English
|
正體中文
| 简体中文 |
全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4231703 在线人数 : 614
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
搜寻范围
全部THUIR
管理學院
資訊管理學系所
--期刊論文
查询小技巧:
您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
进阶搜寻
主页
‧
登入
‧
上传
‧
说明
‧
关于THUIR
‧
管理
Tunghai University Institutional Repository
>
管理學院
>
資訊管理學系所
>
期刊論文
>
依题名浏览
依日期浏览
依作者浏览
数据加载中.....
邻近类别
碩士論文
[
101
/101]
專書
[
0
/1]
國科會研究報告
[
14
/30]
會議論文
[
67
/121]
类别统计
近3年内发表的文件:0(0.00%)
含全文笔数:78(70.27%)
文件下载次数统计
下载大于0次:78(100.00%)
下载大于100次:78(100.00%)
全文下载总次数:26765(26.38%)
最后更新时间: 2024-12-03 05:47
上传排行
数据加载中.....
下载排行
数据加载中.....
最近上传
Optimal schedule on message broadca...
Animating civic education: Developi...
Exploring anchoring effect and the ...
The atmospheric factors of online s...
An efficient A* algorithm for the d...
The effect of online store atmosphe...
Debiasing the framing effect: The e...
Determinants of users' intention to...
User acceptance of wireless technol...
The joint effect of framing and anc...
跳至:
[
中文
] [
数字0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
请输入前几个字:
显示项目51-100 / 111. (共3页)
<<
<
1
2
3
>
>>
每页显示[
10
|
25
|
50
]项目
日期
题名
作者
2006
Group key management method for the distributed system
Chung, Y.F., Lai, F., Chen, T.S.
2012
Hierarchical information-protected system with multiple predecessors
Hsiao, T.-C.a , Chung, Y.-F.b , Chen, T.-S.c , Horng, G.a
2011
An ID-based access control in a hierarchical key management for mobile agent
Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
2011-03
An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent.
Liu, C. H., Chung, Y. F., Chen, T. S. and Wang, S. D.
;
陳澤雄
2007
ID-based digital signature scheme on the elliptic curve cryptosystem
Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.
2007-06
The influenced factors on buying cell phones by using Grey-Hierarchy selected system
Yu, Y.-L., Cho, L.-C., Chen, T.-S.
2011-04
Intelligent Service-Integrated Platform Based on the RFID Technology and Software Agent System.
Yeh, K. C., Chen, R. S. and Chen, C. C.
;
陳佳楨
2011-03
Internet Users’ Decision Bias: Order Effect in E-Commerce.
Wu, Chin-Shan.
;
吳金山
2010
Intrusion Detection Mechanisms Based on Queuing Theory in Remote Distribution Sensor Networks
姜自強
;
Lin, H.Y. and Chiang, T.C.
2012
Investigating effectiveness and user acceptance of semantic social tagging for knowledge sharing
Huang, S.-L.a , Lin, S.-C.b , Chan, Y.-C.c
2009
Investigating the processes and factors of cross-disciplinary knowledge integration in academic entrepreneurship
林盛程
;
Lin, F.R., Lin, S.C. and Tsai, C.M
2011
The joint effect of framing and anchoring on internet buyers' decision-making
Wu, C.-S., Cheng, F.-F.
2008
Knowledge sharing and creation in a teachers' professional virtual community
Lin, F.-r.a , Lin, S.-c.b, Huang, T.-p.c
2008
Knowledge sharing and Creation in a Teachers’ Professional Virtual Community
Fu-ren Lin, Sheng-cheng Lin and Tzu-ping Huang
;
林盛程
2009
A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets
Chiang, T.-C.ab , Tai, C.-F.a , Hou, T.-W.a
2012
Low cost RFID real lightweight binding proof protocol for medication errors and patient safety
Yu, Y.-C.a , Hou, T.-W.ab , Chiang, T.-C.c
2010
Measurement of angular distribution of cosmic-ray muon fluence rate
Lin, J.-W.a, Chen, Y.-F.b, Sheuc, R.-J.c, Jiang, S.-H.ab
2011
Measurement of natural background radiation intensity on a train
Chen, Y.-F.a, Lin, J.-W.b, Sheu, R.-J.c, Lin, U.-T.d, Jiang, S.-H.a
2012
Mobile agent application and integration in electronic anamnesis system
Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
2011
A Mobile Agent Approach for Secure Integrated Medical Information Systems
Liu, C.-H.a , Chung, Y.-F.b , Chiang, T.-W.c , Chen, T.-S.d , Wang, S.-D.a
2004-11-25
Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
Chen, T.-S., Huang, K.-H., Chung, Y.-F.
2007
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Chiang, T.-C., Liu, C.-H., Huang, Y.-M.
2011-02
New Heuristics for Solving the Economic lot Scheduling Problem with Reworks.
Chang, Yu-Jen and Chang, M.-J.
;
張育仁
2009
A Novel Application of Grey System Theory to Information Security
Shen, R. L.,Y. F. Chung and T. S. Chen
;
陳澤雄
2005-11-05
A novel cryptosystem based on grey system theory and genetic algorithm
Shen, V.R.L., Chen, T.-S., Shai, K.-Q.
2002-10
A novel cryptosystem with lock generation and sum-difference replacement ladder
Shen, V.R.L., Chen, T.-S.
2007-08
A novel elliptic curve dynamic access control system
Wen, J.-H., Wu, M.-C., Chen, T.-S.
2005-03-04
A novel key management scheme for dynamic access control in a user hierarchy
Chen, T.-S., Huang, J.-Y.
2007
A novel non-repudiable threshold proxy signature scheme
Zhang, Z., Jiang, H., Xu, Q.-L., Chen, T.-S.
2011-07
Online Shoppers’ Decision Biases—the Effect of Response Mode.
Wu, Chin-Shan.
;
吳金山
2013
Optimal schedule on message broadcast tree in structured peer-to-peer networks
Lin, J.-W.
;
Wang, T.W.
;
Chang, R.-I.
2011-05
Options Analysis and Knowledge Management: Implications for Theory and Practice.
Chen, M. Y. and Chen, C. C.
;
陳佳楨
2006
A partition network model for ad hoc networks in overlay environments
Huang, Y.-M. , Chiang, T.-C., Hou, T.-W.
2012
A password-based user authentication scheme for the integrated EPR information system
Wu, Z.-Y.af , Chung, Y.b, Lai, F.ace, Chen, T.-S
2004
A practical authenticated encryption scheme based on the elliptic curve cryptosystem
Chen, T.-S., Huang, K.-H., Chung, Y.-F.
2007
Reliable cross-layer multicast with local backtracking for improving transmission control protocol performance in ad hoc networks
Huang, Y.-M., Tsai, M.-H., Chiang, T.-C., Hou, T.-W.
2010
A Rendezvous-Location Based Multicast Secure communication in Ad Hoc Networks
姜自強
;
Chiang, T.C. and Lin, H.Y
2012
The role of Internet buyer's product familiarity and confidence in anchoring effect
Wu, C.-S., Cheng, F.-F., Yen, D.C.
2012
Secure dynamic access control scheme of PHR in cloud computing
Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
2011
A Secure Integrated Medical Information System
Hsiao, T.-C.a, Wu, Z.-Y.b, Chung, Y.-F.c, Chen, T.-S.d , Horng, G.-B.
2010
A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents
陳澤雄
;
Huang, J.Y., Chung, Y.F., Chen, T.S., and Liao, I.E
2008
Solving the Economic Lot Scheduling Problem with Identical Facilities in Parallel Using Genetic Algorithms
張育仁、姚銘忠
2004-11
A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem
Chen, T.-S.
2012
A study on efficient group-oriented signature schemes for realistic application environment
Chung, Y.-F.a , Chen, T.-L.b , Chen, T.-S.c , Chen, C.-S.
2012
The study on general secure multi-party computation
Chung, Y.-F.a , Chen, T.-L.b , Chen, C.-S.c , Chen, T.-S.d
2009
Threshold Authenticated Encryption Scheme Using Labor-division Signature
Chung, Y. F., K. H. Huang and T. S. Chen
;
陳澤雄
2009-02
Threshold authenticated encryption scheme using labor-division signature
Chung, Y.F., Huang, K.H., Chen, T.S.
2005
A threshold signature scheme based on the elliptic curve cryptosystem
Chen, T.-S.
2004
A traceable proxy multisignature scheme based on the elliptic curve cryptosystem
Chen, T.-S., Chung, Y.-F., Huang, K.-H.
2008-04-15
Unconditionally secure cryptosystems based on quantum cryptography
Chung, Y.F., Wu, Z.Y., Chen, T.S.
显示项目51-100 / 111. (共3页)
<<
<
1
2
3
>
>>
每页显示[
10
|
25
|
50
]项目
本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
回馈