Basic Search / Search Result

  • Search Result: 15results Search Strategy: "Yuan-Cheng Lai".ecommittee (Phrase) and ekeyword.raw="Privacy"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    An Factorial Study of Innovation Resistance for Wearable Device Customers
    • Department of Business Administration /104/ Master
    • Author: Chien-Hui Sun Advisor: Pin Luarn
    • In the age of advanced technology, various products which combined with new technology and Internet…
    • Clicks: 488Downloads: 0
    • Full text public date 2021/06/15 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    2

    Protecting Low Cost RFID Privacy and Security with A Generic Key Agreement Protocol Based on Binary tree

    3

    On design of a Secure RFID-based e-Health System for Outpatient Clinic Process and Emergency Care Process

    4

    A Guideline to Establish RFID Applications Privacy Policies Considering Openness and Enforcement
    • Department of Information Management /98/ Master
    • Author: Jen-Ting Ku Advisor: Shi-Cho Cha
    • As advances of RFID technologies, privacy and personal data security of RFID applications is brough…
    • Clicks: 506Downloads: 0
    • Full text public date 2012/07/21 (Intranet public)
    • Full text public date This full text is not authorized to be published. (Internet public)
    • Full text public date This full text is not authorized to be published. (National library)

    5

    A Secure Mutual Authentication Protocol for Low-cost RFID System

    6

    A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations

    7

    Crossing the Boundless Retail: Examining Consumer Engagement from the Perspective of Omnichannel Integration Quality and Flow Experience

    8

    Wildmatch: A Privacy-focused Traffic Inspection in Outsourced Middlebox

    9

    Cybersecurity Threats and Countermeasures in VANETs

    10

    An RFID Authentication Protocol for EPC Class 1 Generation 2 Standard