Basic Search / Search Result

  • Search Result: 10results Search Strategy: "鄭博仁".cadvisor (Phrase)


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    The Study of RFID Anti-Counterfeiting Mechanism

    2

    Anti-collision with Anti-Counterfeiting Enhancement for Active RFID Technologies
    • Department of Electrical Engineering /97/ Master
    • Author: Te-En Wei Advisor:
    • In the recent year, Radio Frequency Identification (RFID) system has been widely used in many diffe…
    • Clicks: 474Downloads: 4

    3

    Protecting Low Cost RFID Privacy and Security with A Generic Key Agreement Protocol Based on Binary tree
    • Department of Electrical Engineering /95/ Master
    • Author: Sheng-Hui Chen Advisor:
    • There are many protocols proposed for protecting Radio Frequency Identification (RFID) system priva…
    • Clicks: 264Downloads: 3

    4

    Enhancing the security of out-of-band one-time password two factor authentication in cloud computing
    • Department of Electrical Engineering /99/ Master
    • Author: Szu-yu Lin Advisor:
    • For the sake of our advanced technology, Internet has been used as our un-replaced articles for our…
    • Clicks: 317Downloads: 5

    5

    LARBAC: Enforcement of Location Constraints for Location-Aware RBAC System in Mobile Environment

    6

    DDIM-CAPTCHA: A Novel Drag-n-Drop Interactive Masking CAPTCHA Designed for Third Party Human Attacks

    7

    A Novel Image Recognition CAPTCHA Applicable to Cloud Computing Authentication
    • Department of Electrical Engineering /99/ Master
    • Author: Chien-Chen Tseng Advisor:
    • This paper discusses identity management, access control and authentication technology, which is ap…
    • Clicks: 401Downloads: 7

    8

    SVD-based Image Hashing Optimization via Genetic Algorithm Technique
    • Department of Electrical Engineering /98/ Master
    • Author: Hong-Jhe Li Advisor:
    • A perceptual image hashing maps an image to a short binary string based on an image's appearance to…
    • Clicks: 353Downloads: 0
    • Full text public date 2013/07/27 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date 2013/07/27 (National library)

    9

    A Combined Low Cost RFID Tag Collision Resolution Protocol with Authentication
    • Department of Electrical Engineering /96/ Master
    • Author: Huang-Kuan Ho Advisor:
    • Radio Frequency Identification (RFID) system has been widely used in many different areas. Its main…
    • Clicks: 345Downloads: 6

    10

    Automatic Analysis and Detection of JavaScript Malware
    1