu-Cheng Jiang, Yen-Lin Huang, and Chih-Hsiung Huang
2012-03-26
Secure authentication scheme for supporting healthcare in wireless sensor networks
Hsiao, T.-C.a , Liao, Y.-T.b, Huang, J.-Y.c, Chen, T.-S.c, Horng, G.-B
2012
A secure authentication scheme for telecare medicine information systems
Wu, Z.-Y., Lee, Y.-C., Lai, F., Lee, H.-C., Chung, Y.
2013
A Secure Authentication System for Controlling Traffic Lights for Ambulances
Yi-Li Huang(黃宜豊), I-Long Lin, Fang-YieLeu(呂芳懌), Jung-Chun Liu(劉榮春),Fuu-Cheng Jiang(江輔政), William Cheng-Chung Chu(朱正忠), Chao-Tung Yang(楊朝棟), Miao-Heng Chen
2013-10-22
Secure authorization for controlling access via key management scheme
Hsiao, T.-C.
;
Chen, T.-L.
;
Chen, C.-S.
;
Xu, F.-S.
;
Tsui, S.
;
Chung, Y.-F.
;
Chen, T.-S.
1994-07-00
Secure Communication for Users in Specified Access Instances
林祝興
2012-07-04
A secure communication over wireless environments by using a data connection core
Wei, K.-C., Huang, Y.-L., Leu, F.-Y.
2012-07-04
A secure communication over wireless environments by using a data connection core
Wei, K.-C., Huang, Y.-L., Leu, F.-Y.
2013
A secure communication over wireless environments by using a data connection core?
Huang, Y.-L., Leu, F.-Y., Wei, K.-C.
2011
A secure conference key protocol over ecc-based grey systems
Chen, T.-L., Chung, Y.-F., Lin, F.Y.S.
2012-08-20
A secure data encryption method by employing a feedback encryption mechanism and three-dimensional operation??
Huang, Y.-L., Leu, F.-Y., Dai, C.-R.
2012
Secure dynamic access control scheme of PHR in cloud computing
Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
2011
A Secure Integrated Medical Information System
Hsiao, T.-C., Wu, Z.-Y., Chung, Y.-F., Chen, T.-S., Horng, G.-B.
2011
A Secure Integrated Medical Information System
Hsiao, T.-C.a, Wu, Z.-Y.b, Chung, Y.-F.c, Chen, T.-S.d , Horng, G.-B.
2005-03-25
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing
林祝興
;
Chu-Hsing Lin , and Hsiu-Hsia Lin
2005-03-28
Secure one-round tripartite authenticated key agreement protocol from weil pairing??
Lin, C.-H., Lin, H.-H.
2013-10-01
Secure PHR access control scheme for healthcare application clouds
Liu, C.-H.
;
Lin, F.-Q.
;
Chiang, D.-L.
;
Chen, T.-L.
;
Chen, C.-S.
;
Lin, H.-Y.
;
Chung, Y.-F.
;
Chen, T.-S.
2006-12-04
A Secure Protocol for Mobile IP Using Smartcards
林祝興
;
Chu-Hsing Lin, Chien-Liang Tsai, and Chen-Yu Lee
2008-03-25
Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks
林祝興
;
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Jean Chou
2008-03-25
Secure routing protocol with malicious nodes detection for ad hoc networks??
Lin, C.-H., Lai, W.-S., Huang, Y.-L., Chou, M.-C.
2003-12-14
A Secure Scheme for Users Classification and Contents Protection in Video-on-demand Systems
林祝興
;
Chu-Hsing Lin, J. S. Chou, T. Y. Lee
2010
A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents
陳澤雄
;
Huang, J.Y., Chung, Y.F., Chen, T.S., and Liao, I.E
2010
A secure time-bound hierarchical key management scheme based on ECC for mobile agents
Huang, J.-Y.a , Chung, Y.-F.b , Chen, T.-S.c , Liao, I.-E.
2013-10-28
A secure wireless communication system integrating PRNG and Diffie-Hellman PKDS by using a data connection core
Huang, Y.-L.
;
Leu, F.-Y.
;
Liu, J.-C.
;
Lo, L.-J.
;
Chu, W.C.-C.
2011-07
Seed distribution of eleven tree species in a tropical forest in Taiwan.
Lin, Y.-C. , Lin,P.-J, Wang, H.-H. and Sun, I.-F..
;
孫義方、林宜靜
Showing items 5626-5650 of 27924. (1117 Page(s) Totally)
<<
<
221
222
223
224
225
226
227
228
229
230
>
>>
View [
10
|
25
|
50
] records per page
本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback