Showing 1 - 20 results of 28 for search 'NETWORK SECURITY', query time: 0.90s Refine Results
  1. 1
    by Chen-Kai Cheng, 鄭丞凱
    Published 2013
    ...碩士 === 國立中山大學 === 資訊工程學系研究所 === 101 === In traditional TCP/IP network architecture, computer...
    Get full text
    Others
  2. 2
  3. 3
    by Yu-Kai Huang, 黃裕凱
    Published 2009
    ... technology, desktop or mobile devices may be equipped with wired and wireless network interfaces. Hence...
    Get full text
    Others
  4. 4
    by Chun-liang Chang, 張群良
    Published 2006
    ...碩士 === 國立中山大學 === 資訊工程學系研究所 === 94 === Due to the mature of networks and communication technologies...
    Get full text
    Others
  5. 5
    by Chun-I Fan, Pei-Hsiu Ho, Yi-Feng Tseng
    Published 2014-01-01
    ...We propose a strongly secure certificateless signature scheme supporting batch verification, which...
    Get full text
    Article
  6. 6
    by Vincent Shi-Ming, 黃士銘
    Published 2010
    ... of security threats in the mobile networks, and thus we need an anonymous mutual authentication and key...
    Get full text
    Others
  7. 7
    by Ruei-Hau Hsu, 徐瑞壕
    Published 2012
    ... for forward secrecy and anonymity in the standards of mobile networks, such as GSM, UMTS, and LTE, without...
    Get full text
    Others
  8. 8
    by Pei-hsiu Ho, 何佩修
    Published 2011
    ... security mechanisms for mobile communications have been introduced in the literature. Among...
    Get full text
    Others
  9. 9
    by Chun-Hao Tseng, 曾俊豪
    Published 2008
    ...碩士 === 國立中山大學 === 資訊工程學系研究所 === 96 === Abstract Vehicular Ad Hoc Networks (VANET) can provide...
    Get full text
    Others
  10. 10
    by Shih-fen Chen, 陳世芬
    Published 2015
    ... scheme used in OSN platforms, our scheme achieve shorter ciphertext length. The semantic security...
    Get full text
    Others
  11. 11
    by Chen Hsi Cheng, 鄭晨希
    Published 2018
    ... scheme enhance the security but also it just has some extra costs for signature generation...
    Get full text
    Others
  12. 12
    by Yan-Fu Cho, 卓彥甫
    Published 2014
    ... has been proposed, known as the Named Data Network. The Named Data Network (NDN) is an alternative...
    Get full text
    Others
  13. 13
    by Chia-Chen Hsieh, 謝佳臻
    Published 2018
    ... the traditional networking. However, the new architecture leads to additional security issues. One of the security...
    Get full text
    Others
  14. 14
    by Chen-Ming Yu, 余振銘
    Published 2010
    ...碩士 === 國立中山大學 === 資訊工程學系研究所 === 98 === Wireless networks are becoming more and more popular...
    Get full text
    Others
  15. 15
    by Shi-Ming Huang, 黃士銘
    Published 2006
    ... network environments. However, just as the cases in wireline environments, there are a lot of security...
    Get full text
    Others
  16. 16
    by Yen-hung Cheng, 鄭彥鴻
    Published 2009
    ...碩士 === 國立中山大學 === 資訊工程學系研究所 === 97 === In recent years, the development of mobile networks...
    Get full text
    Others
  17. 17
  18. 18
    by Chun-I Fan, Yi-Hui Lin, Tuan-Hung Hsu, Ruei-Hau Hsu
    Published 2014-01-01
    ... environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard...
    Get full text
    Article
  19. 19
    by Hsin-Yu Chen, 陳信佑
    Published 2005
    ...-in-the-middle attacks and the replay attacks, are seriously threatening the security of the mobile networks...
    Get full text
    Others
  20. 20
    by Min-Zhe Zhong, 鍾旻哲
    Published 2014
    ... to build such a high-performance mobile communication network with robust security, many technical...
    Get full text
    Others