Tunghai University Institutional Repository:
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 21921/27947 (78%)
造访人次 : 4250519      在线人数 : 366
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    碩士論文 [101/101]
    專書 [0/1]
    國科會研究報告 [14/30]
    會議論文 [67/121]

    类别统计

    近3年内发表的文件:0(0.00%)
    含全文笔数:78(70.27%)

    文件下载次数统计
    下载大于0次:78(100.00%)
    下载大于100次:78(100.00%)
    全文下载总次数:26871(26.40%)

    最后更新时间: 2024-12-05 03:11


    上传排行

    数据加载中.....

    下载排行

    数据加载中.....

    RSS Feed RSS Feed

    跳至: [中文]   [数字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    请输入前几个字:   

    显示项目51-100 / 111. (共3页)
    << < 1 2 3 > >>
    每页显示[10|25|50]项目

    日期题名作者
    2006 Group key management method for the distributed system Chung, Y.F., Lai, F., Chen, T.S.
    2012 Hierarchical information-protected system with multiple predecessors Hsiao, T.-C.a , Chung, Y.-F.b , Chen, T.-S.c , Horng, G.a
    2011 An ID-based access control in a hierarchical key management for mobile agent Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
    2011-03 An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent. Liu, C. H., Chung, Y. F., Chen, T. S. and Wang, S. D.; 陳澤雄
    2007 ID-based digital signature scheme on the elliptic curve cryptosystem Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.
    2007-06 The influenced factors on buying cell phones by using Grey-Hierarchy selected system Yu, Y.-L., Cho, L.-C., Chen, T.-S.
    2011-04 Intelligent Service-Integrated Platform Based on the RFID Technology and Software Agent System. Yeh, K. C., Chen, R. S. and Chen, C. C.; 陳佳楨
    2011-03 Internet Users’ Decision Bias: Order Effect in E-Commerce. Wu, Chin-Shan.; 吳金山
    2010 Intrusion Detection Mechanisms Based on Queuing Theory in Remote Distribution Sensor Networks 姜自強; Lin, H.Y. and Chiang, T.C.
    2012 Investigating effectiveness and user acceptance of semantic social tagging for knowledge sharing Huang, S.-L.a , Lin, S.-C.b , Chan, Y.-C.c
    2009 Investigating the processes and factors of cross-disciplinary knowledge integration in academic entrepreneurship 林盛程; Lin, F.R., Lin, S.C. and Tsai, C.M
    2011 The joint effect of framing and anchoring on internet buyers' decision-making Wu, C.-S., Cheng, F.-F.
    2008 Knowledge sharing and creation in a teachers' professional virtual community Lin, F.-r.a , Lin, S.-c.b, Huang, T.-p.c
    2008 Knowledge sharing and Creation in a Teachers’ Professional Virtual Community Fu-ren Lin, Sheng-cheng Lin and Tzu-ping Huang; 林盛程
    2009 A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets Chiang, T.-C.ab , Tai, C.-F.a , Hou, T.-W.a
    2012 Low cost RFID real lightweight binding proof protocol for medication errors and patient safety Yu, Y.-C.a , Hou, T.-W.ab , Chiang, T.-C.c
    2010 Measurement of angular distribution of cosmic-ray muon fluence rate Lin, J.-W.a, Chen, Y.-F.b, Sheuc, R.-J.c, Jiang, S.-H.ab
    2011 Measurement of natural background radiation intensity on a train Chen, Y.-F.a, Lin, J.-W.b, Sheu, R.-J.c, Lin, U.-T.d, Jiang, S.-H.a
    2012 Mobile agent application and integration in electronic anamnesis system Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
    2011 A Mobile Agent Approach for Secure Integrated Medical Information Systems Liu, C.-H.a , Chung, Y.-F.b , Chiang, T.-W.c , Chen, T.-S.d , Wang, S.-D.a
    2004-11-25 Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2007 A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm Chiang, T.-C., Liu, C.-H., Huang, Y.-M.
    2011-02 New Heuristics for Solving the Economic lot Scheduling Problem with Reworks. Chang, Yu-Jen and Chang, M.-J.; 張育仁
    2009 A Novel Application of Grey System Theory to Information Security Shen, R. L.,Y. F. Chung and T. S. Chen; 陳澤雄
    2005-11-05 A novel cryptosystem based on grey system theory and genetic algorithm Shen, V.R.L., Chen, T.-S., Shai, K.-Q.
    2002-10 A novel cryptosystem with lock generation and sum-difference replacement ladder Shen, V.R.L., Chen, T.-S.
    2007-08 A novel elliptic curve dynamic access control system Wen, J.-H., Wu, M.-C., Chen, T.-S.
    2005-03-04 A novel key management scheme for dynamic access control in a user hierarchy Chen, T.-S., Huang, J.-Y.
    2007 A novel non-repudiable threshold proxy signature scheme Zhang, Z., Jiang, H., Xu, Q.-L., Chen, T.-S.
    2011-07 Online Shoppers’ Decision Biases—the Effect of Response Mode. Wu, Chin-Shan.; 吳金山
    2013 Optimal schedule on message broadcast tree in structured peer-to-peer networks Lin, J.-W.; Wang, T.W.; Chang, R.-I.
    2011-05 Options Analysis and Knowledge Management: Implications for Theory and Practice. Chen, M. Y. and Chen, C. C.; 陳佳楨
    2006 A partition network model for ad hoc networks in overlay environments Huang, Y.-M. , Chiang, T.-C., Hou, T.-W.
    2012 A password-based user authentication scheme for the integrated EPR information system Wu, Z.-Y.af , Chung, Y.b, Lai, F.ace, Chen, T.-S
    2004 A practical authenticated encryption scheme based on the elliptic curve cryptosystem Chen, T.-S., Huang, K.-H., Chung, Y.-F.
    2007 Reliable cross-layer multicast with local backtracking for improving transmission control protocol performance in ad hoc networks Huang, Y.-M., Tsai, M.-H., Chiang, T.-C., Hou, T.-W.
    2010 A Rendezvous-Location Based Multicast Secure communication in Ad Hoc Networks 姜自強; Chiang, T.C. and Lin, H.Y
    2012 The role of Internet buyer's product familiarity and confidence in anchoring effect Wu, C.-S., Cheng, F.-F., Yen, D.C.
    2012 Secure dynamic access control scheme of PHR in cloud computing Chen, T.-S.a , Liu, C.-H.b , Chen, T.-L.c , Chen, C.-S.d , Bau, J.-G.e , Lin, T.-C.
    2011 A Secure Integrated Medical Information System Hsiao, T.-C.a, Wu, Z.-Y.b, Chung, Y.-F.c, Chen, T.-S.d , Horng, G.-B.
    2010 A Secure Time-Bound Hierarchical Key Management Scheme based on ECC for Mobile Agents 陳澤雄; Huang, J.Y., Chung, Y.F., Chen, T.S., and Liao, I.E
    2008 Solving the Economic Lot Scheduling Problem with Identical Facilities in Parallel Using Genetic Algorithms 張育仁、姚銘忠
    2004-11 A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem Chen, T.-S.
    2012 A study on efficient group-oriented signature schemes for realistic application environment Chung, Y.-F.a , Chen, T.-L.b , Chen, T.-S.c , Chen, C.-S.
    2012 The study on general secure multi-party computation Chung, Y.-F.a , Chen, T.-L.b , Chen, C.-S.c , Chen, T.-S.d
    2009 Threshold Authenticated Encryption Scheme Using Labor-division Signature Chung, Y. F., K. H. Huang and T. S. Chen; 陳澤雄
    2009-02 Threshold authenticated encryption scheme using labor-division signature Chung, Y.F., Huang, K.H., Chen, T.S.
    2005 A threshold signature scheme based on the elliptic curve cryptosystem Chen, T.-S.
    2004 A traceable proxy multisignature scheme based on the elliptic curve cryptosystem Chen, T.-S., Chung, Y.-F., Huang, K.-H.
    2008-04-15 Unconditionally secure cryptosystems based on quantum cryptography Chung, Y.F., Wu, Z.Y., Chen, T.S.

    显示项目51-100 / 111. (共3页)
    << < 1 2 3 > >>
    每页显示[10|25|50]项目

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈