-
1“... of network security is much higher and the integration of various network security appliances has become one...”
Get full text
Others -
2“... for roaming service in global mobility networks, in which the foreign agent cannot obtain the identity...”
Get full text
Others -
3“...-signcryption schemes based on Elliptic Curve Bilinear Pairing to secure wireless sensor network, then evaluate...”
Get full text
Others -
4“...碩士 === 國立臺灣科技大學 === 管理研究所 === 96 === Since the risks of various kinds of information security...”
Get full text
Others -
5“...碩士 === 國立臺灣科技大學 === 資訊管理系 === 95 === Nowadays the events concerning global security are emerging...”
Get full text
Others -
6“... mobile phone or other mobile devices such as PDA, notebook. So, how to construct the secure and steady...”
Get full text
Others -
7“... platform to network management and information security related applications. It is expected to provide a...”
Get full text
Others -
8
-
9“... that internal network address resources be managed effectively in the financial industry's business areas...”
Get full text
Others -
10“..., the secure and reliable group communication increases popularity in mobile networks. For securing group...”
Get full text
Others -
11“... are more secure and efficient than previously proposed schemes for general wireless networks. In order...”
Get full text
Others -
12“...碩士 === 國立臺灣科技大學 === 資訊管理系 === 96 === In wireless sensor networks, the secure key management issue...”
Get full text
Others -
13“... about security and management. This paper proposes a network access control system design based...”
Get full text
Others -
14“... popular, and how to design a secure and efficient routing protocol for ad hoc networks is an important...”
Get full text
Others -
15“... protection and security problems in an open communication network have become an important issue. However...”
Get full text
Others -
16“... critical issues for everyone. In order to secure network environment, computer security auditing is usually...”
Get full text
Others -
17“... mechanisms to secure systems in a network or Internet, which may identify service-requesting users and avoid...”
Get full text
Others -
18“.... Recently, due to the dynamic nature and vulnerable-to-attack structure of mobility networks, some secure...”
Get full text
Others -
19“.../revoking several sensor nodes in the deployed network if necessary; (iii) the proposed scheme is secure...”
Get full text
Others -
20“..., the security and privacy preservation for communication on the open network has become an increasing concern...”
Get full text
Others