English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 64185/96959 (66%)
造訪人次 : 11532511      線上人數 : 15059
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    淡江大學機構典藏 >  依題名瀏覽

    跳至: [中文]   [數字0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    請輸入前幾個字:   

    顯示項目28451-28475 / 96937. (共3878頁)
    << < 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 > >>
    每頁顯示[10|25|50]項目
    日期題名作者
    2009 Security and prosperity in East Asia and the world Tai, Wan-Chin; Zhao, Quansheng
    2016-03-16 Security Concerns and Currency Competition Ray, Ou-Yang
    2007-07 Security Cooperation among ASEAN, China and the United States (1967~2007): Evolution of Security Concept Lin, Joyce Juo-yu
    2003-11-15 Security cooperation framework and mechanism in Southeast Asia 林若雩; Lin, Juo-yu
    1996 Security Cooperation in Southeast Asia: Singapore's Perspective Shee, Poon-kim
    2017 Security cooperation in the Asia-Pacific region : assessing the efficacy of the asean regional forum 羅蘭德; Sikua, Roland Ueteri
    2008-03-10 Security Cooperations between the US and ASEAN-from Constructivist Perspective 林若雩; Lin, Juo-yu
    2012-03 The Security Dilemma in U.S.-Taiwan Informal Alliance Politics Chen, Edward I-Hsin
    2001-06-01 Security Enhanced Packet Video with Dynamic Multicast Throughput Adjustment 吳庭育; Chao, H.C.;
    2012-05-30 Security Flaws in Zhang and Xu Improved Concurrent Signature Scheme 黃心嘉; Hwang, Shin-jia;
    2013-08-23 Security Flaws of Off-Line Micro Payment Scheme with Dual Signatures 黃心嘉; 黃心嘉
    2007-06 Security in Eastern Asia- Let’s Start with Human Right 鄭欽模
    1998-10 Security in the Taiwan strait 翁明賢
    2005-08-05 Security of Hsu–Wu's authenticated encryption scheme with (t, n) shared verification 黃心嘉; Hwang, Shin-jia;
    2011-12-09 The Security Of Taiwan: The Concerns Given By The United States In 2011 戴萬欽
    2005-09-01 Security of Tzeng–Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems 黃心嘉; Hwang, Shin-jia;
    2008 Security policy of the European Union toward China and Taiwan: military and arms trade issues and the situation in the Taiwan strait 白揚恩; Polisensky, Jan
    2011 Security Robot Simulator Hung, W.H.; Liu, Peter;
    2010-12 Security Weaknesses of Song's Advanced Smart Card Based Password Authentication Protocol Horng, Wen-bing; Lee, Cheng-Ping;
    1998-03-29 Security, transparency and accountability : an analysis of R.O.C. arms acquisition process 陳一新; Chen, I-hsin
    2017-08-30 Sediment flux and sediment-induced stratification in the Changjiang Estuary Arash Niroomandi; Gangfeng Ma;
    1982-01 A sediment-budget analysis for upper Mississippi River between Guttenberg, Iowa and Saverton, Missouri 許中杰; Hsu, Chung-chieh
    1983-09 A sediment-budget analysis of the upper Mississippi River, Great-II Reach 許中杰
    2006-08-03 Sedimentation of a Cylindrical Particle along the Axis of a Cylindrical Tube Filled with Carreau Fluid Hsu, Jyh-ping; Chen, Wei-jyh;
    2005-06-01 Sedimentation of a cylindrical particle in a Carreau fluid Hsu, Jyh-ping; Shie, Ching-Feng;
    顯示項目28451-28475 / 96937. (共3878頁)
    << < 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 > >>
    每頁顯示[10|25|50]項目

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋