Showing 1 - 20 results of 31 for search 'NETWORK SECURITY', query time: 1.66s Refine Results
  1. 1
    by Chien-Hao Ho, 何健豪
    Published 2003
    ... for the mobile agent based networks. As far as mobile agent security is concerned, we devise a new...
    Get full text
    Others
  2. 2
    by Che Wei Lee, 李哲維
    Published 2007
    ... to face the variance in the former information security risk. When the network administrator carries...
    Get full text
    Others
  3. 3
    by Haw-Tyng Pai, 白浩廷
    Published 2007
    ...碩士 === 大葉大學 === 資訊管理學系碩士班 === 95 === Mobile ad hoc networks (MANETs) are a collection of wireless...
    Get full text
    Others
  4. 4
    by Ming-Lung Tsai, 蔡明隆
    Published 2008
    ... security. In such a way, it provides useful suggestions for network managers. ...
    Get full text
    Others
  5. 5
    by Yen-Harn Liu, 劉彥含
    Published 2002
    ... that the transmission of packets in mobile virtual private networks can be more secure. Also, we can develop further a...
    Get full text
    Others
  6. 6
  7. 7
    by TSUNG-HENG CHENG, 鄭宗恆
    Published 2008
    ... 802.11x wireless local area networks (WLAN) such that organizational security can be ensured. Campus...
    Get full text
    Others
  8. 8
    by Chia-Cheng Chang, 張家証
    Published 2010
    ..., with emerging network security issues, the aforementioned access control mechanism is inadequate. Therefore...
    Get full text
    Others
  9. 9
    by Hui-Mei Lai, 賴惠美
    Published 2005
    ... the members of community look-after network condense the common consensus, and achieve purpose of sharing...
    Get full text
    Others
  10. 10
    by Tsung-Pao Chen, 陳宗保
    Published 2001
    ... on the Internet employ the certificate-based public key cryptosystem to solve their related security issues...
    Get full text
    Others
  11. 11
    by Bo-Yuan Cheng, 鄭博元
    Published 2009
    ... and more serious networks security problems, the existing access control mechanisms are insufficient...
    Get full text
    Others
  12. 12
    by Yi-Chin Lin, 林宜進
    Published 2005
    ... networked information resources by employing a variety of limited rules and security policy. Therefore...
    Get full text
    Others
  13. 13
    by Bang-Jheng Liu, 劉邦正
    Published 2008
    ...碩士 === 大葉大學 === 資訊管理學系碩士班 === 96 === In recent years, wireless ad hoc networks is an increasingly...
    Get full text
    Others
  14. 14
    by Min-Kai Hsu, 徐敏凱
    Published 2013
    ... and communication face information security and confidentiality issues with comprehensive networks, including...
    Get full text
    Others
  15. 15
    by Chang-Li Wang, 王常力
    Published 2010
    ... the security of network communications in vehicular ad hoc network. To do so, we use the password-based...
    Get full text
    Others
  16. 16
    by Chun-Jen Yu, 游純仁
    Published 2005
    ... of a architecture of secure filter, and further develop a hierarchical cluster networks dynamic key...
    Get full text
    Others
  17. 17
    by Chao-Yung Lu, 呂昭勇
    Published 2008
    ...碩士 === 大葉大學 === 資訊管理學系碩士班 === 96 === Mobile ad hoc networks have many unstable characteristics...
    Get full text
    Others
  18. 18
    by Nan-Hsiang Huang, 黃南翔
    Published 2009
    ... the requirement to provide group access control in mobile ad hoc networks (MANETs). Due to the dynamic membership...
    Get full text
    Others
  19. 19
    by Pei-Ling Hsieh, 謝佩玲
    Published 2015
    ... security issues are mostly related to the popularity and the convenience of networks. In order to reduce...
    Get full text
    Others
  20. 20
    by HUANG, JEN-RONG, 黃貞容
    Published 2017
    ..., it is very important and urgent to protect and strengthen the network security of campus information systems...
    Get full text
    Others