-
1“..., easily at home. However, there are a lot of security and privacy issues arise while enjoying...”
Get full text
Others -
2“... and mobile networks. Both Internet and mobile networks are public; the transactions security and information...”
Get full text
Others -
3“..., the traditional applications of wired networks have been transmitted to wireless networks. A part of research...”
Get full text
Others -
4“...) Secure communications for ad hoc networks, (3) Electronic commerce, and (4) Oblivious transfer protocol...”
Get full text
Others -
5“... of global mobility network. This protocol is based on the concept of distributed security management, i.e...”
Get full text
Others -
6“... the diversification of network services is not impractical. Generally, providing secure network services needs two...”
Get full text
Others -
7“..., for secure communications in the vehicular ad hoc networks (VANET), Li et al. proposed a secure model...”
Get full text
Others -
8“.... The security of the proposed scheme is based on the public one-way hash function. Furthermore, the novel...”
Get full text
Others -
9“...博士 === 逢甲大學 === 資訊工程學系 === 103 === Network security is an essential building block for all...”
Get full text
Others -
10“... network more suitable in practical use, researchers have to develop an efficient method to ensure secure...”
Get full text
Others -
11“... and confidentiality. Authentication is the most important issue to solve the security of networks. The authentication...”
Get full text
Others -
12“...碩士 === 國立中正大學 === 資訊工程所 === 95 === Over the insecure network environment, key agreement...”
Get full text
Others -
13“...碩士 === 國立中正大學 === 資訊工程研究所 === 100 === In recent years, with the rapid development of network...”
Get full text
Others -
14“...博士 === 國立中正大學 === 資訊工程研究所 === 88 === Due to the rapid evolution of computer networks...”
Get full text
Others -
15“...碩士 === 國立中正大學 === 資訊工程所 === 96 === The communications through computer network are popular recently...”
Get full text
Others -
16“... on the network, such as the image management and security. This thesis aims mainly at these two issues...”
Get full text
Others -
17“...碩士 === 逢甲大學 === 資訊工程所 === 98 === Abstract Data hiding is a topic in network security. In order...”
Get full text
Others -
18“...碩士 === 國立中正大學 === 資訊工程所 === 96 === Recently, due to the rapid development of network techniques...”
Get full text
Others -
19“... the environment of the Internet is insecure, covert communication via the network has become an important research...”
Get full text
Others -
20“... duplicated and accessed with security is highlighted and becoming a critical issue in the networked digital...”
Get full text
Others