中大機構典藏-NCU Institutional Repository-提供博碩士論文、考古題、期刊論文、研究計畫等下載:Search Results
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 81570/81570 (100%)
Visitors : 48679616      Online Users : 1878
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version

    Category

    Loading community tree, please wait....

    Author

    Loading author tree, please wait.....

    Year

    Loading year class tree, please wait....

    Results 141-165 of 374.

    previous1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 next    View [10|25|50] records per page
    [ Search items with full text(s)| Search all items]     Sort results by Order

    141BPEL Extensions to User-Interactive Service Delivery

    Lee,J; Lin,YY; Ma,SP; Lee,SJ2009
    [Graduate Institute of Computer Science and Information Engineering] journal & Dissertation
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING
    secure cross-domain communication among UI services from various domains. An enhanced BPEL engine with a service UI rendering engine has been

    142Secure peer-to-peer 3D streaming

    Chan,MC; Hu,SY; Jiang,JR2009
    [Graduate Institute of Computer Science and Information Engineering] journal & Dissertation
    MULTIMEDIA TOOLS AND APPLICATIONS
    資訊工程研究所 Chan,MC Hu,SY Jiang,JR Secure peer-to-peer 3D streaming 中央大學 NETWORK In recent years, interactive virtual environments such as Second Life

    143Intrusion detection by machine learning: A review

    Tsai,CF; Hsu,YF; Lin,CY; Lin,WY2009
    [Graduate Institute of Information Management] journal & Dissertation
    EXPERT SYSTEMS WITH APPLICATIONS
    major research problem in network security, whose aim is to identify unusual access or attacks to secure internal networks. In literature, intrusion

    144CHAOS SYNCHRONIZATION IN THE PRESENCE OF NOISE

    Chen,KY; Tung,PC; Lin,SL; Tsai,MT2011
    [Departmant of Mechanical Engineering ] journal & Dissertation
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C
    機械工程學系 Chen,KY Tung,PC Lin,SL Tsai,MT CHAOS SYNCHRONIZATION IN THE PRESENCE OF NOISE 國立中央大學 SECURE COMMUNICATION; FEEDBACK-CONTROL; SYSTEMS

    145An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks

    Jiang,JR; Sheu,JP; Tu,C; Wu,JW2011
    [Department of Computer Science and information Engineering] journal & Dissertation
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING
    資訊工程學系 Jiang,JR Sheu,JP Tu,C Wu,JW An Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks 國立中央大學 AD-HOC NETWORKS How to secure data

    146未來ATM為基礎之高速智慧型個人通訊網路資訊服務創建新技術;A New Generalized Mechanism of Information Service Creation on Future ATM-Based Intelligent Personal Communications Networks

    郭更生1996-09-01
    [Department of Information Management] Research Project
    財團法人國家實驗研究院科技政策研究與資訊中心
    Communications Networks 行政院國家科學委員會 資訊工程--硬體工程; 電信工程;個人通訊網路;非同步傳輸模式;慧型網路;資訊創建;網路整合軟體;網路互通;全遠端程式呼叫;物件導向技術;通訊協定;廣域網路;PCN;ATM;Intelligent network

    147基於質因數分解難題的前向式安全盲簽章系統; Forward-Secure Blind Signature Schemes Based on Integer Factorization Problem

    蔡靜嫺; Jing-Shian Tsai2006-06-27
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    資訊工程研究所 蔡靜嫺 Jing-Shian Tsai 基質因數分解難題前向式全盲簽章系統; Forward-Secure Blind Signature Schemes Based on Integer Factorization Problem 國立中央大學圖書館 質因數分解難題

    148基於屬性驗證之VM-vTPM同等級安全遷移;VM-vTPM same level secure migration based on property verification

    彭博涵; Peng,Po-Han2014-07-29
    [Software Engineer] Electronic Thesis & Dissertation
    全性,把虛擬機遷移至舊版存有漏洞系統環境,則會對該虛擬機全性造成危害。若是在遷移時遷移環境有精細確認,比如使用系統、版本或地點,則可以對虛擬機全有較障。 本論文提出全VM-vTPM遷移機制,對在雲端環境使用vTPM使用者需擔心VM全等級降。在新主機加入

    149TrustBUF:實作於TF-M的共享緩衝區溝通方法;TrustBUF: A Secure Shared Buffer Communication Method on TF-M

    黃浩洋; Huang, Hao-Yang2024-07-26
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    Firmware-M(TF-M)架構被引入作為Armv8-M系處理器IoT設備提供定程度護。儘管如此,研究人員發現TF-M中存在由非全世界中程式傳遞惡意參數到全世界而導致軟體漏洞可會洩露機密。藉由分析相關全議題文獻,我們認為這個題源自TEE在將系統分成兩個世界後無法完全掌握來自非

    150具匿名性及安全性之B2C電子發票系統; An Anonymous and Secure B2C E-Invoice System

    楊家福; Chia-Fu Yang2007-06-25
    [Executive Master of Information Management] Electronic Thesis & Dissertation
    交易過程可以有私密性、完整性、身份認證及可否認性,避免第三者破壞、塗改、洩漏或濫用,發生交易糾紛情形。此外,本協定還可以有特性:(1)購買者同意捐贈電子發票後,電子發票權利可以由購買者轉移到受贈機關,購買者無法反悔捐贈且再擁有兌獎權利;(2)財政部可以稽核網購業者開立電子發

    151金匙小波域音訊浮水印系統; Key-based Audio Watermarking System using Wavelet Packet Decomposition

    黃景明; Ching-Ming Huang2002-06-14
    [Graduate Institute of Electrical Engineering] Electronic Thesis & Dissertation
    據。浮水印嵌入時選擇人耳較敏感偏低頻係數作為嵌入之用,並且使用區塊分類來過濾適合嵌入浮水印係數區塊,將數位浮水印嵌入較易改變極性之區塊以確浮水印強韌性。另個特點為在浮水印嵌入過程中會產生組與原始音訊相關全鑰匙 ( Secure Key ),萃取端藉由此全鑰匙即可完整取出嵌入

    152依資料重要性編碼私密鑰匙之影像浮水印系統; A key-based image watermarking system by using significant data coding

    朱建緯; Chien-Wei Chu2003-06-11
    [Graduate Institute of Electrical Engineering] Electronic Thesis & Dissertation
    ;Image watermarking system;copyright;secure key 摘要 本篇論文主要是在設計個新型影像浮水印系統,其目是為了障著作權擁有者權利,在設計上,我們所提出來方法具有兩個重要特點來滿足數位浮水印需求並可應用在空間域、小波域以及離散餘弦轉換域之中

    153使用人臉辨識強化VPN身份認證;Improvement of VPN Authentication Using Facial Recognition Technology

    劉政鋼; Liu,Cheng-Kang2014-08-18
    [Executive Master of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    有網路,可以在瀏覽器上使用,所有網路資料傳輸都透過全且經過身份認證加密通道來進行傳輸。藉由SSL通訊協定可以提供客戶端與伺器端之間更全網路連結。在般情況,使用SSL VPN可以透過確認 LDAP 伺器中用戶憑證與密碼即可,但如果是要存取機密資料或是有特殊權限使用者才可使用資源

    154雲端環境安全資料儲存證明之研究;The Study of Secure Provable-Data-Possession in Cloud Environments

    楊誠育; Yang, Cheng-Yu2018-08-23
    [Graduate Institute of Communication Engineering] Electronic Thesis & Dissertation
    。然而,使用者終究無法如同本機內部硬碟般存取外部雲端儲存資料,以致外部儲存無法得到使用者完全信任。對前述全性題,目前有許多資料儲存證明協定(Provable-Data-Possession Protocol)被提出。本研究協定基橢圓曲線雙線性特點,發展雲端儲存資料儲存證明協定。本研究

    155安全通訊之低偵測/截收率(LPD/I)性能模擬分析研究; Performance Simulation and Analysis of LPD/LPI for Secure Communications

    許閎傑; Hong-Jie Shiu2006-06-29
    [Graduate Institute of Communication Engineering] Electronic Thesis & Dissertation
    通訊工程研究所 許閎傑 Hong-Jie Shiu 全通訊之低偵測/截收率(LPD/I)性模擬分析研究; Performance Simulation and Analysis of LPD/LPI for Secure Communications 國立中央大學圖書館 展頻技術;全通訊

    156網路傳輸運用於家庭防盜保全之研究; Network Transmitting Real-time Video Monitor System for Secure User's Family

    蘇達裕; Da-Yu Su2005-06-16
    [Graduate Institute of Electrical Engineering] Electronic Thesis & Dissertation
    個適用家庭防盜全且兼具即時、精確、自動化、網路化、數位化等特點視訊監控系統。本研究系統主要由CCD、影像擷取卡、個人電腦及個人數位助理(PDA)所組成。 本研究是利用網路作為遠端監控系統,而傳統監視系統是將監視器影像傳輸至監視螢幕,加上監視器都會侷限拍某些方位,如此來就會發生些無

    157新世代可自我檢測的綠色節能車載運輸系統---子計畫三:車輛與路邊無線基地台間之可信賴與安全的通訊;Reliable and Secure Communications between Vehicles and Road-Side Wifi Access Points

    孫敏德2014-03-11
    [Department of Computer Science and information Engineering] Research Project
    財團法人國家實驗研究院科技政策研究與資訊中心
    國立中央大學資訊工程系 孫敏德 新世代可自我檢測綠色節車載運輸系統---子計畫三:車輛與路邊無線基地台間之可信賴與通訊;Reliable and Secure Communications between Vehicles and Road-Side Wifi Access

    158新世代可自我檢測的綠色節能車載運輸系統,-子計畫三:車輛與路邊無線基地台間之可信賴與安全的通訊;Reliable and Secure Communications between Vehicles and Road-Side Wifi Access Points

    孫敏德2012-12-01
    [Department of Computer Science and information Engineering] Research Project
    財團法人國家實驗研究院科技政策研究與資訊中心
    國立中央大學資訊工程系 孫敏德 新世代可自我檢測綠色節車載運輸系統,-子計畫三:車輛與路邊無線基地台間之可信賴與通訊;Reliable and Secure Communications between Vehicles and Road-Side Wifi Access Points

    159新世代可自我檢測的綠色節能車載運輸系統,-子計畫三:車輛與路邊無線基地台間之可信賴與安全的通訊;Reliable and Secure Communications between Vehicles and Road-side WiFi Access Points

    孫敏德2013-12-01
    [Department of Computer Science and information Engineering] Research Project
    財團法人國家實驗研究院科技政策研究與資訊中心
    國立中央大學資訊工程系 孫敏德 新世代可自我檢測綠色節車載運輸系統,-子計畫三:車輛與路邊無線基地台間之可信賴與通訊;Reliable and Secure Communications between Vehicles and Road-side WiFi Access Points

    160自動更新的黑暗面: 新型軟體自動更新弱點解決方案;The Dark Side of Auto-Upgrade: Solution of New Auto-Upgrade Weaknesses

    江瑞敏; Jiang,Ruei-Min2015-07-23
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    題,並根據這些題提出三種攻擊方法。若攻擊者使用此類攻擊方法,便可以誘使受害者裝攻擊者提供惡意軟體 (Malware),達到擴散惡意軟體效果亦或者將受害者電腦變成殭屍網路員。 最後,在這篇論文中,我們亦提出了個防禦機制有效防禦此類型攻擊方法,而且相較使用HTTPS通訊協定

    161SeFence: 基於安全感測的可信任周邊存取控制;SeFence: A Trusted Peripheral Access Control on Secure Sensing

    林世欽; Lin, Shih-Chin2024-07-23
    [Executive Master of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    ;TrustZone;Secure Sensing 現今慧及 IoT 裝置擁有各式各樣感測器和硬體周邊,使得它們夠以非常低廉成本蒐集和傳輸敏感資料或資訊。然而,基隱私題,我們可希望避免這些數據被蒐集。例如禁止在會議期間進行影像或是語音錄製。因此,在裝置中控制周邊可取存性在這些情況就變得非常重要

    162攜帶可延伸的ontology以增進agent間的溝通; Carrying updated ontology to improve agent communication

    黃慶順; Ching-Shun Huang2003-06-23
    [Graduate Institute of Computer Science and Information Engineering] Electronic Thesis & Dissertation
    個方法,使移動式及靜止agent攜帶更新ontology,而ontology則以DAML描述。 這樣可使agent間以精確、穩定、快速及方式來溝通。此外,agent可精確存取DAML-enabled網站之資訊。 本文附Advanced Traveler Information

    163Micro-hole machining of carbide by electric discharge machining

    Yan,BH; Huang,FY; Chow,HM; Tsai,JY1999
    [Graduate Institute of Mechanical Engineering] journal & Dissertation
    JOURNAL OF MATERIALS PROCESSING TECHNOLOGY
    expansion of the machined micro-hole and minimal tool electrode wear rate to secure a high precision micro-hole in the carbide. the effects of changing

    164Port wound closure assisted by Foley catheter: An easier way to provide fascia security

    Su,WH; Cheng,MH; Tsou,TS; Cheung,SM; Chang,SP; Wang,PH2009
    [Institute of Systems Biology and Bioinformatics] journal & Dissertation
    JOURNAL OF OBSTETRICS AND GYNAECOLOGY RESEARCH
    of a Foley catheter offers an easy and secure way to close a 10-12 mm port wound. 2009 en_US

    165VQ Applications in Steganographic Data Hiding Upon Multimedia Images

    Wang,WJ; Huang,CT; Wang,SJ2011
    [Department of Computer Science and information Engineering] journal & Dissertation
    IEEE SYSTEMS JOURNAL
    and communication protection by hiding information into a media carrier. It provides a secure method to distribute data through a public and open channel


    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明