中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Search Results
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 80990/80990 (100%)
Visitors : 43856144      Online Users : 1129
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Category

    Loading community tree, please wait....

    Author

    Loading author tree, please wait.....

    Year

    Loading year class tree, please wait....

    Results 126-150 of 368.

    previous1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 next    View [10|25|50] records per page
    [ Search items with full text(s)| Search all items]     Sort results by Order

    126An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online games

    Chan,Mo-Che; Hu,Shun-Yun; Jiang,Jehn-Ruey2007
    [Graduate Institute of Computer Science and Information Engineering] journal & Dissertation
    NETWORKING 2007: Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, Proceedings
    資訊工程研究所 Chan,Mo-Che Hu,Shun-Yun Jiang,Jehn-Ruey An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer

    127A CRT-based RSA countermeasure against physical cryptanalysis

    Kim,C; Ha,J; Moon,S; Yen,SM; Kim,SH2005
    [Graduate Institute of Computer Science and Information Engineering] journal & Dissertation
    HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS
    considers a secure and practical CRT-based RSA signature implementation against both side channel attacks (including power analysis attack, timing attack

    128混沌理論強健反干擾加密傳輸系統之實現;Implementation of Chaotic-based Anti-Interference Secure Communication System

    李柏磊2016-12-31
    [Department of Electrical Engineering] Research Project
    財團法人國家實驗研究院科技政策研究與資訊中心
    secure communication;anti-interference; 電子電機工程 本研究使用混沌理論作為加密演算法,開發硬體實現混沌理論加密資訊全傳輸/接收系統,開發混沌產生器、混沌調變器、混沌全傳送器,以及混沌接收器、混沌解調器,以增加訊號傳輸全性。訊號先經過混沌調變器進行加密,然後

    129Secure Communications System Through Concurrent AJ and LPD Evaluation

    Liao,CH; Tsay,MK; Lee,ZS2009
    [Graduate Institute of Communication Engineering] journal & Dissertation
    WIRELESS PERSONAL COMMUNICATIONS
    通訊工程研究所 Liao,CH Tsay,MK Lee,ZS Secure Communications System Through Concurrent AJ and LPD Evaluation 中央大學 LOW-PROBABILITY; DETECTABILITY; INTERCEPT

    130以魔方陣為基底的加密資訊隱藏研究; Magic matrix encryption for secure data hiding

    黃素瓊; Su-Chiung Huang2008-07-18
    [Executive Master of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    融入,以達到演算法可公開、僅護金鑰即增加密文被破解困難度需求。方法中所使用三把分散金鑰,任何把錯誤情形,都將使解出資料錯誤,由錯誤金鑰解出錯誤訊息實驗結果可知,其與正確訊息間平均漢明距離約為0.5,這樣結果與盲目猜測結果幾乎致。為使密文受到更嚴密護,並增強密文全性

    131台灣客家飲食文學的研究;The study of Hakka dietary literature

    廖純瑜; LIAO,CHUN-YU2012-08-27
    [Graduate Institute of Hakka Languate and Literature] Electronic Thesis & Dissertation
    客家飲食文學研究,仍只是處在起步階段。因為在客家文學領域裡,目前較少有系統,以飲食當作研究主體,深入探究其文化與精神層面意涵。本論文將以客家飲食文學為研究,希望以歷時性研究,建構出套飲食文化發展系譜,並以共時性研究,梳理出客家飲食文化所呈現社會、文化、政治、經濟各種

    132展示一段被忽視的歷史——契丹帝國繪畫藝術研究

    莢立剛; Jia, Li-Gang2018-07-23
    [Graduate Institute of Chinese Literature] Electronic Thesis & Dissertation
    作從繪畫技法、形式語言到思想內涵、藝術精神,各個層面無呈現出派「中華正統」漢化性面貌。契丹繪畫漢化性,還體現在以宣化八裏墓室壁畫爲代表契丹墓室壁畫中。這些壁畫廣泛分布河北、內蒙古、遼寧等地契丹墓室,其漢化性,體現在對唐繪畫技法承繼與發展,還體現在對中原漢族生產生活方式描繪

    133數位創新經濟法規課題之研究–以平臺經濟為中心;Regulations for the Digital Innovation Economy: Focusing on the Platform Economy

    楊梓銘; Yang, Tzu-Ming2020-07-28
    [Executive Master of Industrial Economics] Electronic Thesis & Dissertation
    」。 本研究除了嘗試為平臺經濟各迫切法規課題,提供法制調整建議之淺見外,也進步觀察到數位創新或平臺經濟之業者,尤其是新創企業者,多中小企業規模,面對著創新高風險,旦營運模式無法生存消費市場時,善者會善盡消費者及合作廠商之權益障,但多數者則選擇直接消失退場,留許多社會題待善後;探其

    134選擇密文攻擊法之研究與實作; The Research and Implementation of Chosen Ciphertext Attacks

    張起豪; Chi-Hao Chang2004-06-15
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    ;CCA 近年來網際網路普及以及使用人數快速成長,越來越多應用與建構網際網路上 (如:網路報 People throughout the world could communicate instantly and transfer information with others

    135新世代可自我檢測的綠色節能車載運輸系統,-子計畫三:車輛與路邊無線基地台間之可信賴與安全的通訊;Reliable and Secure Communications between Vehicles and Road-Side Wifi Access Points

    孫敏德2012-09-01
    [Department of Computer Science and information Engineering] Research Project
    財團法人國家實驗研究院科技政策研究與資訊中心
    中央大學資訊工程學系 孫敏德 新世代可自我檢測綠色節車載運輸系統,-子計畫三:車輛與路邊無線基地台間之可信賴與通訊;Reliable and Secure Communications between Vehicles and Road-Side Wifi Access Points

    136User-provided multimedia content distribution architecture in mobile and ubiquitous communication networks

    Hu,CL; Cho,CA2011
    [Department of Communication Engineering] journal & Dissertation
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
    . The proposed architecture integrates several specific mechanisms, including device discovery, asynchronous content delivery, secure access control

    137無線感測網路試驗環境之分析和實作安全程式更新協定; Analysis and Implementation of Secure Reprogramming Protocols on Wireless Sensor Networks

    林栢全; Po-Chuan Lin2007-09-11
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    議題。當感測器散佈在網路中時,我們必須要確定每個感測器夠透過無線接收到應用程式更新。在這篇論文中,我們在自己設計代感測器(Octopus I)上實作三個最近提出全程式更新協定。這三個全程式更新協定作業系統使用是微型作業系統(TinyOS),三種協定都是在洪水(Deluge)程式

    138衛星上可重組化計算之安全FPGA動態部分可重組架構;Secure FPGA Dynamic Partial Reconfiguration Architecture for Reconfigurable Computing on Satellites

    吳定濂; Wu, Ding-Lian2023-07-28
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    Environment;ARM TrustZone 衛星與可重組化計算相結合,為系統提供更高靈活性和適應性。然而,缺乏更新途徑可導致惡意硬體木馬植入或攻擊者竊取機密硬體設計。現有全更新機制無法有效阻擋惡意重組或讀回攻擊,使得可重組介面面臨重大威脅。因此,我們設計利用可信執行環境(TEE)來構建

    139?催化反應對甘氨酸多晶型的影響;The Influence of Enzymatic Reaction on Glycine Polymorphism

    薛任杰; Hsueh, Jen-Chieh2021-08-03
    [National Central University Department of Chemical & Materials Engineering] Electronic Thesis & Dissertation
    色化學 提高反應速率符合綠色化學 提高反應速率符合綠色化學 提高反應速率符合綠色化學 提高反應速率符合綠色化學 提高反應速率符合綠色化學 提高反應速率符合綠色化學 。在這研究中,我們成功地優化了?水解反應過程並確認?基轉移。在這研究中,我們成功地優化了?水解反應過程並

    140BPEL Extensions to User-Interactive Service Delivery

    Lee,J; Lin,YY; Ma,SP; Lee,SJ2009
    [Graduate Institute of Computer Science and Information Engineering] journal & Dissertation
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING
    secure cross-domain communication among UI services from various domains. An enhanced BPEL engine with a service UI rendering engine has been

    141Secure peer-to-peer 3D streaming

    Chan,MC; Hu,SY; Jiang,JR2009
    [Graduate Institute of Computer Science and Information Engineering] journal & Dissertation
    MULTIMEDIA TOOLS AND APPLICATIONS
    資訊工程研究所 Chan,MC Hu,SY Jiang,JR Secure peer-to-peer 3D streaming 中央大學 NETWORK In recent years, interactive virtual environments such as Second Life

    142Intrusion detection by machine learning: A review

    Tsai,CF; Hsu,YF; Lin,CY; Lin,WY2009
    [Graduate Institute of Information Management] journal & Dissertation
    EXPERT SYSTEMS WITH APPLICATIONS
    major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks. In literature, intrusion

    143CHAOS SYNCHRONIZATION IN THE PRESENCE OF NOISE

    Chen,KY; Tung,PC; Lin,SL; Tsai,MT2011
    [Departmant of Mechanical Engineering ] journal & Dissertation
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C
    機械工程學系 Chen,KY Tung,PC Lin,SL Tsai,MT CHAOS SYNCHRONIZATION IN THE PRESENCE OF NOISE 國立中央大學 SECURE COMMUNICATION; FEEDBACK-CONTROL; SYSTEMS

    144An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks

    Jiang,JR; Sheu,JP; Tu,C; Wu,JW2011
    [Department of Computer Science and information Engineering] journal & Dissertation
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING
    資訊工程學系 Jiang,JR Sheu,JP Tu,C Wu,JW An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks 國立中央大學 AD-HOC NETWORKS How to secure data

    145未來ATM為基礎之高速智慧型個人通訊網路資訊服務創建新技術;A New Generalized Mechanism of Information Service Creation on Future ATM-Based Intelligent Personal Communications Networks

    郭更生1996-09-01
    [Department of Information Management] Research Project
    財團法人國家實驗研究院科技政策研究與資訊中心
    Communications Networks 行政院國家科學委員會 資訊工程--硬體工程; 電信工程;個人通訊網路;非同步傳輸模式;慧型網路;資訊創建;網路整合軟體;網路互通;全遠端程式呼叫;物件導向技術;通訊協定;廣域網路;PCN;ATM;Intelligent network

    146基於質因數分解難題的前向式安全盲簽章系統; Forward-Secure Blind Signature Schemes Based on Integer Factorization Problem

    蔡靜嫺; Jing-Shian Tsai2006-06-27
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    資訊工程研究所 蔡靜嫺 Jing-Shian Tsai 基質因數分解難題前向式全盲簽章系統; Forward-Secure Blind Signature Schemes Based on Integer Factorization Problem 國立中央大學圖書館 質因數分解難題

    147基於屬性驗證之VM-vTPM同等級安全遷移;VM-vTPM same level secure migration based on property verification

    彭博涵; Peng,Po-Han2014-07-29
    [Software Engineer] Electronic Thesis & Dissertation
    全性,把虛擬機遷移至舊版存有漏洞系統環境,則會對該虛擬機全性造成危害。若是在遷移時遷移環境有精細確認,比如使用系統、版本或地點,則可以對虛擬機全有較障。 本論文提出全VM-vTPM遷移機制,對在雲端環境使用vTPM使用者需擔心VM全等級降。在新主機加入

    148TrustBUF:實作於TF-M的共享緩衝區溝通方法;TrustBUF: A Secure Shared Buffer Communication Method on TF-M

    黃浩洋; Huang, Hao-Yang2024-07-26
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    Firmware-M(TF-M)架構被引入作為Armv8-M系處理器IoT設備提供定程度護。儘管如此,研究人員發現TF-M中存在由非全世界中程式傳遞惡意參數到全世界而導致軟體漏洞可會洩露機密。藉由分析相關全議題文獻,我們認為這個題源自TEE在將系統分成兩個世界後無法完全掌握來自非

    149具匿名性及安全性之B2C電子發票系統; An Anonymous and Secure B2C E-Invoice System

    楊家福; Chia-Fu Yang2007-06-25
    [Executive Master of Information Management] Electronic Thesis & Dissertation
    交易過程可以有私密性、完整性、身份認證及可否認性,避免第三者破壞、塗改、洩漏或濫用,發生交易糾紛情形。此外,本協定還可以有特性:(1)購買者同意捐贈電子發票後,電子發票權利可以由購買者轉移到受贈機關,購買者無法反悔捐贈且再擁有兌獎權利;(2)財政部可以稽核網購業者開立電子發

    150金匙小波域音訊浮水印系統; Key-based Audio Watermarking System using Wavelet Packet Decomposition

    黃景明; Ching-Ming Huang2002-06-14
    [Graduate Institute of Electrical Engineering] Electronic Thesis & Dissertation
    據。浮水印嵌入時選擇人耳較敏感偏低頻係數作為嵌入之用,並且使用區塊分類來過濾適合嵌入浮水印係數區塊,將數位浮水印嵌入較易改變極性之區塊以確浮水印強韌性。另個特點為在浮水印嵌入過程中會產生組與原始音訊相關全鑰匙 ( Secure Key ),萃取端藉由此全鑰匙即可完整取出嵌入


    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明