English
| 正體中文 |
简体中文
|
Items with full text/Total items : 21921/27947 (78%)
Visitors : 4238006 Online Users : 433
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by
NTU Library IR team.
Scope
All of THUIR
管理學院
資訊管理學系所
--期刊論文
Tips:
please add "double quotation mark" for query phrases to get precise results
please goto advance search for comprehansive author search
Adv. Search
Home
‧
Login
‧
Upload
‧
Help
‧
About
‧
Administer
Tunghai University Institutional Repository
>
管理學院
>
資訊管理學系所
>
期刊論文
>
Browse By Title
Browse By Date
Browse By Authors
Loading...
Siblings
碩士論文
[
101
/101]
專書
[
0
/1]
國科會研究報告
[
14
/30]
會議論文
[
67
/121]
Collection Statistics
近3年內發表的文件:0(0.00%)
含全文筆數:78(70.27%)
文件下載次數統計
下載大於0次:78(100.00%)
下載大於100次:78(100.00%)
檔案下載總次數:26772(26.37%)
最後更新時間: 2024-12-04 02:42
Top Upload
Loading...
Top Download
Loading...
Recent Submissions
Optimal schedule on message broadca...
Animating civic education: Developi...
Exploring anchoring effect and the ...
The atmospheric factors of online s...
An efficient A* algorithm for the d...
The effect of online store atmosphe...
Debiasing the framing effect: The e...
Determinants of users' intention to...
User acceptance of wireless technol...
The joint effect of framing and anc...
Jump to:
[
Chinese Items
] [
0-9
] [
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
]
or enter the first few letters:
Showing items 76-100 of 111. (5 Page(s) Totally)
<<
<
1
2
3
4
5
>
>>
View [
10
|
25
|
50
] records per page
Date
Title
Authors
2002-10
A novel cryptosystem with lock generation and sum-difference replacement ladder
Shen, V.R.L., Chen, T.-S.
2007-08
A novel elliptic curve dynamic access control system
Wen, J.-H., Wu, M.-C., Chen, T.-S.
2005-03-04
A novel key management scheme for dynamic access control in a user hierarchy
Chen, T.-S., Huang, J.-Y.
2007
A novel non-repudiable threshold proxy signature scheme
Zhang, Z., Jiang, H., Xu, Q.-L., Chen, T.-S.
2011-07
Online Shoppers’ Decision Biases—the Effect of Response Mode.
Wu, Chin-Shan.
;
吳金山
2013
Optimal schedule on message broadcast tree in structured peer-to-peer networks
Lin, J.-W.
;
Wang, T.W.
;
Chang, R.-I.
2011-05
Options Analysis and Knowledge Management: Implications for Theory and Practice.
Chen, M. Y. and Chen, C. C.
;
陳佳楨
2006
A partition network model for ad hoc networks in overlay environments
Huang, Y.-M. , Chiang, T.-C., Hou, T.-W.
2012
A password-based user authentication scheme for the integrated EPR information system
Wu, Z.-Y.af , Chung, Y.b, Lai, F.ace, Chen, T.-S
2004
A practical authenticated encryption scheme based on the elliptic curve cryptosystem
Chen, T.-S., Huang, K.-H., Chung, Y.-F.
2007
Reliable cross-layer multicast with local backtracking for improving transmission control protocol performance in ad hoc networks
Huang, Y.-M., Tsai, M.-H., Chiang, T.-C., Hou, T.-W.
2010
A Rendezvous-Location Based Multicast Secure communication in Ad Hoc Networks
姜自強
;
Chiang, T.C. and Lin, H.Y
2012
The role of Internet buyer's product familiarity and confidence in anchoring effect
Wu, C.-S., Cheng, F.-F., Yen, D.C.
2012
Secure dynamic access control scheme of PHR in cloud computing
Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
2011
A Secure Integrated Medical Information System
Hsiao, T.-C.a, Wu, Z.-Y.b, Chung, Y.-F.c, Chen, T.-S.d , Horng, G.-B.
2010
A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents
陳澤雄
;
Huang, J.Y., Chung, Y.F., Chen, T.S., and Liao, I.E
2008
Solving the Economic Lot Scheduling Problem with Identical Facilities in Parallel Using Genetic Algorithms
張育仁、姚銘忠
2004-11
A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem
Chen, T.-S.
2012
A study on efficient group-oriented signature schemes for realistic application environment
Chung, Y.-F.a , Chen, T.-L.b , Chen, T.-S.c , Chen, C.-S.
2012
The study on general secure multi-party computation
Chung, Y.-F.a , Chen, T.-L.b , Chen, C.-S.c , Chen, T.-S.d
2009
Threshold Authenticated Encryption Scheme Using Labor-division Signature
Chung, Y. F., K. H. Huang and T. S. Chen
;
陳澤雄
2009-02
Threshold authenticated encryption scheme using labor-division signature
Chung, Y.F., Huang, K.H., Chen, T.S.
2005
A threshold signature scheme based on the elliptic curve cryptosystem
Chen, T.-S.
2004
A traceable proxy multisignature scheme based on the elliptic curve cryptosystem
Chen, T.-S., Chung, Y.-F., Huang, K.-H.
2008-04-15
Unconditionally secure cryptosystems based on quantum cryptography
Chung, Y.F., Wu, Z.Y., Chen, T.S.
Showing items 76-100 of 111. (5 Page(s) Totally)
<<
<
1
2
3
4
5
>
>>
View [
10
|
25
|
50
] records per page
本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
DSpace Software
Copyright © 2002-2004
MIT
&
Hewlett-Packard
/
Enhanced by
NTU Library IR team
Copyright ©
-
Feedback