Your browser does not support Javascript. Some functions will be missing.
:::
Home
|
GO TKU
|
Print
|
Site Map
|
正體中文
|
Login
|
College of Engineering, Tamkang University
:::
Basic Data
Journal paper summary ( Click )
Journal paper summary
Entry Year
Publication
Author
103
2014,Peer-to-Peer Networking and Applications 7(4), pp.655-664,
103
2014,The Computer Journal 57(10), pp.1557-1569,
102
2013,The Journal of Supercomputing 66(2), pp.888-906,
102
2013,Journal of Convergence Information Technology 8(3), pp.837-844,
101
2012,IEICE Transactions on Communications E95.B(9), 頁2718-2727,
101
2012,Applied Mechanics and Materials 182-183, pp.2075-2079,
100
2011,網際網路技術學刊=Journal of Internet Technology 12(2),頁347-356,
100
2011,International Journal of Ad Hoc and Ubiquitous Computing 7(4), pp.261-271,
99
2010,International Journal of Security and Networks 5(1), pp.26-34,
99
2010,Journal of Computers 21, pp.31-36,
97
2008,WSEAS Transactions on Information Science and Applications 5(9), pp.1385-1394,
96
2007,The Computer Journal 50(5), 頁602-615,
96
2007,Wireless Personal Communications 42(2), 頁213-223,
96
2007,Communications in Mathematical Sciences 5(2), 頁383-389,
96
2007,Electronic Commerce Research and Applications 6(2), 頁184-191,
95
2006,WSEAS Transactions on Communications 5(9), pp.1800-1806,
95
2006,電腦學刊=Journal of Computers 17(1), pp.31-36,
95
2006,International Journal of Computational Science and Engineering 2(1-2), pp.37-45,
94
2005,Computer Standards and Interfaces 28(2), pp.241-252,
94
2005,淡江理工學刊=Tamkang journal of science and engineering 8(2), pp.99-108,
94
2005,Applied Mathematics and Computation 167, pp.870-880,
94
2005,International Journal of Internet Protocol Technology 1(1), pp.30-33,
93
2004,Journal of Interconnection Networks 5(3), pp.221-232,
90
2001,Optical engineering 40(3), pp.342-351,
89
2000,淡江理工學刊=Tamkang journal of science and engineering 3(2),頁97-106,
88
1999,The journal of systems and software 46(1), pp.7-11,
88
1999,Journal of Systems and Software 46(1), pp.7-11,
88
1999,Journal of information science and engineering 15(5), pp.691-699,
87
1998,Information sciences 111(1-4), pp.335-345,
87
1998,Computer communications 21(13), pp.1170-1176,
87
1998,Computer processing of oriental languages 12(2), pp.237-247,
86
1997,IEE proceedings-computers and digital techniques 144(1), pp.23-27,
82
1993,Cryptologia 17(2), pp.175-186,
81
1992,Information Systems 17(3), pp.243-247,
Seminar paper summary ( Click )
Seminar paper summary
Entry Year
Conference period
Publication
Author
108
2019/05/23
2019/05/24
2019,安全的無人管理電腦租借系統,第廿九屆全國資訊安全會議,2019/05/23-2019/05/24
106
2017/07/06
2017/07/07
2017,AN EFFICIENT AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON GEOMETRIC APPROACH,International Conference on Science, Technology, Engineering and Management,2017/07/06-2017/07/07
106
2017/03/27
2017/03/29
2017,Secure Data Collection Scheme for Wireless Sensor Networks,The 31-st IEEE International Conference on Advanced Information Networking and Applications,2017/03/27-2017/03/29
104
2015/07/22
2015/07/24
2015,The Hiding Method of Graph Structure in Cloud,The 2nd International Conference on Engineering and Natural Science,2015/07/22-2015/07/24
101
2012/11/14
2012/11/16
2012,A secure remote user authentication scheme,ICIM2012 International Conference on Innovation and Management,2012/11/14-2012/11/16
97
2008/11/13
2008/11/13
2008,Efficient Squaring Algorithm for Embedded RISC Processors,The 2008 International Computer Symposium(ICS 2008),2008/11/13
97
2008/11/13
2008/11/13
2008,Analysis and Improvement of Fair Certified E-Mail Delivery Protocol,The 2008 International Computer Symposium(ICS 2008),2008/11/13
97
2008/11/13
2008/11/13
2008,An Energy-Efficient En-Route Filtering False Data Scheme in Wireless Sensor Networks,The 2008 International Computer Symposium(ICS 2008),2008/11/13
97
2008/05/29
2008/05/30
2008,A Cell-Based Secure Routing Protocol for Wireless Sensor Networks,第十八屆資訊安全會議=The 18th Cryptology and Information Security Conference,2008/05/29-2008/05/30
97
2008/05/01
2008/05/01
2008,A Cell-Based Secure Routing Protocol for Wireless Sensor Networks,Cryptology and Information Security Conference 2008,,2008/05/01
96
2007/09/01
2007/09/01
2007,A Secure Data Dissemination for Wireless Sensor Networks,The 3rd Workshop on Wireless, Ad Hoc and Sensor Networks, Tamsui, Taiwan,2007/09/01
96
2007/09/01
2007/09/01
2007,Secure Authentication Scheme for RFID,The 3rd Workshop on Wireless, Ad Hoc and Sensor Networks,,,2007/09/01
95
2006/07/01
2006/07/01
2006,Improved key management scheme for IEEE 802.11,Proceedings of 10th WSEAS International Conference on COMPUTERS,2006/07/01
94
2005/06/13
2005/06/16
2005,Password authenticated key agreement protocol for multi-servers architecture,Wireless Networks, Communications and Mobile Computing, 2005 International Conference on,2005/06/13-2005/06/16
94
2005/03/28
2005/03/30
2005,An Efficient Decryption Method for RSA Cryptosystem,Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on,2005/03/28-2005/03/30
94
2005/03/28
2005/03/30
2005,Key Agreement Protocol Based on Weil Pairing,Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on,2005/03/28-2005/03/30
92
2003/12/01
2003/12/01
2003,Cryptanalysis of publicly verifiable authenticated encryption,全國計算機會議, 台中,2003/12/01
92
2003/10/14
2003/10/16
2003,Implementing the RSA Algorithm on the TI TMS320C55x Family,二00三年第三十七屆國際卡拉漢安全科技年會=The Institute of Electrical and Electronics Engineers:37th Annual 2003 International Carnahan Conference on Security Technology (ICCST),2003/10/14-2003/10/16
92
2003/08/01
2003/08/01
2003,Asia-Crypto,, 台北,2003/08/01
92
2003/07/01
2003/07/01
2003,Key agreement in ad hoc networks,2003 International Symposium on Parallel/Distributed Processing and Application,2003/07/01
92
2003/07/01
2003/07/01
2003,A method for sending confidential messages to a group without trusted parties,2003 International Symposium on Parallel/Distributed Processing and Application,2003/07/01
92
2003/03/01
2003/03/01
2003,An enhanced authentication key exchange protocol,Proceedings of 2003 International Conference on Advanced Information Networking and Applications, China, pp.202-205,2003/03/01
92
2003/02/01
2003/02/01
2003,Enhanced authentication key agreement protocol,Proceedings of 21th IASTED International Multi-Conference on APPLIED INFORMATICS, Austria,2003/02/01
92
2003/01/01
2003/01/01
2003,The improvement of steganography capacity,Proceedings of The 9th International conference on Multi-Media Moding, Taiwan, pp.329-342,2003/01/01
91
2002/11/01
2002/11/01
2002,Watermark in color image,Proceedings of First International Symposium Cyber Worlds: Theory and Practices,2002/11/01
91
2002/03/01
2002/03/01
2002,Digital watermarking based on pixels relationships,Proc. of the Int'l Workshop on Intelligent Multimedia Computing and Networking (IMMCN02), Durham, North Carolina, USA,2002/03/01
90
2001/09/01
2001/09/01
2001,Using a mouse as the login device for a visual cryptography oriented password authentication scheme,Proceedings of the Seventh International Conference on Distributed Multimedia Systems, USA, pp.11-23,2001/09/01
90
2001/07/01
2001/07/01
2001,Lossy compression tolerant steganography,Proceedings of the first pacific asia human.society@internet conference, Seoul, Korea, pp.427-435,2001/07/01
87
1998/01/01
1998/01/01
1998,含磷反應性單體與光硬化型PU樹脂之紫外光架橋反應及熱性質研究,第二十一屆高分子研討會論文集,頁 152,1998/01/01
86
1997/01/01
1997/01/01
1997,含磷壓克力單體與紫外光硬化型樹脂的應用,八十六年度中國化學會學術研討會論文摘要,頁 153,1997/01/01
85
1996/01/01
1996/01/01
1996,反應型硝酸只在阻燃與防蝕上之研究,八十五年度中國化學會學術研討會論文摘要集,頁 161,1996/01/01
81
1992/01/01
1992/01/01
1992,A cryptographic key management scheme for access control in a tree structure,Proceedings of ICS '92, pp.174-178,1992/01/01
80
1991/01/01
1991/01/01
1991,A strategy to transform public key cryptosystems to ID-based public key cryptosystems,Proceedings of IEEE international canahan conference on security technology, pp.68-72,1991/01/01
1
1912/01/01
1912/01/01
1912,The study of a data compression scheme for English-Chinese dictionaries,Proceedings of 3rd international conference on chinese information processing,,1912/01/01
1
1912/01/01
1912/01/01
1912,Using smart card to authenticate passwords,Proceedings of 27th Annual IEEE International Carnahan Conference on Security Technology,,1912/01/01
Selected book overview ( Click )
Selected book overview
Entry Year
Selected book category
Date of publication
Select book title
Author
94
 
2005/09/01
廿一世紀全球化科技革命之衝擊,頁 87-131,資訊科技之衝擊,新北市:淡江大學出版中心,2005/09
91
 
2002/01/01
Distributed Multimedia Databases: Techniques and Applications, pp.352-361,Future Multimedia Databases and Research Directions,USA : Idea group publishing,2002/01
90
 
2001/07/01
The human society and the internet, pp.427-435,Lossy compression tolerant steganography,New York: Springer-Verlag,2001/07
:::
標準版RSs 2.x套裝
News&Events
Introduction
Performance
Activities & Honors
Gallery
Web Sources
Departments
Department of Architecture
Department of Civil Engineering
Department of Water Resources and Environmental Engineering
Department of Mechanical and Electro-Mechanical Engineering
Department of Chemical and Materials Engineering
Department of Electrical and Computer Engineering
Department of Computer Science and Information Engineering
Department of Aerospace Engineering
Links
IEET
«
August 2019
»
Mon
Tues
Wed
Thur
Fri
Sat
Sun
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
使用者登入
:::
ID:
PWD:
Local site
External site