Showing 1 - 20 results of 32 for search 'NETWORK SECURITY', query time: 1.29s Refine Results
  1. 1
    by Chi-Yien Chung, 鍾季穎
    Published 2002
    ..., easily at home. However, there are a lot of security and privacy issues arise while enjoying...
    Get full text
    Others
  2. 2
    by Chia-Chi Wu, 吳家麒
    Published 2011
    ... and mobile networks. Both Internet and mobile networks are public; the transactions security and information...
    Get full text
    Others
  3. 3
    by Chin-Yu Sun, 孫勤昱
    Published 2013
    ..., the traditional applications of wired networks have been transmitted to wireless networks. A part of research...
    Get full text
    Others
  4. 4
    by Jung-San Lee, 李榮三
    Published 2008
    ...) Secure communications for ad hoc networks, (3) Electronic commerce, and (4) Oblivious transfer protocol...
    Get full text
    Others
  5. 5
    by Kuo-Feng Hwang, 黃國峰
    Published 2002
    ... of global mobility network. This protocol is based on the concept of distributed security management, i.e...
    Get full text
    Others
  6. 6
    by Yi-Fang Cheng, 鄭宜芳
    Published 2006
    ... the diversification of network services is not impractical. Generally, providing secure network services needs two...
    Get full text
    Others
  7. 7
    by Yu-Ching Wu, 吳育慶
    Published 2009
    ..., for secure communications in the vehicular ad hoc networks (VANET), Li et al. proposed a secure model...
    Get full text
    Others
  8. 8
    by Ting-Fang Cheng, 鄭婷方
    Published 2007
    .... The security of the proposed scheme is based on the public one-way hash function. Furthermore, the novel...
    Get full text
    Others
  9. 9
    by Hai-Duong Le, 黎海洋
    Published 2015
    ...博士 === 逢甲大學 === 資訊工程學系 === 103 === Network security is an essential building block for all...
    Get full text
    Others
  10. 10
    by Pen-Yi Chang, 張本毅
    Published 2006
    ... network more suitable in practical use, researchers have to develop an efficient method to ensure secure...
    Get full text
    Others
  11. 11
    by Yen-Chang Chiu, 邱彥璋
    Published 2007
    ... and confidentiality. Authentication is the most important issue to solve the security of networks. The authentication...
    Get full text
    Others
  12. 12
    by Shis-Yi Lin, 林詩怡
    Published 2007
    ...碩士 === 國立中正大學 === 資訊工程所 === 95 === Over the insecure network environment, key agreement...
    Get full text
    Others
  13. 13
    by Chia-Chun Lin, 林家淳
    Published 2013
    ...碩士 === 國立中正大學 === 資訊工程研究所 === 100 === In recent years, with the rapid development of network...
    Get full text
    Others
  14. 14
    by Cting-Te Wang, 王清德
    Published 2000
    ...博士 === 國立中正大學 === 資訊工程研究所 === 88 === Due to the rapid evolution of computer networks...
    Get full text
    Others
  15. 15
    by Li-Jen Liu, 劉立仁
    Published 2008
    ...碩士 === 國立中正大學 === 資訊工程所 === 96 === The communications through computer network are popular recently...
    Get full text
    Others
  16. 16
    by Wen-Chuan Wu, 吳汶涓
    Published 2003
    ... on the network, such as the image management and security. This thesis aims mainly at these two issues...
    Get full text
    Others
  17. 17
    by Huang-ching Lin, 林煌景
    Published 2010
    ...碩士 === 逢甲大學 === 資訊工程所 === 98 === Abstract Data hiding is a topic in network security. In order...
    Get full text
    Others
  18. 18
    by Yi-Ren Wang, 王怡人
    Published 2008
    ...碩士 === 國立中正大學 === 資訊工程所 === 96 === Recently, due to the rapid development of network techniques...
    Get full text
    Others
  19. 19
    by Chang-Chu Chen, 陳昌助
    Published 2010
    ... the environment of the Internet is insecure, covert communication via the network has become an important research...
    Get full text
    Others
  20. 20
    by Chia-Te Liao, 廖家德
    Published 2003
    ... duplicated and accessed with security is highlighted and becoming a critical issue in the networked digital...
    Get full text
    Others