English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4238005      Online Users : 432
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    碩士論文 [101/101]
    專書 [0/1]
    國科會研究報告 [14/30]
    會議論文 [67/121]

    Collection Statistics

    近3年內發表的文件:0(0.00%)
    含全文筆數:78(70.27%)

    文件下載次數統計
    下載大於0次:78(100.00%)
    下載大於100次:78(100.00%)
    檔案下載總次數:26772(26.37%)

    最後更新時間: 2024-12-04 02:42


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 76-100 of 111. (5 Page(s) Totally)
    << < 1 2 3 4 5 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2002-10 A novel cryptosystem with lock generation and sum-difference replacement ladder Shen, V.R.L., Chen, T.-S.
    2007-08 A novel elliptic curve dynamic access control system Wen, J.-H., Wu, M.-C., Chen, T.-S.
    2005-03-04 A novel key management scheme for dynamic access control in a user hierarchy Chen, T.-S., Huang, J.-Y.
    2007 A novel non-repudiable threshold proxy signature scheme Zhang, Z., Jiang, H., Xu, Q.-L., Chen, T.-S.
    2011-07 Online Shoppers’ Decision Biases—the Effect of Response Mode. Wu, Chin-Shan.; 吳金山
    2013 Optimal schedule on message broadcast tree in structured peer-to-peer networks Lin, J.-W.; Wang, T.W.; Chang, R.-I.
    2011-05 Options Analysis and Knowledge Management: Implications for Theory and Practice. Chen, M. Y. and Chen, C. C.; 陳佳楨
    2006 A partition network model for ad hoc networks in overlay environments Huang, Y.-M. , Chiang, T.-C., Hou, T.-W.
    2012 A password-based user authentication scheme for the integrated EPR information system Wu, Z.-Y.af , Chung, Y.b, Lai, F.ace, Chen, T.-S
    2004 A practical authenticated encryption scheme based on the elliptic curve cryptosystem Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2007 Reliable cross-layer multicast with local backtracking for improving transmission control protocol performance in ad hoc networks Huang, Y.-M., Tsai, M.-H., Chiang, T.-C., Hou, T.-W.
    2010 A Rendezvous-Location Based Multicast Secure communication in Ad Hoc Networks 姜自強; Chiang, T.C. and Lin, H.Y
    2012 The role of Internet buyer's product familiarity and confidence in anchoring effect Wu, C.-S., Cheng, F.-F., Yen, D.C.
    2012 Secure dynamic access control scheme of PHR in cloud computing Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
    2011 A Secure Integrated Medical Information System Hsiao, T.-C.a, Wu, Z.-Y.b, Chung, Y.-F.c, Chen, T.-S.d , Horng, G.-B.
    2010 A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents 陳澤雄; Huang, J.Y., Chung, Y.F., Chen, T.S., and Liao, I.E
    2008 Solving the Economic Lot Scheduling Problem with Identical Facilities in Parallel Using Genetic Algorithms 張育仁、姚銘忠
    2004-11 A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem Chen, T.-S.
    2012 A study on efficient group-oriented signature schemes for realistic application environment Chung, Y.-F.a , Chen, T.-L.b , Chen, T.-S.c , Chen, C.-S.
    2012 The study on general secure multi-party computation Chung, Y.-F.a , Chen, T.-L.b , Chen, C.-S.c , Chen, T.-S.d
    2009 Threshold Authenticated Encryption Scheme Using Labor-division Signature Chung, Y. F., K. H. Huang and T. S. Chen; 陳澤雄
    2009-02 Threshold authenticated encryption scheme using labor-division signature Chung, Y.F., Huang, K.H., Chen, T.S.
    2005 A threshold signature scheme based on the elliptic curve cryptosystem Chen, T.-S.
    2004 A traceable proxy multisignature scheme based on the elliptic curve cryptosystem Chen, T.-S., Chung, Y.-F., Huang, K.-H.
    2008-04-15 Unconditionally secure cryptosystems based on quantum cryptography Chung, Y.F., Wu, Z.Y., Chen, T.S.

    Showing items 76-100 of 111. (5 Page(s) Totally)
    << < 1 2 3 4 5 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback