題名 | 作者 | 日期 |
Watermarking Damage to Risk Multimedia in Intellectual Property Systems | Ke, Hung-Jui; Wang, Shiuh-Jeng; Chiang, Wen-Ya | 2009-02-09T08:32:39Z |
Efficient Squaring Algorithm for Embedded RISC Processors | Su, Feng-Fu; Hwang, Ren-Junn; Huang, Loang-Shing | 2009-02-10T02:20:53Z |
Enhancing Location Privacy in Wireless Local Area Networks | Chuang, Po-Jen; Deng, Jer-Sheng; Lin, Chih-Shin | 2009-02-10T02:29:54Z |
Analysis and Improvement of Fair Certified E-Mail Delivery Protocol | Lai, Chih-Hua; Hwang, Ren-Junn | 2009-02-10T06:21:13Z |
A DK-PHBT Based Key Management Mechanism in Heterogeneous Wireless Sensor Networks | Wang, ChihHung; Wei, ShihYi | 2009-02-10T02:40:27Z |
Access Control Policy Composition for Resource Federation Networks Using Semantic Web and Resource Description Framework (RDF) | Hu, Vincent C.; Quirolgico, Stephen; Scarfone, Karen | 2009-02-10T02:04:37Z |
Reversible Data Hiding Based on a Sorted VQ Index Table | Yang, Cheng-Hsing; Lin, Yi-Cheng; Wu, Sheng-Chang; Wu, Min-Hao | 2009-02-10T06:37:56Z |
A Deniable Authentication Protocol with Anonymous Sender Protection | Hwang, Shin-Jia; Ma, Juei-Che | 2009-02-10T02:28:29Z |
Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable Recipient | Lin, Han-Yu; Wu, Tzong-Sun | 2009-02-10T02:32:52Z |
Performance Evaluation of Two Secure Communication Schemes on Vehicular Ad Hoc Networks | Lo, N.W.; Yang, Chu-Hsiang; Yeh, Kuo-Hui | 2009-02-10T06:29:06Z |