English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4231533      Online Users : 644
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Master's Theses [101/101]
    Periodical Articles [78/111]
    Books [0/1]
    National Research Council Report [14/30]
    Conference Papers [67/121]

    Community Statistics


    Item counts issued in 3 years:0(0.00%)
    Items With Fulltext:260(71.43%)

    Download counts of the item
    Download times greater than 0:259(99.62%)
    Download times greater than 100:226(86.92%)
    Total Bitstream Download Counts:101369(0.65%)

    Last Update: 2024-12-03 03:47

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 51-100 of 364. (8 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2010-08-04 Dynamic multicast height balance key agreements for secure multicast communication in ad hoc networks Lin, H.-Y.a , Chiang, T.-C.b , Yang, C.-Y.a , Chang, J.-L.c
    2007-06 ECC-based blind signature scheme with lower computation Jeng, F.-G., Chen, T.-S.
    2010 An ECC-Based Blind Signature Scheme 陳澤雄; Jeng, F.G., Chen, T.L. and Chen, T.S.
    2010 An ECC-based blind signature scheme Jeng, F.-G.a , Chen, T.-L.b , Chen, T.-S.
    2011 Effect of cadmium on three antioxidant enzyme activities and lipid peroxidation in planarian (Dugesia japonica) Zhang, X., Shi, J., Wu, T., Zhang, Y., Lin, S., Tao, Y., Zhao, B.
    2009 The effect of online store atmosphere on consumer's emotional responses - An experimental study of music and colour Cheng, F.-F., Wu, C.-S., Yen, D.C.
    2008 An efficient A* algorithm for the directed linear arrangement problem Tsaih, D., Wu, G., Chang, C., Hung, S., Wu, C., Lin, H.
    2010 Efficient date-constraint access control and key management scheme for mobile agents. Chung, Y.F., Kao, M.H., Chen, T. L. and Chen, T.S.; 陳澤雄
    2010-03-17 Efficient date-constraint access control and key management scheme for mobile agents Chung, Y.-F.a , Kao, M.-H.a, Chen, T.-L.b, Chen, T.-S.
    2005 An efficient encoding tree for location-aware multicast routing protocol in wireless ad hoc networks Huang, Y.-M. , Chiang, T.-C. , Hou, T.-W.
    2008 Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent Chung, Y. F., T. S. Chen and C. H. Liu; 陳澤雄
    2008-09 Efficient hierarchical key management scheme for access control in the mobile agent Chung, Y., Chen, T., Liu, C.
    2008-03-25 Efficient hierarchical key management scheme for access control in the mobile agent?? Chung, Y.-F., Chen, T.-S., Liu, C.-H., Wang, T.-C.
    2011 Efficient key agreements in dynamic multicast height balanced tree for secure multicast communications in Ad Hoc networks Chiang, T.-C.b , Lin, H.-Y.a
    2003-03 An efficient key assignment scheme based on one-way hash function in a user hierarchy Chen, T.-S., Chung, Y.-F.
    2009 Efficient Migration Access Control for Mobile Agents 陳澤雄; Chung, Y.F., Chen, T.S. and Lai, M.W
    2009 Efficient Migration for Mobile Computing in Distributed Networks Huang, K. H., Y. F. Chung, C. H. Liu, F. P. Lai and T. S. Chen; 陳澤雄
    2009 Efficient migration for mobile computing in distributed networks Huang, K.-H., Chung, Y.-F., Liu, C.-H., Lai, F., Chen, T.-S.
    2003 Efficient proxy multisignature schemes based on the elliptic curve cryptosystem?? Chen, T.-S., Chung, Y.-F., Huang, G.-S.
    2005 An efficient threshold group signature scheme Yu, Y.-L., Chen, T.-S.
    2004-11-21 An efficient threshold group signature scheme?? Chen, T.-S., Hsiao, T.-C., Chen, T.-L.
    2005 An efficient threshold RSA digital signature scheme Xu, Q.-L., Chen, T.-S.
    2005 An efficient undeniable group-oriented signature scheme Chen, T.-S., Huang, J.-Y., Chen, T.-L.
    2008 Electronic Signatures for Long-term Storage Purpose in Electronic Anamnesis Yu, Y. L., Y. F. Chung and T. S. Chen; 陳澤雄
    2008-11 Electronic signatures for long-term storage purpose in electronic anamnesis Yu, Y.L., Chung, Y.F., Chen, T.S.
    2004-07 An English auction scheme in the online transaction environment Chen, T.-S.
    2011 An enhanced password-based user authentication scheme for grid computing Wu, Z.-Y.a , Chung, Y.b , Lai, F.ac , Chen, T.-S.d , Lee, H.-C.e
    2011-07 An Enhanced Password-based User Authentication Scheme for Grid Computing. Wu, Z. Y., Chung, Y. F., Lai, F., Chen, T. S., and Lee ,H. C.; 陳澤雄
    2012 The enhancement of security in healthcare information systems Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.
    2013-07-03 Epilepsy analytic system with cloud computing Shen, C.-P.; Zhou, W.; Lin, F.-S.; Sung, H.-Y.; Lam, Y.-Y.; Chen, W.; Lin, J.-W.; Pan, M.-K.; Chiu, M.-J.; Lai, F.
    2011 Epileptic seizure detection for multichannel EEG signals with support vector machines Shen, C.-P.a , Chan, C.-M.a , Lin, F.-S.b , Chiu, M.-J.c , Lin, J.-W.d , Kao, J.-H.a , Chen, C.-P.a , Lai, F.
    2008 Exploring anchoring effect and the moderating role of repeated anchor in electronic commerce Wu, C.S., Cheng, F.F., Lin, H.H.
    2013 Facebook粉絲專頁社群網路行銷 運用於民宿之研究 毛凱毅; Mao,Kai-Yi
    2013-10-26 Font generation of personal handwritten Chinese characters Lin, J.-W.; Wang, C.-Y.; Ting, C.-L.; Chang, R.-I.
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2004-07-08 A forwarding cache vlan protocol (FCVP) in wireless networks Chiang, T.-C.ac, Yeh, C.-H.a, Huang, Y.-M.a, Lee, F.b
    2011-07 A framework of Collaborative Commerce and internet organization business model innovation in the tourism industry: the case study of the Veterans Affairs Commission in Taiwan. Hsiang, C. H., Chen, R. S., Chen, Y. C. and Chen, C. C.; 陳佳楨
    2008 A Genetic Algorithm for Solving the Economic Lot Scheduling Problem with Reworks 張育仁、姚銘忠
    2009 A Genetic Algorithm for Solving the Economic Lot Scheduling Problem with Reworks 張育仁; Chang, Y. J. and M. J. Yao
    2009 A Genetic Algorithm for Solving the Economic Lott Scheduling Problem with Reworks 張育仁; Chang, Y. J. and Yao, M. J
    2009 GPS定位分叢應用於AODV繞送協定之改良 吳宗育、莊雅云、姜自強
    2006 Group key management method for the distributed system Chung, Y.F., Lai, F., Chen, T.S.
    2006-12-04 Hacking tricks toward security on network environments?? Chen, T.-S., Jeng, F.-G., Liu, Y.-C.
    2012 Hierarchical information-protected system with multiple predecessors Hsiao, T.-C.a , Chung, Y.-F.b , Chen, T.-S.c , Horng, G.a
    2009 Hierarchical Time-Bound Key Management for Mobile Agents 陳澤雄; Chung, Y. F., T. S. Chen, C. C. Ho, Y. H. Yeh and H. C. Ko
    2009-06-08 Hierarchical time-bound key management for mobile agents Chung, Y.-F.a , Chen, T.-S.b, Ho, C.-C.c, Yeh, Y.-H.b, Ko, H.-C.
    2013-07-03 A High performance cloud computing platform for mRNA analysis Lin, F.-S.; Shen, C.-P.; Sung, H.-Y.; Lam, Y.-Y.; Lin, J.-W.; Lai, F.
    2011 An ID-based access control in a hierarchical key management for mobile agent Liu, C.-H.a , Chung, Y.-F.b , Chen, T.-S.c , Wang, S.-D.a
    2011-03 An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent. Liu, C. H., Chung, Y. F., Chen, T. S. and Wang, S. D.; 陳澤雄
    2007 ID-based digital signature scheme on the elliptic curve cryptosystem Chung, Y.F., Huang, K.H., Lai, F., Chen, T.S.

    Showing items 51-100 of 364. (8 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 > >>
    View [10|25|50] records per page

    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback