Showing results 660 to 679 of 936
< previous
next >
Date | Title | Author(s) |
28-Aug-2014 | Schema Integration and Query Processing for Multiple Object Databases | 陳良弼; Chen,Arbee L.P.;Koh,Jia-Ling;Kuo,Tony C.T.;Liu,Chih-Chin |
28-Aug-2014 | Searching a minimal semantically-equivalent subset of a set of partial values | 陳良弼; Tseng,Frank S. C. Ph.D.; Chen,Arbee L. P. Ph.D.; Yang,Wei-Pang Ph.D. |
27-Oct-2020 | Secure Certificateless Signature Scheme Supporting Batch Verification | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu; Huang, Jheng-Jia |
27-Oct-2020 | Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki |
2-Sep-2020 | Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki |
21-Aug-2014 | A Secure Software Agent Framework for Robust Agent Management Services | 胡毓忠; Hu,Yuh-Jong |
15-Jun-2015 | Security analysis and improvement of femtocell access control | Chen, C.-M.;Wu, T.-Y.;Tso, Ray-Lin;Wu, M.-E.; 左瑞麟 |
20-Oct-2014 | Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol | 左瑞麟; Tso, Raylin |
17-Apr-2015 | Security analysis concerning the random numbers of threshold ring signatures | Huang, Kaibin;Tso, Ray-Lin; 左瑞麟 |
31-Aug-2017 | Security analysis of a NTRU-based mutual authentication scheme | 左瑞麟; Tso, Ray-Lin; Jheng, Yi Shio |
8-Aug-2017 | Security analysis of an anonymous authentication scheme based on smart cards and biometrics for multi-server environments | 左瑞麟; Pan, Jeng-Shyang; Tso, Raylin; Wu, Mu-En; Chen, Chien-Ming |
20-Oct-2014 | Security Analysis of Choi et al.`s Certificateless Short Signature Scheme | 左瑞麟; Tso, Raylin |
16-Jun-2023 | Semantic analyses using NLP for Twitter posts in different languages — An example of sentiments on global warming issues | 謝佩璇; Hsieh, Pei-Hsuan; Lin, Yi-Chieh;Wu, Yi-Chieh |
16-Jun-2015 | Semantic clustering of morphologically related Chinese words | Lee, C.-L.;Chang, Y.-N.;Liu, Chao Lin;Lee, C.-Y.;Hsu, J.Y.-J.; 劉昭麟 |
15-Jun-2015 | Semantic frame-based natural language understanding for intelligent topic detection agent | Chang, Y.-C.;Hsieh, Y.-L.;Chen, Cen Chieh;Hsu, W.-L. |
19-Nov-2014 | Semantic legal policies for data exchange and protection across super-peer domains in the cloud | 胡毓忠; 黃雅玲; 鄭國平; 吳穩男 |
22-Jun-2015 | Semantics-enabled policies for information sharing and protection in the cloud | Hu, Yuh-Jong;Wu, Win Nan;Yang, Jiun Jan; 胡毓忠;楊竣展 |
21-Aug-2014 | Semantics-enabled Policies for Super-Peer Data Integration and Protection | 胡毓忠; Hu,Yuh-Jong;Wu,Win-Nan;Yang,Jiun-Jan |
16-Jun-2023 | Semi-automated Quadrotor Teleoperation by Hierarchical Gesture Control and Visual Perception | 劉吉軒; Liu, Jyi-Shane; Chiu, Ting-Yi;Hsu, Chen-Tao;Chuang, Jen-Hui |
17-Jun-2015 | SemPIF: A Semantic Meta-policy Interchange Format for Multiple Web Policies | Hu, Yuh-jong, Harold Boley; 胡毓忠 |