Basic Search / Search Result

  • Search Result: 17results Search Strategy: "Graduate Institute of Management".edept (Phrase) and ekeyword.raw="Authentication" and ekeyword.raw="Authentication"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Certificateless authenticated key exchange protocol for Internet of Things
    • Department of Information Management /107/ Master
    • Author: Chia-Rong Hsieh Advisor: Tzong-Chen Wu
    • The Internet of Things (IoT) integrates various devices to communicate and enables interoperabili…
    • Clicks: 425Downloads: 0
    • Full text public date 2024/07/17 (Intranet public)
    • Full text public date 2029/07/17 (Internet public)
    • Full text public date 2029/07/17 (National library)

    2

    A Secure IoT Firmware Update Mechanism based on MQTT Protocol

    3

    Indoor Location-Based Authentication for Mobile Payment POS with BLE Technology

    4

    On Design and Implementation a Gateway to Access Gateway Connected BLE Devices with CoAP
    • Department of Information Management /104/ Master
    • Author: Chen-Fang Wang Advisor: Shi-Cho Cha
    • As Bluetooth Low Energy (BLE) has become a de-facto standard for Internet of Things (IoT) devices, …
    • Clicks: 265Downloads: 3
    • Full text public date 2018/08/22 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    An Authentication and Authorization Mechanism for Long-term Electronic Health Records Management

    6

    On the Design and Implementation of a Mechanism for Customers to Evaluate Trustworthy of Mobile Services
    • Department of Information Management /102/ Master
    • Author: Shih-Chieh Huang Advisor: Shi-Cho Cha
    • As advances of mobile technologies, government agencies are willing and able to request employees t…
    • Clicks: 248Downloads: 0
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    7

    A Copy-protected Software Authentication Mechanism for Smart Phone and Pad
    • Department of Information Management /100/ Master
    • Author: Lien-chen Chiang Advisor: Shi-cho Cha
    • Because of the popularity of smart phones and tablets, a huge number of mobile applications are eme…
    • Clicks: 263Downloads: 1
    • Full text public date 2017/07/27 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    8

    Certificateless ECC-based Authentication Protocol for Internet of Vehicles
    • Department of Information Management /111/ Master
    • Author: Yi-Chun Hung Advisor: Nai-Wei Lo
    • The progress and extensive adoption of wireless communication technologies have led to significant …
    • Clicks: 343Downloads: 8
    • Full text public date 2025/07/20 (Internet public)
    • Full text public date 2025/07/20 (National library)

    9

    Over-the-Air(OTA) Firmware Update Protocol for Electronic Control Unit in Intra-vehicular Networks

    10

    Location-based Authentication Protocols for Mobile User Environments