Browsing by Author 國立中興大學資訊管理學系


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 435  next >
Issue DateTitleAuthor(s)Text
-(16th Annual International Conference of the International Association for Energy Economics, III:9-023~9-039)Energy Intensity in Taiwan's Industrial Sectors: Divisia Index vs. Laspeyres IndexHsu, G. J. Y.; I.C. Hsu-
-(18th IEEE International Conference on Advanced Information Networking and Applications:p133-p138)A Dynamic Mechanism for Determining Relationships in a Partially Ordered User HierarchyC. C. Chang; I. C. Lin; H. M. Tsai
-(18th IEEE International Conference on Advanced Information Networking and Applications:p376-p379)A Key Assignment Scheme for Controlling Access in Partially Ordered User HierarchiesC. C. Chang; I. C. Lin; H. M. Tsai; H. H. Wang
-(The 18th International Conference on Advanced Information Networking and Applications, p160-p163)On the Security of an Enhanced Authentication Key Exchange ProtocolM. S. Hwang; T. Y. Chang; S. C. Lin; C. S. Tsai-
-(1995海峽兩岸能源研討會論文集, p049-p068)台灣能源政策之回顧與展望許志義-
-(2000全球經濟展望, p099-p118)從729與921大停電事件談永續發展策略許志義-
-(2000年民間環保政策白皮書, p153-p167)從729與921大停電事件論台灣永續發展策略許志義-
-(2002 International Conference on Information Security:p082-p088)A Credit Card-based Mobile Payment SystemK. F. Hwang; I. C. Lin; C. C. Chang-
-(2003 IEEE International Conference on Natural Language Processing and Knowledge Engineering:p506-p511)An Efficient Placement of Chinese Phonetic Symbols for an Intellectual Chinese Phonetic Symbol Input System in Mobile Phones Using Genetic AlgorithmC. C. Chang; K. J. Shih; I. C. Lin-
-(2007全國計算機會議,p468-p478)具效率的無線感測網路物件偵測策略林詠章; 黃書彥; 曹世昌-
-(2007全國計算機會議,p479-p485)抵擋 Tag Killing 攻擊的 RFID 安全機制張凱評; 林詠章; 曹世昌-
-(2007全國計算機會議,p492-p499)基於所有權轉移特性並增進 RFID 安全協定之效能白如珮; 林詠章; 曹世昌-
-(2007全國計算機會議,p500-p507)具所有權轉換之 RFID 動態身份 RFID 使用者隱私保護機制楊晴雯; 林詠章; 曹世昌-
-(2007全國計算機會議,p514-p518)具隱私權保護的 RFID 安全機制李俊叡; 林詠章; 曹世昌-
-(2007全國計算機會議,p519-p525)建構有效率的 RFID 相互認證通訊協定羅瑞昆; 林詠章; 曹世昌-
-(2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1367-p1370)A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical OrganizationI. C. Lin; C. C. Chang
-(2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1537-p1540)An Efficient Proxy Signature for Realizing Generalized Proxy Signature PolicyC. C. Chang; I. C. Lin; J. H. Yang
-(2008管理與技術國際學術研討會論文集, p130-p138)一個改良SAPA之無線射頻(RFID)驗證協定陳育毅; 詹進科 ; 劉柏伸-
-(20th Annual North American Conference, p354-p364)Simulating the Effect of CO2 Emission Reduction in TaiwanWang, K. M; G. J. Y. Hsu; T. W. Kuo-
-(24th International Computer Software and Applications Conference:p113-p115)Security Enhancement for the Simple Authentication Key Agreement AlgorithmI. C. Lin; M. S. Hwang; C. C. Chang