Showing results 208 to 227 of 936
< previous
next >
Date | Title | Author(s) |
2-Sep-2014 | Cooperative matching paradigm for the analysis of stereo image sequences | 廖文宏; Liao,Wen-Hung; J. K. Aggarwal |
17-Jun-2015 | Cooperative Transmission Aid in Intermittent Broken Connection on VANET | Chuang, Sheng-Chih; 張宏慶; Jang, Hung-chin |
8-May-2015 | Coordinated Motion Planning for 3D Animation - With Use of a Chinese Lion Dance as an Example | Yu, Fu-Sheng; 李蔡彥; Li, Tsai-yen |
12-May-2015 | Coreference resolution of medical concepts in discharge summaries by exploiting contextual information | Lai, Po-Ting; 賴柏廷; Chen, C.-Y.; Dai, H.-J. |
22-Jun-2016 | Corporate Default Prediction via Deep Learning | Yeh, Shu-Hao;Wang, Chuan-Ju;Tsai, Ming-Feng; 蔡銘峰 |
26-May-2015 | Crafting a balance between big data utility and protection in the semantic data cloud | Hu, Yuh-Jong;Cheng, Kua Ping;Huang, Ya Ling; 胡毓忠;黃雅玲 |
27-Oct-2020 | Critical factors for the relationship quality of IT-related project virtual teams – Roles of mutual trust and knowledge sharing. | 謝佩璇; Hsieh, P. H.; Chung, V. K. |
2-Sep-2014 | A Cross-Layer Routing Design for Multi-Interface Wireless Mesh Networks | 蔡子傑; Tsai,Tzu-Chieh; Peng,Chen-Tzu |
4-Jun-2021 | Crowd View: Converting Investors` Opinions into Indicators | 黃瀚萱; Huang, Hen-Hsen |
17-Feb-2023 | Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes | 曾一凡; Tseng, Yi-Fan |
11-Jun-2015 | Cryptanalysis and improvement of an efficient password authentication scheme based on smart card | Tso, Ray-Lin; 左瑞麟; Wu, M.-E.; Lin, Yi Shiuan |
2-Sep-2020 | Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wu, Si-Jing; Kuo, Hsin-Nan; Huang, Jheng-Jia |
21-May-2015 | Cryptanalysis of a Provably Secure Certificateless Short Signature Scheme | Tso, Ray-Lin; 左瑞麟; Chen, Y.-C.; Horng, G. |
17-Apr-2015 | Cryptanalysis of exhaustive search on attacking RSA | Wu, M.-E.;Tso, R.;Sun, H.-M.; 左瑞麟 |
17-Feb-2023 | Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification | 曾一凡; Tseng, Yi-Fan |
27-Oct-2020 | Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
9-Dec-2021 | Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes | 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia |
17-Feb-2023 | Cryptanalysis to Ming et al.’s Revocable Multi-Authority Attribute-Based Encryption | 曾一凡; Tseng, Yi-Fan |
17-Feb-2023 | Cryptanalysis to Sowjanya et al.’s Attribute-Based Encryptions from Elliptic Curve Cryptography | 曾一凡; Tseng, Yi-Fan |
22-Apr-2020 | Cultivating Humanity in Computer Programming Educational Practices— A Study of Teacher Action Research | 江玥慧; Chiang, Yueh-hui Vanessa |