Showing 1 - 20 results of 34 for search 'NETWORK SECURITY', query time: 0.67s Refine Results
  1. 1
  2. 2
    by Shun-Chieh Chang, 張順傑
    Published 2004
    ...碩士 === 國立成功大學 === 電機工程學系碩博士班 === 92 ===   Mobile Ad hoc Networks (MANET) have caught more...
    Get full text
    Others
  3. 3
    by Cheng-Yu Chuang, 莊政諭
    Published 2009
    ...碩士 === 國立成功大學 === 電腦與通信工程研究所 === 97 === In the realm of network security, system administrators...
    Get full text
    Others
  4. 4
    by Jr-Ming Hou, 侯智明
    Published 2005
    ... to the difference of the secure design between Ad Hoc networks and wired networks. Moreover, the routing path in Ad...
    Get full text
    Others
  5. 5
    by Jing-Hung Chen, 陳勁宏
    Published 2005
    ... problems in considering with security. As to wire network, the router and the terminals are separated...
    Get full text
    Others
  6. 6
    by Chin-Wei Chang, 張勁為
    Published 2007
    ... become more noticeable. Therefore, the network security devices become the essential devices when...
    Get full text
    Others
  7. 7
    by Shih-Hsien Tseng, 曾釋賢
    Published 2008
    ... of network security occur. It is necessary to establish a dedicated testbed to support its related research...
    Get full text
    Others
  8. 8
    by Li-Da Chen, 陳立達
    Published 2008
    ... of network security problems has become more severely; as a result, it is necessary to establish a dedicated...
    Get full text
    Others
  9. 9
  10. 10
    by Ying-Laing Chen, 陳盈良
    Published 2004
    ... transmission no matter over traditional telephone networks of computer networks. A secure voice system...
    Get full text
    Others
  11. 11
    by Lien-Yuan Ting, 丁廉原
    Published 2003
    ... efforts to widen the network security market. Unfortunately, this market is not able to increase...
    Get full text
    Others
  12. 12
    by Chun Wang, 王淳
    Published 2008
    ... benefits. The NCKU CNS Lab (Cryptology and Network Security Laboratory) has begun developing Taiwan’s...
    Get full text
    Others
  13. 13
    by Chung-Long Chang, 章中龍
    Published 2000
    ... transmission no matter over traditional telephone networks or computer networks. A secure voice system...
    Get full text
    Others
  14. 14
    by Chih-Hsien Chang, 張志賢
    Published 1994
    ...碩士 === 國立成功大學 === 電機工程研究所 === 82 === To make use of the telephone network (bandwidth...
    Get full text
    Others
  15. 15
    by Chen-Chung Chang, 張振忠
    Published 2007
    ... years, Distributed Sensor Networks (DSNs) become a new developing type of wireless networks, which bring...
    Get full text
    Others
  16. 16
    by You-Luen Cheng, 鄭有倫
    Published 2000
    ... to achieve the computer and network security. These mechanisms for examples are the cryptography algorithms...
    Get full text
    Others
  17. 17
    by Yi-Lang Tsai, 蔡一郎
    Published 2008
    ... are complicated, distributed and hierarchy. In order to protect secure network from unauthorized access...
    Get full text
    Others
  18. 18
    by Shang-Ming Jen, 任上鳴
    Published 2007
    ... communication system without infrastructure. However, there are serious security issues in this kind of network...
    Get full text
    Others
  19. 19
    by Wei-Yu Chen, 陳威宇
    Published 2006
    ... these threats, network security devices, such as intrusion detection systems (IDSs), firewalls, and antivirus...
    Get full text
    Others
  20. 20
    by Su-Yi Chen, 陳書宜
    Published 2000
    ... an enormous business opportunities. Two transfers are required to purchase goods over a network...
    Get full text
    Others