-
1“...碩士 === 國立中山大學 === 資訊工程學系研究所 === 101 === In traditional TCP/IP network architecture, computer...”
Get full text
Others -
2
-
3“... technology, desktop or mobile devices may be equipped with wired and wireless network interfaces. Hence...”
Get full text
Others -
4“...碩士 === 國立中山大學 === 資訊工程學系研究所 === 94 === Due to the mature of networks and communication technologies...”
Get full text
Others -
5“...We propose a strongly secure certificateless signature scheme supporting batch verification, which...”
Get full text
Article -
6“... of security threats in the mobile networks, and thus we need an anonymous mutual authentication and key...”
Get full text
Others -
7“... for forward secrecy and anonymity in the standards of mobile networks, such as GSM, UMTS, and LTE, without...”
Get full text
Others -
8“... security mechanisms for mobile communications have been introduced in the literature. Among...”
Get full text
Others -
9“...碩士 === 國立中山大學 === 資訊工程學系研究所 === 96 === Abstract Vehicular Ad Hoc Networks (VANET) can provide...”
Get full text
Others -
10“... scheme used in OSN platforms, our scheme achieve shorter ciphertext length. The semantic security...”
Get full text
Others -
11“... scheme enhance the security but also it just has some extra costs for signature generation...”
Get full text
Others -
12“... has been proposed, known as the Named Data Network. The Named Data Network (NDN) is an alternative...”
Get full text
Others -
13“... the traditional networking. However, the new architecture leads to additional security issues. One of the security...”
Get full text
Others -
14“...碩士 === 國立中山大學 === 資訊工程學系研究所 === 98 === Wireless networks are becoming more and more popular...”
Get full text
Others -
15“... network environments. However, just as the cases in wireline environments, there are a lot of security...”
Get full text
Others -
16“...碩士 === 國立中山大學 === 資訊工程學系研究所 === 97 === In recent years, the development of mobile networks...”
Get full text
Others -
17
-
18“... environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard...”
Get full text
Article -
19“...-in-the-middle attacks and the replay attacks, are seriously threatening the security of the mobile networks...”
Get full text
Others -
20“... to build such a high-performance mobile communication network with robust security, many technical...”
Get full text
Others