Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Chih-Hung Wang"). Showing records 1 – 30 of 46 total matches.

[1] [2]

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


NSYSU

1. Chiao, Feng. Multi-Factor Android Malware Detection System.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Since Apple and Google introduced iPhone and Android smartphones in 2007 and 2008, the market share of smartphones has been on the increase. Above all,… (more)

Subjects/Keywords: Malicious App Detection; Data Mining; Classifying; System Call; Permission

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiao, F. (2014). Multi-Factor Android Malware Detection System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiao, Feng. “Multi-Factor Android Malware Detection System.” 2014. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiao, Feng. “Multi-Factor Android Malware Detection System.” 2014. Web. 12 Nov 2019.

Vancouver:

Chiao F. Multi-Factor Android Malware Detection System. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiao F. Multi-Factor Android Malware Detection System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Tseng, Yi-Fan. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a massage securely and efficiently as the message is… (more)

Subjects/Keywords: Multi-Receiver Encryption; Anonymity; Identity-Based Encryption; Bilinear Pairing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, Y. (2014). Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Web. 12 Nov 2019.

Vancouver:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Tseng, Shang-Wei. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Cloud computing is increasingly popular today. Cloud services such as data-outsourcing services provide a growing number of users access to cloud storage for large quantities… (more)

Subjects/Keywords: Dependable System; Data Outsourcing; Cloud-of-Clouds Approach; Cloud Computing; Data Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2014). Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Web. 12 Nov 2019.

Vancouver:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Cheng, Yu-Shan. Parity Detection for Some Three-Modulus Residue Number System.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 The residue number system (RNS) can be applied to cryptography, image processing, digital filtering, parallel computation, and cloud computing. It represents a large integer using… (more)

Subjects/Keywords: parity detection technique; residue number system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2014). Parity Detection for Some Three-Modulus Residue Number System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Web. 12 Nov 2019.

Vancouver:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Cho, Yan-Fu. Authenticated Re-Encryption Scheme for Named Data Network.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IPâs architecture has limitations… (more)

Subjects/Keywords: Authentication; Secure Transfer Protocol; Named Data Network; Proxy Re-Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, Y. (2014). Authenticated Re-Encryption Scheme for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Web. 12 Nov 2019.

Vancouver:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Lin, Yu-chi. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a collaborative workflow platform, when a group leader receives a document which requires cooperators' support, she/he assigns the task to the cooperators. Each cooperator… (more)

Subjects/Keywords: Online/Offline Signature; Trapdoor Hash Function; Collaborative Workflow Platform

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2014). Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yu-chi. “Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.” 2014. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yu-chi. “Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.” 2014. Web. 12 Nov 2019.

Vancouver:

Lin Y. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Zhong, Min-Zhe. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Due to the rising number of mobile devices and the increasing demand for better quality of service (QoS), issues related to the next generation of… (more)

Subjects/Keywords: handover; authentication; privacy preserving; active revocation; 5G mobile communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, M. (2014). Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Web. 12 Nov 2019.

Vancouver:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Chang, Tzu-Ching. Detecting Malware with DLL Injection And PE Infection.

Degree: Master, Information Management, 2016, NSYSU

 Advanced Persistent Attack Threat is one of notorious in enterprises and organization. APT attack is a highly organized, well-funded attack against a specific target .Cyber… (more)

Subjects/Keywords: Malware; PE File; PE Infection; APT Attack; DLL Injection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, T. (2016). Detecting Malware with DLL Injection And PE Infection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Tzu-Ching. “Detecting Malware with DLL Injection And PE Infection.” 2016. Web. 12 Nov 2019.

Vancouver:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang T. Detecting Malware with DLL Injection And PE Infection. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723116-202543

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Lin, Yu-shen. A study of digital signature batch verification.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Batch verification is a technique for saving time on verifying signatures. It has many applications in the world. Almost all batch verification algorithm assume that… (more)

Subjects/Keywords: RSA digital signature scheme; Batch Verification; Digital Signature; BLS digital signature scheme; Forgery signature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2016). A study of digital signature batch verification. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yu-shen. “A study of digital signature batch verification.” 2016. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yu-shen. “A study of digital signature batch verification.” 2016. Web. 12 Nov 2019.

Vancouver:

Lin Y. A study of digital signature batch verification. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. A study of digital signature batch verification. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Kuo, Yen-chih. Detecting the Accuracy of Highway Incident Warnings in VANETs.

Degree: Master, Information Management, 2016, NSYSU

 VANET, so called Vehicular Ad hoc Network, uses cars as nodes to send packages to other cars or road infrastructure. In this basis, VANET can… (more)

Subjects/Keywords: Misbehavior detect; Verify alarm; Car Cluster; Beacon; VANET

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, Y. (2016). Detecting the Accuracy of Highway Incident Warnings in VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Yen-chih. “Detecting the Accuracy of Highway Incident Warnings in VANETs.” 2016. Web. 12 Nov 2019.

Vancouver:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo Y. Detecting the Accuracy of Highway Incident Warnings in VANETs. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731116-114212

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Chang, Yu-han. Improving Detection Efficiency using Cloud Computing.

Degree: Master, Information Management, 2016, NSYSU

 Recently, with the popularity and convenience features of Internet, Internet has become one of the attacker profitable way to enter the local area network. Most… (more)

Subjects/Keywords: Distributed File System; Cloud Computing; Intrusion Detection System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, Y. (2016). Improving Detection Efficiency using Cloud Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Yu-han. “Improving Detection Efficiency using Cloud Computing.” 2016. Web. 12 Nov 2019.

Vancouver:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang Y. Improving Detection Efficiency using Cloud Computing. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0730116-223811

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Wang , Jian-Sheng. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Wireless body area network (WBAN) plays an important part in mobile healthcare. WBAN can be imagined as a small wireless local area network around our… (more)

Subjects/Keywords: Key reconstruction; Authentication; Wireless body area network; Homomorphic secret sharing; Healthcare

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang , J. (2016). Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang , Jian-Sheng. “Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.” 2016. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang , Jian-Sheng. “Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.” 2016. Web. 12 Nov 2019.

Vancouver:

Wang J. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang J. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Chen, Ching-wen. Certificateless Signature Scheme Achieving Highest-Level Security in the Standard Model.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 In order to overcome the key escrow problem, Al Riyami and Paterson introduced the concept of certificateless public key cryptography (CL-PKC) in 2003. CL-PKC requires… (more)

Subjects/Keywords: Key Escrow Problems; The Standard Model; Girault's Security; Non-Repudiation; Certificateless Signatures

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, C. (2016). Certificateless Signature Scheme Achieving Highest-Level Security in the Standard Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620116-130154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Ching-wen. “Certificateless Signature Scheme Achieving Highest-Level Security in the Standard Model.” 2016. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620116-130154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Ching-wen. “Certificateless Signature Scheme Achieving Highest-Level Security in the Standard Model.” 2016. Web. 12 Nov 2019.

Vancouver:

Chen C. Certificateless Signature Scheme Achieving Highest-Level Security in the Standard Model. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620116-130154.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen C. Certificateless Signature Scheme Achieving Highest-Level Security in the Standard Model. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620116-130154

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Wu, Chin-yu. Fine-Grained Access Control Mechanism for NDN Supporting Mobility and Potential Receivers.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 NDN is one of the most promising Informat-ion-Centric Networking (ICN) architectures, where the core concept is to focus on the named data (or contents) themselves.… (more)

Subjects/Keywords: Named data networking; Potential receivers; Bilinear pairing; Mobility; Fine-grained access control

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, C. (2016). Fine-Grained Access Control Mechanism for NDN Supporting Mobility and Potential Receivers. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-145849

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, Chin-yu. “Fine-Grained Access Control Mechanism for NDN Supporting Mobility and Potential Receivers.” 2016. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-145849.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, Chin-yu. “Fine-Grained Access Control Mechanism for NDN Supporting Mobility and Potential Receivers.” 2016. Web. 12 Nov 2019.

Vancouver:

Wu C. Fine-Grained Access Control Mechanism for NDN Supporting Mobility and Potential Receivers. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-145849.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu C. Fine-Grained Access Control Mechanism for NDN Supporting Mobility and Potential Receivers. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-145849

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

15. Artan, William. Privacy Preserving Billing Protocol for Smart Grid.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Smart grid is an advanced electrical grid equipped with communication capability which is utilized to improve the efficiency, reliability, and sustainability of electricity services. Countries… (more)

Subjects/Keywords: smart meter; smart grid; privacy preserving; billing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Artan, W. (2012). Privacy Preserving Billing Protocol for Smart Grid. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713112-155157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Artan, William. “Privacy Preserving Billing Protocol for Smart Grid.” 2012. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713112-155157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Artan, William. “Privacy Preserving Billing Protocol for Smart Grid.” 2012. Web. 12 Nov 2019.

Vancouver:

Artan W. Privacy Preserving Billing Protocol for Smart Grid. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713112-155157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Artan W. Privacy Preserving Billing Protocol for Smart Grid. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0713112-155157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Kung, Ting-chuan. Homomorphic Encryption Supporting Logical Operations.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

 Homomorphic encryption is a form of encryption that allows computations to be carried out on ciphertext and generate an encrypted result which, when decrypted, matches… (more)

Subjects/Keywords: Homomorphic Encryption; Disjunctive Normal Form; Generic Group Model; Composite Order Pairing; Logical Operations

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kung, T. (2017). Homomorphic Encryption Supporting Logical Operations. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-173755

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kung, Ting-chuan. “Homomorphic Encryption Supporting Logical Operations.” 2017. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-173755.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kung, Ting-chuan. “Homomorphic Encryption Supporting Logical Operations.” 2017. Web. 12 Nov 2019.

Vancouver:

Kung T. Homomorphic Encryption Supporting Logical Operations. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-173755.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kung T. Homomorphic Encryption Supporting Logical Operations. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-173755

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. E, Cheng-yuan. Conversion Between Attribute-Based Encryptions and Key-Aggregate Cryptosystems.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

 Generic construction of cryptographic primitives is a way to connect two research areas. The problems in one area may be solved in the other area… (more)

Subjects/Keywords: Attribute-Based Encryption; Key-Aggregation Cryptosystem; Constant-Size Private Key; Linear Secret Sharing; Key Encapsulation Mechanism; Generic Construction

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

E, C. (2017). Conversion Between Attribute-Based Encryptions and Key-Aggregate Cryptosystems. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720117-152909

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

E, Cheng-yuan. “Conversion Between Attribute-Based Encryptions and Key-Aggregate Cryptosystems.” 2017. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720117-152909.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

E, Cheng-yuan. “Conversion Between Attribute-Based Encryptions and Key-Aggregate Cryptosystems.” 2017. Web. 12 Nov 2019.

Vancouver:

E C. Conversion Between Attribute-Based Encryptions and Key-Aggregate Cryptosystems. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720117-152909.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

E C. Conversion Between Attribute-Based Encryptions and Key-Aggregate Cryptosystems. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720117-152909

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Sung, Cheng-wei. On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

 In 2010, Fan extit{et al.} first introduced the concept of anonymous multi-receiver identity-based encryption (AMRIBE). They used the concept of Fujisaki-Okamoto transformation (F.O. transformation) to… (more)

Subjects/Keywords: Identity-Based Encryption; Chosen-Ciphertext Attacks; Anonymity; Fujisaki-Okamoto Transformation; Insider Attacks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sung, C. (2017). On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-210325

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sung, Cheng-wei. “On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.” 2017. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-210325.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sung, Cheng-wei. “On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.” 2017. Web. 12 Nov 2019.

Vancouver:

Sung C. On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation. [Internet] [Thesis]. NSYSU; 2017. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-210325.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sung C. On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0721117-210325

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

19. Kuo, Chia-Hsiu. Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 The development of the Internet, especially the rise of cloud computing, is providing more and more users (individuals as well as enterprises) access to cloud… (more)

Subjects/Keywords: Access Control; Data De-Duplication; Data Privacy; Cloud Computing; Attribute-Based Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, C. (2013). Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Chia-Hsiu. “Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data.” 2013. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Chia-Hsiu. “Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data.” 2013. Web. 12 Nov 2019.

Vancouver:

Kuo C. Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo C. Attribute-Based Encryption with Dual Lagrange Polynomials for Multiple Overlapped Data. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0702113-114224

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

20. Hsu, Wen-che. Privacy Preserving Data Deduplication in Cloud Storage.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 In recent years, cloud computing has become increasingly popular. The goal of cloud computing is to reuse resources such as computing and storage resources. A… (more)

Subjects/Keywords: Data Compression; Encryption; Data Deduplication; Privacy Protection; Cloud Storage

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, W. (2013). Privacy Preserving Data Deduplication in Cloud Storage. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Wen-che. “Privacy Preserving Data Deduplication in Cloud Storage.” 2013. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Wen-che. “Privacy Preserving Data Deduplication in Cloud Storage.” 2013. Web. 12 Nov 2019.

Vancouver:

Hsu W. Privacy Preserving Data Deduplication in Cloud Storage. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu W. Privacy Preserving Data Deduplication in Cloud Storage. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712113-103524

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Cheng, Chen-Kai. Secure File Transfer Procotol for Named Data Network.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 In traditional TCP/IP network architecture, computer systems communicate with each other based on IP address; Because of usersâ network flow requirement and usage amount nowadays,… (more)

Subjects/Keywords: Secure Transfer Protocol; Authorization; Proxy Re-Encryption; Named Data Network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, C. (2013). Secure File Transfer Procotol for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Chen-Kai. “Secure File Transfer Procotol for Named Data Network.” 2013. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Chen-Kai. “Secure File Transfer Procotol for Named Data Network.” 2013. Web. 12 Nov 2019.

Vancouver:

Cheng C. Secure File Transfer Procotol for Named Data Network. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng C. Secure File Transfer Procotol for Named Data Network. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-162355

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

22. Hsu, Jen-Chun. Anonymous Credential Scheme Supporting Active Revocation.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 With the rapid development of electronic commerce, digital credentials are used with increasing frequency. Today users employing digital credentials not only com- plete the identity… (more)

Subjects/Keywords: Revocation; Cryptography; Privacy; Anonymity; Digital Credential

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, J. (2013). Anonymous Credential Scheme Supporting Active Revocation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Jen-Chun. “Anonymous Credential Scheme Supporting Active Revocation.” 2013. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Jen-Chun. “Anonymous Credential Scheme Supporting Active Revocation.” 2013. Web. 12 Nov 2019.

Vancouver:

Hsu J. Anonymous Credential Scheme Supporting Active Revocation. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu J. Anonymous Credential Scheme Supporting Active Revocation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-180246

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

23. Gao, Han. Anonymous Fair P2P-Lending Scheme.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 P2P-Lending (P2PL) is a new kind of private lending with the feature like loan interest rate marketlized and distributed borrowers/lenders, etc. The development of lending… (more)

Subjects/Keywords: Fairness; Traceable; Electronic Contract; Proxy Signature; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gao, H. (2015). Anonymous Fair P2P-Lending Scheme. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Gao, Han. “Anonymous Fair P2P-Lending Scheme.” 2015. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Gao, Han. “Anonymous Fair P2P-Lending Scheme.” 2015. Web. 12 Nov 2019.

Vancouver:

Gao H. Anonymous Fair P2P-Lending Scheme. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Gao H. Anonymous Fair P2P-Lending Scheme. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0725115-011139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

24. Huang, Shih-wei. Strong Privacy Preserving Communication Protocol for VANETs.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 Vehicular ad hoc networks (VANETs) are instances of mobile ad hoc networks with the aim to enhance the safety and efficiency of road traffic. The… (more)

Subjects/Keywords: Blind Signature; Vehicular Communication; Privacy Preservation; Authentication; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, S. (2011). Strong Privacy Preserving Communication Protocol for VANETs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Shih-wei. “Strong Privacy Preserving Communication Protocol for VANETs.” 2011. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Shih-wei. “Strong Privacy Preserving Communication Protocol for VANETs.” 2011. Web. 12 Nov 2019.

Vancouver:

Huang S. Strong Privacy Preserving Communication Protocol for VANETs. [Internet] [Thesis]. NSYSU; 2011. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang S. Strong Privacy Preserving Communication Protocol for VANETs. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0823111-191024

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

25. Lin, Yi-Hui. Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In smart gird environment, the power usage will be monitored and managed by an operation center that will also dynamically adjust the supply and demand… (more)

Subjects/Keywords: Smart Grid; Paillier Cryptosystem; Super-increasing Sequence; Data Aggregation; Privacy-Preserving

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2015). Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yi-Hui. “Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid.” 2015. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yi-Hui. “Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid.” 2015. Web. 12 Nov 2019.

Vancouver:

Lin Y. Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Flexible and Privacy-Preserving Data Aggregation Scheme in Smart Grid. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806115-172034

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

26. Chu, Huan-Kai. Mutually Anonymous Fair Exchange Protocol with Offline Third Party.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 With the rapid development of e-commerce, fair exchange has become an important and issue worthy of further discussion. Additionally, owing to rising awareness of privacy… (more)

Subjects/Keywords: fairness; off-line third party; mutually anonymous; fair exchange

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chu, H. (2015). Mutually Anonymous Fair Exchange Protocol with Offline Third Party. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chu, Huan-Kai. “Mutually Anonymous Fair Exchange Protocol with Offline Third Party.” 2015. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chu, Huan-Kai. “Mutually Anonymous Fair Exchange Protocol with Offline Third Party.” 2015. Web. 12 Nov 2019.

Vancouver:

Chu H. Mutually Anonymous Fair Exchange Protocol with Offline Third Party. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chu H. Mutually Anonymous Fair Exchange Protocol with Offline Third Party. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0808115-230408

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

27. Hau, Hoi-tung. Date Attachable Offline Electronic Cash Scheme.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 With the convenience of mobile network, people can do different kinds of activities, such as payments, shopping, auctions, and so on, whenever and wherever. Electronic… (more)

Subjects/Keywords: Blind Signature; Offline Electronic Cash; Electronic Payment; Anonymity; Electronic Commerce

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hau, H. (2011). Date Attachable Offline Electronic Cash Scheme. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803111-115949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hau, Hoi-tung. “Date Attachable Offline Electronic Cash Scheme.” 2011. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803111-115949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hau, Hoi-tung. “Date Attachable Offline Electronic Cash Scheme.” 2011. Web. 12 Nov 2019.

Vancouver:

Hau H. Date Attachable Offline Electronic Cash Scheme. [Internet] [Thesis]. NSYSU; 2011. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803111-115949.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hau H. Date Attachable Offline Electronic Cash Scheme. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0803111-115949

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

28. Tsai, Pei-Jen. Anonymous Multi-Receiver Certificate-Based Encryption.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 In a multi-receiver encryption environment, a sender can randomly choose a set of authorized receivers while distributing messages to them efficiently and securely. Recently, more… (more)

Subjects/Keywords: Key Escrow Freeness; Multi-Receiver Encryption; Bilinear Pairing; Certificate-Based Encryption; Anonymity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, P. (2011). Anonymous Multi-Receiver Certificate-Based Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816111-133909

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Pei-Jen. “Anonymous Multi-Receiver Certificate-Based Encryption.” 2011. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816111-133909.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Pei-Jen. “Anonymous Multi-Receiver Certificate-Based Encryption.” 2011. Web. 12 Nov 2019.

Vancouver:

Tsai P. Anonymous Multi-Receiver Certificate-Based Encryption. [Internet] [Thesis]. NSYSU; 2011. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816111-133909.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai P. Anonymous Multi-Receiver Certificate-Based Encryption. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0816111-133909

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

29. Chen, Jun-Cheng. Timed-Release Proxy Conditional Re-Encryption for Cloud Computing.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 The mobile technology is being developed very fast and it is a general situation where people can fetch or edit files via the Internet by… (more)

Subjects/Keywords: Timed-Release Scheme; Designated Ciphertext Delegation; Re-Encryption; Data Protection; Cloud Computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, J. (2011). Timed-Release Proxy Conditional Re-Encryption for Cloud Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830111-031817

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Jun-Cheng. “Timed-Release Proxy Conditional Re-Encryption for Cloud Computing.” 2011. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830111-031817.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Jun-Cheng. “Timed-Release Proxy Conditional Re-Encryption for Cloud Computing.” 2011. Web. 12 Nov 2019.

Vancouver:

Chen J. Timed-Release Proxy Conditional Re-Encryption for Cloud Computing. [Internet] [Thesis]. NSYSU; 2011. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830111-031817.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen J. Timed-Release Proxy Conditional Re-Encryption for Cloud Computing. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830111-031817

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

30. Chen, Shih-fen. Multi-Receiver Predicate Encryption for Online Social Networks.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 Among the applications of the internet and cloud computing, OSNs is the most popular one. Since lots of personal information will be stored on the… (more)

Subjects/Keywords: Predicate Encryption; Inner Product Encryption; Online Social Networks; Multi-Receiver; Bilinear Groups of Composite Order

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, S. (2015). Multi-Receiver Predicate Encryption for Online Social Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Shih-fen. “Multi-Receiver Predicate Encryption for Online Social Networks.” 2015. Thesis, NSYSU. Accessed November 12, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Shih-fen. “Multi-Receiver Predicate Encryption for Online Social Networks.” 2015. Web. 12 Nov 2019.

Vancouver:

Chen S. Multi-Receiver Predicate Encryption for Online Social Networks. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Nov 12]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen S. Multi-Receiver Predicate Encryption for Online Social Networks. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-130243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2]

.