Basic Search / Search Result

  • Search Result: 11results Search Strategy: "Yuan-Cheng Lai".ecommittee (Phrase) and edept.raw="Department of Information Management" and ekeyword.raw="Security"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    On design of a Secure RFID-based e-Health System for Outpatient Clinic Process and Emergency Care Process

    2

    Hash-based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks

    3

    A Secure Mutual Authentication Protocol for Low-cost RFID System

    4

    A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations

    5

    Security Threats and Their Defensive Methods for Wearable Devices

    6

    Cybersecurity Threats and Countermeasures in VANETs

    7

    Secure and Anonymous Distributed Location Service for Mobile Ad Hoc Networks

    8

    Simulation Implementation and Performance Evaluation on HASR Protocol

    9

    Security Analysis for RFID Authentication Protocols with Key Redundancy Mechanism on De-synchronization Attack

    10

    The Strategies of the Management and Development for the Security Service Firms
    • Department of Information Management /95/ Master
    • Author: chin-ping chao Advisor: Tzong-Chen wu
    • The security service firms have been developing in Taiwan for 28 years. Due to the change of social…
    • Clicks: 251Downloads: 0
    • Full text public date 2010/01/26 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)