-
1
-
2“...碩士 === 國立成功大學 === 電機工程學系碩博士班 === 92 === Mobile Ad hoc Networks (MANET) have caught more...”
Get full text
Others -
3“...碩士 === 國立成功大學 === 電腦與通信工程研究所 === 97 === In the realm of network security, system administrators...”
Get full text
Others -
4“... to the difference of the secure design between Ad Hoc networks and wired networks. Moreover, the routing path in Ad...”
Get full text
Others -
5“... problems in considering with security. As to wire network, the router and the terminals are separated...”
Get full text
Others -
6“... become more noticeable. Therefore, the network security devices become the essential devices when...”
Get full text
Others -
7“... of network security occur. It is necessary to establish a dedicated testbed to support its related research...”
Get full text
Others -
8“... of network security problems has become more severely; as a result, it is necessary to establish a dedicated...”
Get full text
Others -
9
-
10“... transmission no matter over traditional telephone networks of computer networks. A secure voice system...”
Get full text
Others -
11“... efforts to widen the network security market. Unfortunately, this market is not able to increase...”
Get full text
Others -
12“... benefits. The NCKU CNS Lab (Cryptology and Network Security Laboratory) has begun developing Taiwan’s...”
Get full text
Others -
13“... transmission no matter over traditional telephone networks or computer networks. A secure voice system...”
Get full text
Others -
14“...碩士 === 國立成功大學 === 電機工程研究所 === 82 === To make use of the telephone network (bandwidth...”
Get full text
Others -
15“... years, Distributed Sensor Networks (DSNs) become a new developing type of wireless networks, which bring...”
Get full text
Others -
16“... to achieve the computer and network security. These mechanisms for examples are the cryptography algorithms...”
Get full text
Others -
17“... are complicated, distributed and hierarchy. In order to protect secure network from unauthorized access...”
Get full text
Others -
18“... communication system without infrastructure. However, there are serious security issues in this kind of network...”
Get full text
Others -
19“... these threats, network security devices, such as intrusion detection systems (IDSs), firewalls, and antivirus...”
Get full text
Others -
20“... an enormous business opportunities. Two transfers are required to purchase goods over a network...”
Get full text
Others