Basic Search / Search Result

  • Search Result: 14results Search Strategy: "匿名性".ckeyword (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Anonymous Handover Authentication and Key Exchange Protocol for Mobile Wireless Network
    • Department of Information Management /110/ Master
    • Author: Jia-Wei Kao Advisor: Tzong-Chen Wu
    • Traditional handover authentication mechanisms are mostly concerned with mutual authentication and …
    • Clicks: 165Downloads: 0
    • Full text public date 2024/09/24 (Intranet public)
    • Full text public date 2024/09/24 (Internet public)
    • Full text public date 2024/09/24 (National library)

    2

    A Lightweight Fog-Based Framework for Secure IoT Communications

    3

    Four Character Which Play by Youth Users on Social Media

    4

    rivacy-Preserving E-Invoicing in Physical Channels via Near Field Communication - An Example based on Taiwan’s Uniform E-Invoice System
    • Department of Information Management /102/ Master
    • Author: Chih-Teng Tseng Advisor: Shi-Cho Cha
    • Countries around the world promote e-invoices recently. To identify buyers of trans- actions, merch…
    • Clicks: 244Downloads: 0
    • Full text public date 2019/07/28 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    Group Authenticated Key Agreement Protocol with Anonymity
    • Department of Information Management /96/ Master
    • Author: Ku-kuan Hung Advisor: Tzong-chen Wu
    • An authenticated group key agreement ensure that entity communicates with each other secure from op…
    • Clicks: 313Downloads: 5
    • Full text public date 2010/07/25 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date 2010/07/25 (National library)

    6

    Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks

    7

    Anonymous Mobile Payment Protocol Using ECC-based Self-certified Public Key System

    8

    Smart Card-based Anonymous Authentication Mechanisms

    9

    An Anonymous Sealed-bid Auction Mechanism Using Self-certified Authenticated Encryption Scheme
    • Department of Information Management /100/ Master
    • Author: Jin-De Jhuo Advisor: Tzong-Chen Wu Cheng-Huang Hung
    • Sealed-bid auction could be applied in many places, such as government engineering, especially the …
    • Clicks: 216Downloads: 1
    • Full text public date 2017/06/14 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    10

    Speech or silence: The effect of user anonymity and member familiarity on the willingness to express opinions in virtual communities
    • Department of Business Administration /103/ Doctor
    • Author: Ai-yun Hsieh Advisor: Pin Luarn
    • This study extended a traditional communication theory, spiral of silence, to explore the effects o…
    • Clicks: 229Downloads: 10
    • Full text public date 2015/11/10 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)