English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4231528      Online Users : 639
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    碩士論文 [101/101]
    專書 [0/1]
    國科會研究報告 [14/30]
    會議論文 [67/121]

    Collection Statistics

    近3年內發表的文件:0(0.00%)
    含全文筆數:78(70.27%)

    文件下載次數統計
    下載大於0次:78(100.00%)
    下載大於100次:78(100.00%)
    檔案下載總次數:26685(26.34%)

    最後更新時間: 2024-12-02 20:38


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 51-60 of 111. (12 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2006 Group key management method for the distributed system Chung, Y.F., Lai, F., Chen, T.S.
    2012 Hierarchical information-protected system with multiple predecessors Hsiao, T.-C.a , Chung, Y.-F.b , Chen, T.-S.c , Horng, G.a
    2011 An ID-based access control in a hierarchical key management for mobile agent Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
    2011-03 An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent. Liu, C. H., Chung, Y. F., Chen, T. S. and Wang, S. D.; 陳澤雄
    2007 ID-based digital signature scheme on the elliptic curve cryptosystem Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.
    2007-06 The influenced factors on buying cell phones by using Grey-Hierarchy selected system Yu, Y.-L., Cho, L.-C., Chen, T.-S.
    2011-04 Intelligent Service-Integrated Platform Based on the RFID Technology and Software Agent System. Yeh, K. C., Chen, R. S. and Chen, C. C.; 陳佳楨
    2011-03 Internet Users’ Decision Bias: Order Effect in E-Commerce. Wu, Chin-Shan.; 吳金山
    2010 Intrusion Detection Mechanisms Based on Queuing Theory in Remote Distribution Sensor Networks 姜自強; Lin, H.Y. and Chiang, T.C.
    2012 Investigating effectiveness and user acceptance of semantic social tagging for knowledge sharing Huang, S.-L.a , Lin, S.-C.b , Chan, Y.-C.c

    Showing items 51-60 of 111. (12 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback