Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Chun-I Fan"). Showing records 1 – 30 of 120 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

▼ Search Limiters


NSYSU

1. Chiou, Yan-cheng. An Annealed Neural Network Approach to Solving the Mobile Agent Planning Problem.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Annealed neural network combines the characteristics of both simulation annealing and Hopfield-Tank neural network, which are high quality solutions and fast convergence. Mobile agent planning… (more)

Subjects/Keywords: Mobile agent planning; Hopfield neural network; Simulated annealing; Annealed neural network

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiou, Y. (2009). An Annealed Neural Network Approach to Solving the Mobile Agent Planning Problem. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-1211109-130320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiou, Yan-cheng. “An Annealed Neural Network Approach to Solving the Mobile Agent Planning Problem.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-1211109-130320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiou, Yan-cheng. “An Annealed Neural Network Approach to Solving the Mobile Agent Planning Problem.” 2009. Web. 19 Jun 2019.

Vancouver:

Chiou Y. An Annealed Neural Network Approach to Solving the Mobile Agent Planning Problem. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-1211109-130320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiou Y. An Annealed Neural Network Approach to Solving the Mobile Agent Planning Problem. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-1211109-130320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Jian, Wan-Rong. Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Computing A^X mod n or A^XB^Y mod n for large X, Y, and n is very important in many ElGamal-like public key cryptosystems. In this… (more)

Subjects/Keywords: Sparse Form; Modular Exponentiation; Block Method

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jian, W. (2009). Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Jian, Wan-Rong. “Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Jian, Wan-Rong. “Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form.” 2009. Web. 19 Jun 2019.

Vancouver:

Jian W. Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Jian W. Efficient Algorithms for Modular Exponentiation by Block Method in Sparse Form. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621109-172157

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Weng, Hui-Ze. Performance Analysis of Graph Algorithms using Graphics Processing Units.

Degree: Master, Computer Science and Engineering, 2010, NSYSU

 The GPU significantly improves the computing power by increasing the number of cores in recent years. The design principle of GPU focuses on the parallism… (more)

Subjects/Keywords: GPU; Parallel computing; Multi-Core

Page 1 Page 2 Page 3 Page 4 Page 5

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Weng, H. (2010). Performance Analysis of Graph Algorithms using Graphics Processing Units. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Weng, Hui-Ze. “Performance Analysis of Graph Algorithms using Graphics Processing Units.” 2010. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Weng, Hui-Ze. “Performance Analysis of Graph Algorithms using Graphics Processing Units.” 2010. Web. 19 Jun 2019.

Vancouver:

Weng H. Performance Analysis of Graph Algorithms using Graphics Processing Units. [Internet] [Thesis]. NSYSU; 2010. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Weng H. Performance Analysis of Graph Algorithms using Graphics Processing Units. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0902110-135238

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Hsin, Tsung-Chin. Design and Implementation of User Authentication Based on Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2008, NSYSU

 In the traditional login systems, we use the username and the password to identify the legalities of users. It is a simple and convenient way… (more)

Subjects/Keywords: User Authentication; Biometrics Feature; Keystroke Dynamic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsin, T. (2008). Design and Implementation of User Authentication Based on Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Web. 19 Jun 2019.

Vancouver:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Hou, Ya-Fang. An Improvement of The Multiple Polynomial Quadratic Sieve.

Degree: Master, Computer Science and Engineering, 2008, NSYSU

 Large integer factoring problem is a difficult computing problem. The security of many public-key cryptograohy system depend on the large interger factoring problem. Dr. Guan… (more)

Subjects/Keywords: the multiple polynomial quadratic sieve; factoring; quadratic sieve

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hou, Y. (2008). An Improvement of The Multiple Polynomial Quadratic Sieve. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hou, Ya-Fang. “An Improvement of The Multiple Polynomial Quadratic Sieve.” 2008. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hou, Ya-Fang. “An Improvement of The Multiple Polynomial Quadratic Sieve.” 2008. Web. 19 Jun 2019.

Vancouver:

Hou Y. An Improvement of The Multiple Polynomial Quadratic Sieve. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hou Y. An Improvement of The Multiple Polynomial Quadratic Sieve. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825108-013923

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Chen, Hsiao-ying. A Comparison of Three Verification Methods for Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In login systems, a user is asked to enter his correct account and password in order to be allowed to enter to the system. The… (more)

Subjects/Keywords: User Authentication; Keystroke Dynamic; Biometrics Feature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, H. (2009). A Comparison of Three Verification Methods for Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Web. 19 Jun 2019.

Vancouver:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Chen, Yan-heng. Analysis of Another Left Shift Binary GCD Algorithm.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In general, to compute the modular inverse is very important in information security, many encrypt/decrypt and signature algorithms always need to use it. In 2007,… (more)

Subjects/Keywords: Self-test; Modular inverse; GCD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). Analysis of Another Left Shift Binary GCD Algorithm. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yan-heng. “Analysis of Another Left Shift Binary GCD Algorithm.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yan-heng. “Analysis of Another Left Shift Binary GCD Algorithm.” 2009. Web. 19 Jun 2019.

Vancouver:

Chen Y. Analysis of Another Left Shift Binary GCD Algorithm. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. Analysis of Another Left Shift Binary GCD Algorithm. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Wu, De-kai. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Wireless sensor network has applications in environmental surveillance, healthcare, and military operations. Because the energy of sensor nodes is limited and nodes are unable to… (more)

Subjects/Keywords: Heuristic Algorithm; Wireless Sensor Network; Lifetime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, D. (2009). A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, De-kai. “A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, De-kai. “A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.” 2009. Web. 19 Jun 2019.

Vancouver:

Wu D. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu D. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Lin, Jia-bin. Anomaly Based Malicious URL Detection in Instant Messaging.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Instant messaging (IM) has been a platform of spreading malware for hackers due to its popularity and immediacy. To evade anti-virus detection, hacker might send… (more)

Subjects/Keywords: Malicious URL; Instant Messaging; IM Worms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2009). Anomaly Based Malicious URL Detection in Instant Messaging. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Jia-bin. “Anomaly Based Malicious URL Detection in Instant Messaging.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Jia-bin. “Anomaly Based Malicious URL Detection in Instant Messaging.” 2009. Web. 19 Jun 2019.

Vancouver:

Lin J. Anomaly Based Malicious URL Detection in Instant Messaging. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin J. Anomaly Based Malicious URL Detection in Instant Messaging. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Cheng, Yen-hung. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In recent years, the development of mobile networks is thriving or flourishing from 2G GSM, 2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all… (more)

Subjects/Keywords: Forward Secrecy; UMTS; False Base Attacks; Mobile Networks; Location Privacy; Mutual Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2009). One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Web. 19 Jun 2019.

Vancouver:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Chen, Yung-Chih. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 It is necessary to authenticate users when they want to access services in WLANs. Extensible Authentication Protocol (EAP) is an authentication framework widely used in… (more)

Subjects/Keywords: Extensible Authentication Protocol (EAP); Lightweight Computation; Wireless Local Area Networks (WLANs); Three-Factor Authentication; Forward Secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Web. 19 Jun 2019.

Vancouver:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Luo, Jing-Siang. Malicious Web Page Detection Based on Anomaly Semantics.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Web services are becoming the dominant way to provide access to on-line information. Web services have a lot of applications, like e-mail, web search engine,… (more)

Subjects/Keywords: Dynamic Webpage; Malicious Webpage; Web Application

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, J. (2009). Malicious Web Page Detection Based on Anomaly Semantics. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luo, Jing-Siang. “Malicious Web Page Detection Based on Anomaly Semantics.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luo, Jing-Siang. “Malicious Web Page Detection Based on Anomaly Semantics.” 2009. Web. 19 Jun 2019.

Vancouver:

Luo J. Malicious Web Page Detection Based on Anomaly Semantics. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luo J. Malicious Web Page Detection Based on Anomaly Semantics. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Yu, Yao-chun. An E-Cash Protocol with Efficient Double-Spending Revocability.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Due to the fast progress of the internet technologies, electronic commerce becomes more and more popular. Many people and businesses deal with their transactions via… (more)

Subjects/Keywords: Double-Spending; Chameleon Hash Functions; E-Cash; Anonymity; Untraceability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, Y. (2009). An E-Cash Protocol with Efficient Double-Spending Revocability. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Yao-chun. “An E-Cash Protocol with Efficient Double-Spending Revocability.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Yao-chun. “An E-Cash Protocol with Efficient Double-Spending Revocability.” 2009. Web. 19 Jun 2019.

Vancouver:

Yu Y. An E-Cash Protocol with Efficient Double-Spending Revocability. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Y. An E-Cash Protocol with Efficient Double-Spending Revocability. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Huang, Yu-Kai. Improved Security Protocols for SCTP.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 With fast and prosperous development in communication technology, desktop or mobile devices may be equipped with wired and wireless network interfaces. Hence, users need a… (more)

Subjects/Keywords: Stream Control Transmission Protocol (SCTP); Cryptography; Multihoming; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2009). Improved Security Protocols for SCTP. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Yu-Kai. “Improved Security Protocols for SCTP.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Yu-Kai. “Improved Security Protocols for SCTP.” 2009. Web. 19 Jun 2019.

Vancouver:

Huang Y. Improved Security Protocols for SCTP. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Y. Improved Security Protocols for SCTP. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

15. Lu, Yi-shan. Efficient Implementation of the Weil Pairing.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 The most efficient algorithm for solving the elliptic curve discrete logarithm problem can only be done in exponential time. Hence, we can use it in… (more)

Subjects/Keywords: Miller's algorithm; Weil Pairing; Elliptic Curve

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, Y. (2009). Efficient Implementation of the Weil Pairing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lu, Yi-shan. “Efficient Implementation of the Weil Pairing.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lu, Yi-shan. “Efficient Implementation of the Weil Pairing.” 2009. Web. 19 Jun 2019.

Vancouver:

Lu Y. Efficient Implementation of the Weil Pairing. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lu Y. Efficient Implementation of the Weil Pairing. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Chu, I-chun. Phishing Detection Based on URL and TF-IDF.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Peopel now use E-mail to communicate mutually is widespread. For example, schools convey information to students through e-mail, companies convey to the staff in charge… (more)

Subjects/Keywords: URL; Domain; Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chu, I. (2009). Phishing Detection Based on URL and TF-IDF. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Web. 19 Jun 2019.

Vancouver:

Chu I. Phishing Detection Based on URL and TF-IDF. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chu I. Phishing Detection Based on URL and TF-IDF. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. Huang, Ming-Zong. Hybrid Botnet Detection.

Degree: Master, Information Management, 2010, NSYSU

 There are three mail types of Botnet: IRC-based Botnet, P2P-based Botnet,Web-based Botnet and they have become major threat to the Internet recently. Web-based Botnet is… (more)

Subjects/Keywords: Botnet; Web-based Botnet; Fast Flux Domain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, M. (2010). Hybrid Botnet Detection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Ming-Zong. “Hybrid Botnet Detection.” 2010. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Ming-Zong. “Hybrid Botnet Detection.” 2010. Web. 19 Jun 2019.

Vancouver:

Huang M. Hybrid Botnet Detection. [Internet] [Thesis]. NSYSU; 2010. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang M. Hybrid Botnet Detection. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Ho, Pei-hsiu. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.

Degree: PhD, Computer Science and Engineering, 2011, NSYSU

 Wireless communication has played a very important role in people communication activities due to the properties of fast mobility and high portability. Many security mechanisms… (more)

Subjects/Keywords: one-time secrets; mobile security; mutual authentication; key exchange; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ho, P. (2011). Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909

Chicago Manual of Style (16th Edition):

Ho, Pei-hsiu. “Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.” 2011. Doctoral Dissertation, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909.

MLA Handbook (7th Edition):

Ho, Pei-hsiu. “Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.” 2011. Web. 19 Jun 2019.

Vancouver:

Ho P. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. [Internet] [Doctoral dissertation]. NSYSU; 2011. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909.

Council of Science Editors:

Ho P. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. [Doctoral Dissertation]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909


NSYSU

19. Tsai, Chen-yu. Applications of Homomorphic Encryption.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 First, we prove that if an asymmetric homomorphic encryption (homomorphic on addoperation) which can detect zero, detect equality, compare the value or detect overflow without… (more)

Subjects/Keywords: IND-CPA; detect zero; symmetric encryption scheme; asymmetric encryption; homomorphic encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, C. (2013). Applications of Homomorphic Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Web. 19 Jun 2019.

Vancouver:

Tsai C. Applications of Homomorphic Encryption. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai C. Applications of Homomorphic Encryption. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

20. Lin, Hui-chun. Study of Effectiveness of Social Engineering Spam Prevention Operation.

Degree: Master, Information Management, 2013, NSYSU

 Due to the rise of e-organization, a great quantity of valuable and confidential information is saved in digitalized way. With the more population of computer… (more)

Subjects/Keywords: Social Engineering; Spam; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, H. (2013). Study of Effectiveness of Social Engineering Spam Prevention Operation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Hui-chun. “Study of Effectiveness of Social Engineering Spam Prevention Operation.” 2013. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Hui-chun. “Study of Effectiveness of Social Engineering Spam Prevention Operation.” 2013. Web. 19 Jun 2019.

Vancouver:

Lin H. Study of Effectiveness of Social Engineering Spam Prevention Operation. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin H. Study of Effectiveness of Social Engineering Spam Prevention Operation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Chou, Chun-han. Malware Detection System Based on API Log Data Mining.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 As information technology improves, the Internet is involved in every area in our daily life. When the mobile devices and cloud computing technology start to… (more)

Subjects/Keywords: Classification; System Call; API; Data Mining; Malware

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chou, C. (2013). Malware Detection System Based on API Log Data Mining. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chou, Chun-han. “Malware Detection System Based on API Log Data Mining.” 2013. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chou, Chun-han. “Malware Detection System Based on API Log Data Mining.” 2013. Web. 19 Jun 2019.

Vancouver:

Chou C. Malware Detection System Based on API Log Data Mining. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chou C. Malware Detection System Based on API Log Data Mining. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714113-160717

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

22. Liu, Ming-Che. APT Attack Detection Based on DNS Time Frequency Analysis.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 Recently, malware infection has become one of the most serious threats against information security. Analysis and detection against malware are regarded as an important issue… (more)

Subjects/Keywords: Malware; Traffic Analysis; APT Attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liu, M. (2013). APT Attack Detection Based on DNS Time Frequency Analysis. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liu, Ming-Che. “APT Attack Detection Based on DNS Time Frequency Analysis.” 2013. Web. 19 Jun 2019.

Vancouver:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liu M. APT Attack Detection Based on DNS Time Frequency Analysis. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0723113-211137

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

23. Chiao, Feng. Multi-Factor Android Malware Detection System.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Since Apple and Google introduced iPhone and Android smartphones in 2007 and 2008, the market share of smartphones has been on the increase. Above all,… (more)

Subjects/Keywords: Malicious App Detection; Data Mining; Classifying; System Call; Permission

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chiao, F. (2014). Multi-Factor Android Malware Detection System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chiao, Feng. “Multi-Factor Android Malware Detection System.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chiao, Feng. “Multi-Factor Android Malware Detection System.” 2014. Web. 19 Jun 2019.

Vancouver:

Chiao F. Multi-Factor Android Malware Detection System. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chiao F. Multi-Factor Android Malware Detection System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-120229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

24. Tseng, Yi-Fan. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a massage securely and efficiently as the message is… (more)

Subjects/Keywords: Multi-Receiver Encryption; Anonymity; Identity-Based Encryption; Bilinear Pairing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, Y. (2014). Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Web. 19 Jun 2019.

Vancouver:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

25. Tseng, Shang-Wei. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Cloud computing is increasingly popular today. Cloud services such as data-outsourcing services provide a growing number of users access to cloud storage for large quantities… (more)

Subjects/Keywords: Dependable System; Data Outsourcing; Cloud-of-Clouds Approach; Cloud Computing; Data Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2014). Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Web. 19 Jun 2019.

Vancouver:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

26. Cheng, Yu-Shan. Parity Detection for Some Three-Modulus Residue Number System.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 The residue number system (RNS) can be applied to cryptography, image processing, digital filtering, parallel computation, and cloud computing. It represents a large integer using… (more)

Subjects/Keywords: parity detection technique; residue number system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2014). Parity Detection for Some Three-Modulus Residue Number System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Web. 19 Jun 2019.

Vancouver:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

27. Cho, Yan-Fu. Authenticated Re-Encryption Scheme for Named Data Network.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IPâs architecture has limitations… (more)

Subjects/Keywords: Authentication; Secure Transfer Protocol; Named Data Network; Proxy Re-Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, Y. (2014). Authenticated Re-Encryption Scheme for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Web. 19 Jun 2019.

Vancouver:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

28. Lin, Yu-chi. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a collaborative workflow platform, when a group leader receives a document which requires cooperators' support, she/he assigns the task to the cooperators. Each cooperator… (more)

Subjects/Keywords: Online/Offline Signature; Trapdoor Hash Function; Collaborative Workflow Platform

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2014). Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yu-chi. “Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yu-chi. “Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.” 2014. Web. 19 Jun 2019.

Vancouver:

Lin Y. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

29. Zhong, Min-Zhe. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Due to the rising number of mobile devices and the increasing demand for better quality of service (QoS), issues related to the next generation of… (more)

Subjects/Keywords: handover; authentication; privacy preserving; active revocation; 5G mobile communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, M. (2014). Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Web. 19 Jun 2019.

Vancouver:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

30. Yang, Yu-Wei. Design and Implementation of C Programming Language Extension for Parallel GPU Computing.

Degree: Master, Computer Science and Engineering, 2010, NSYSU

 NVIDIA developed a technique of executing general program on GPU, named CUDA (Compute Unified Device Architecture), in 2006. The CUDA programming model allows a group… (more)

Subjects/Keywords: CUDA; Multi-Thread; Parallelization; GPU

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yang, Y. (2010). Design and Implementation of C Programming Language Extension for Parallel GPU Computing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0727110-153900

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yang, Yu-Wei. “Design and Implementation of C Programming Language Extension for Parallel GPU Computing.” 2010. Thesis, NSYSU. Accessed June 19, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0727110-153900.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yang, Yu-Wei. “Design and Implementation of C Programming Language Extension for Parallel GPU Computing.” 2010. Web. 19 Jun 2019.

Vancouver:

Yang Y. Design and Implementation of C Programming Language Extension for Parallel GPU Computing. [Internet] [Thesis]. NSYSU; 2010. [cited 2019 Jun 19]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0727110-153900.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yang Y. Design and Implementation of C Programming Language Extension for Parallel GPU Computing. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0727110-153900

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4]

.