Showing
1 - 12
results of
12
for search '
Jenshiuh Liu
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Jenshiuh Liu
Showing
1 - 12
results of
12
for search '
Jenshiuh Liu
'
, query time: 0.06s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
From OVAL’s CVE To Nessus Scripts- From CVE To Vulnerability Characteristics
by
Yuan-Yan Lin
,
林元衍
Published 2005
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
2
A Study of Linear Spaced Parallel Dynamic Programming for Sequence Alignments
by
Jia-Hong Chen
,
陳佳宏
Published 2005
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
3
A Study of Parallel Multiple Sequence Alignments
by
Ming-Gang Xie
,
謝明剛
Published 2005
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
4
Identity-based multi-proxy threshold signature scheme
by
Shao-nung Huang
,
黃劭農
Published 2007
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
5
JPDCE:A Java Parallel Distributed Computing Environment
by
Chung-Ya Liao
,
廖中衙
Published 2000
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
6
Data Hiding in MP3 File
by
Fong-ming Liu
,
劉豐銘
Published 2011
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
7
Simple Operations for Countermeasures of Steganlysis
by
Pang-Chun Sung
,
宋邦俊
Published 2011
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
8
Steganographic Research on Commonly-Used Document - Microsoft Word Document File
by
Feng-chih Hsu
,
許峰誌
Published 2008
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
9
Data Hiding in H.264 Video
by
Teik-Beng Ang
,
洪德民
Published 2012
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
10
From OVAL''s CVE To Nessus Scripts- From CVE To Vulnerability Characteristics
by
Yuan-Yan Lin
,
林元衍
Published 2005
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
11
A Steganographic Method on MP3
by
Yuchin Lin
,
林裕欽
Published 2007
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
12
Embedded Real-Time Subtitling on AAC with Information Hiding Technology
by
Jiun-An Wu
,
巫郡諳
Published 2010
Other Authors:
“
...
Jenshiuh
Liu
...
”
Get full text
Others
Search Tools:
Get RSS Feed
—
Email this Search
Loading...