Showing 1 - 20 results of 31 for search 'NETWORK SECURITY', query time: 1.36s Refine Results
  1. 1
    by PI-CHOU TSAI, 蔡璧舟
    Published 2019
    ... of network security is much higher and the integration of various network security appliances has become one...
    Get full text
    Others
  2. 2
    by Kuo-Yang Wu, 吳國揚
    Published 2017
    ... for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity...
    Get full text
    Others
  3. 3
    ...-signcryption schemes based on Elliptic Curve Bilinear Pairing to secure wireless sensor network, then evaluate...
    Get full text
    Others
  4. 4
    by WU MEI SIA, 吳美霞
    Published 2008
    ...碩士 === 國立臺灣科技大學 === 管理研究所 === 96 === Since the risks of various kinds of information security...
    Get full text
    Others
  5. 5
    by Su-Chen Li, 李素貞
    Published 2007
    ...碩士 === 國立臺灣科技大學 === 資訊管理系 === 95 === Nowadays the events concerning global security are emerging...
    Get full text
    Others
  6. 6
    by Jejong Shiau, 蕭節中
    Published 2006
    ... mobile phone or other mobile devices such as PDA, notebook. So, how to construct the secure and steady...
    Get full text
    Others
  7. 7
    by Chien-Chang Wang, 王建常
    Published 2019
    ... platform to network management and information security related applications. It is expected to provide a...
    Get full text
    Others
  8. 8
    by Kou-Hui Yeh, Nai-Wei Lo, Tzong-Chen Wu, Chieh Wang
    Published 2013-12-01
    ...International Journal of Distributed Sensor Networks...
    Get full text
    Article
  9. 9
    by Wang-Chen Lin, 林旺嶒
    Published 2019
    ... that internal network address resources be managed effectively in the financial industry's business areas...
    Get full text
    Others
  10. 10
    by Togu Turnip, 唐天凱
    Published 2016
    ..., the secure and reliable group communication increases popularity in mobile networks. For securing group...
    Get full text
    Others
  11. 11
    by Chung-Fu Lu, 呂崇富
    Published 2011
    ... are more secure and efficient than previously proposed schemes for general wireless networks. In order...
    Get full text
    Others
  12. 12
    by Hsiao-Yung Chen, 陳孝勇
    Published 2008
    ...碩士 === 國立臺灣科技大學 === 資訊管理系 === 96 === In wireless sensor networks, the secure key management issue...
    Get full text
    Others
  13. 13
    by Chung-Chih Yeh, 葉崇志
    Published 2014
    ... about security and management. This paper proposes a network access control system design based...
    Get full text
    Others
  14. 14
    by Jian-Guang Lin, 林建光
    Published 2008
    ... popular, and how to design a secure and efficient routing protocol for ad hoc networks is an important...
    Get full text
    Others
  15. 15
    by Meng-chieh Tsai, 蔡孟潔
    Published 2012
    ... protection and security problems in an open communication network have become an important issue. However...
    Get full text
    Others
  16. 16
    by Hsin-Tien Tseng, 曾信田
    Published 2012
    ... critical issues for everyone. In order to secure network environment, computer security auditing is usually...
    Get full text
    Others
  17. 17
    by Jia-Lun Tsai, 蔡佳倫
    Published 2013
    ... mechanisms to secure systems in a network or Internet, which may identify service-requesting users and avoid...
    Get full text
    Others
  18. 18
    by Hao-Yu Yu, 余浩宇
    Published 2014
    .... Recently, due to the dynamic nature and vulnerable-to-attack structure of mobility networks, some secure...
    Get full text
    Others
  19. 19
    by Chin_I Lee, 李靜怡
    Published 2009
    .../revoking several sensor nodes in the deployed network if necessary; (iii) the proposed scheme is secure...
    Get full text
    Others
  20. 20
    by Liang-Peng Chang, 張良鵬
    Published 2010
    ..., the security and privacy preservation for communication on the open network has become an increasing concern...
    Get full text
    Others