淡江大學機構典藏:
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 64176/96941 (66%)
Visitors : 9207426      Online Users : 13803
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Collection

    Monograph [0/1]

    Community Statistics


    Item counts issued in 3 years: 639(2.42%)
    Items With Fulltext: 16882(63.83%)

    Download counts of the item
    Download times greater than 0: 16882(100.00%)
    Download times greater than 10: 16862(99.88%)
    Total Bitstream Download Counts: 5882997(25.88%)

    Last Update: 2025-05-28 04:32

    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed

    Jump to: [Chinese Items]   [0-9]   [ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
    or enter the first few letters:   

    Showing items 3381-3390 of 26443. (2645 Page(s) Totally)
    << < 334 335 336 337 338 339 340 341 342 343 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2003-04 Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers Hwang, Shin-jia; Chen, Chiu-chin
    2003-12 Cryptanalysis of publicly verifiable authenticated encryption 黃仁俊
    2003-04 Cryptanalysis of Shieh-Lin-Yang-Sun signature scheme 黃心嘉; Hwang, Shin-jia;
    2002-11 Cryptanalysis of the Hwang-Shi Proxy Signature Scheme Hwang, Min-shiang; Lee, Cheng-ch;
    2013-09 Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy Peng, Jian-Wen; Horng, Wen-Bing;
    2013-09 Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards Shieh, Wen-Gong; Horng, Wen-Bing;
    2005-01-01 Cryptanalysis on stream ciphers for GSM networks 黃仁俊; Hwang, Ren-junn;
    2010-11 Cryptanalysis on Sun-Yeh's password-based authentication and key distribution protocols with perfect forward secrecy 洪文斌; Horng, Wen-bing
    1991-10 Cryptographic authentication of passwords Chang, C. C.; 黃心嘉;
    1992-05 Cryptographic key assignment scheme for access control in a hierarchy Chang, Chin Chen; Hwang, Ren-junn;

    Showing items 3381-3390 of 26443. (2645 Page(s) Totally)
    << < 334 335 336 337 338 339 340 341 342 343 > >>
    View [10|25|50] records per page

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback