Basic Search / Search Result

  • Search Result: 18results Search Strategy: "匿名性".ckeyword (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    A Lightweight Fog-Based Framework for Secure IoT Communications

    2

    Four Character Which Play by Youth Users on Social Media

    3

    Anonymous Handover Authentication and Key Exchange Protocol for Mobile Wireless Network

    4

    Group Authenticated Key Agreement Protocol with Anonymity
    • Department of Information Management /96/ Master
    • Author: Ku-kuan Hung Advisor: Tzong-chen Wu
    • An authenticated group key agreement ensure that entity communicates with each other secure from op…
    • Clicks: 614Downloads: 5
    • Full text public date 2010/07/25 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date 2010/07/25 (National library)

    5

    Flexible and traceable anonymous group key agreement in IoV
    • Department of Information Management /112/ Master
    • Author: Jou-Shan Lee Advisor: Jheng-Jia Huang
    • This paper presents a new group key management scheme for Vehicular Ad Hoc Networks (VANETs) that m…
    • Clicks: 230Downloads: 0
    • Full text public date 2026/08/27 (Intranet public)
    • Full text public date 2122/08/27 (Internet public)
    • Full text public date 2122/08/27 (National library)

    6

    Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks

    7

    rivacy-Preserving E-Invoicing in Physical Channels via Near Field Communication - An Example based on Taiwan’s Uniform E-Invoice System
    • Department of Information Management /102/ Master
    • Author: Chih-Teng Tseng Advisor: Shi-Cho Cha
    • Countries around the world promote e-invoices recently. To identify buyers of trans- actions, merch…
    • Clicks: 563Downloads: 0
    • Full text public date 2019/07/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Anonymous Mobile Payment Protocol Using ECC-based Self-certified Public Key System

    9

    Smart Card-based Anonymous Authentication Mechanisms

    10

    An Anonymous Sealed-bid Auction Mechanism Using Self-certified Authenticated Encryption Scheme
    • Department of Information Management /100/ Master
    • Author: Jin-De Jhuo Advisor: Tzong-Chen Wu Cheng-Huang Hung
    • Sealed-bid auction could be applied in many places, such as government engineering, especially the …
    • Clicks: 597Downloads: 1
    • Full text public date 2017/06/14 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)