跳到主要內容
年度論文名稱
2013Shieh, Wen-Gong; Horng, Wen-Bing, Cryptanalysis of Yeh et al.'s Security-Enhanced Remote User Authentication Scheme with Smart Cards, , Journal of Applied Science and Engineering=淡江理工學刊 16(3), pp.319-328, , pp
2013Peng, Jian-Wen; Horng, Wen-Bing; Chiu, Ying-Ching; Liu, Chao-Sheng, Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Preserving User Privacy, , Journal of Applied Science and Engineering=淡江理工學刊 16(3), pp.277-286, , pp
2012Wang, Yin-tien; Chi, Chen-tung; Feng, Ying-chieh, Robot Simultaneous Localization and Mapping Using Speeded-Up Robust Features, , Applied Mechanics and Materials 284-287, pp.2142-2146, , pp
2012Chen, Chien-Chang; Liu, Chong-An, Tamper-proof secret image-sharing scheme for identifying cheated secret keys and shared images, , Journal of Electronic Imaging 22(1), 013008(7pages), , pp
2012Lin, Xingchen ChiaChi, Headship, Household Burden, and Infant Mortality in Taipei (1906–1944), , Journal of Family History 38(3), pp.344-364, , pp
2012Chen, Chien-Chang; Jiun, Zeng-Chuang, Hsu, Chien-Hsiang, An Adaptive Reversible Image Watermarking Scheme Based on Integer Wavelet Coefficients, , Journal of Computers 8(7), pp.1677-1682, , pp
2010Chen, Chien-Chang; Tsai Yao-Hong, Adaptive reversible image watermarking scheme, , Journal of Systems and Software 84(3), pp.428-434, , pp
2006Chang, Chih Yung; Chang, Chao Tsun; Chen, Tzung Shi; Chang, Hsu Ruey, Hierarchical Management Protocol for Constructing a QoS Communication Path in Wireless Ad Hoc Networks, , Information Sciences 177(13), pp.2621-2641, , pp
2006Lin, Xingchen ChiaChi, Household Register Data in Colonial Taiwan: Introduction and Application, , ETVT, 2007, , pp
1996Chang, Chih Yung; Sheu, Jang Ping; Tzeng, Jiann Yuan, Design and implementation of a Fortran assistant tool for vector compilers, , International Journal of High Speed Computing 8(1), pp.13-45, , pp