Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("Chung-Huang Yang"). Showing records 1 – 26 of 26 total matches.

Search Limiters

Last 2 Years | English Only

▼ Search Limiters


NSYSU

1. Cheng, Yen-hung. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In recent years, the development of mobile networks is thriving or flourishing from 2G GSM, 2.5G GPRS, 3G UMTS to All-IP 4G, which integrates all… (more)

Subjects/Keywords: Forward Secrecy; UMTS; False Base Attacks; Mobile Networks; Location Privacy; Mutual Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2009). One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yen-hung. “One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks.” 2009. Web. 10 May 2021.

Vancouver:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Internet] [Thesis]. NSYSU; 2009. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. One-Round Mutual Authentication Mechanism Based on Symmetric-Key Cryptosystems with Forward Secrecy and Location Privacy for Wireless Networks. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0812109-202320

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Chen, Yung-Chih. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 It is necessary to authenticate users when they want to access services in WLANs. Extensible Authentication Protocol (EAP) is an authentication framework widely used in… (more)

Subjects/Keywords: Extensible Authentication Protocol (EAP); Lightweight Computation; Wireless Local Area Networks (WLANs); Three-Factor Authentication; Forward Secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Web. 10 May 2021.

Vancouver:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Internet] [Thesis]. NSYSU; 2009. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Yu, Yao-chun. An E-Cash Protocol with Efficient Double-Spending Revocability.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Due to the fast progress of the internet technologies, electronic commerce becomes more and more popular. Many people and businesses deal with their transactions via… (more)

Subjects/Keywords: Double-Spending; Chameleon Hash Functions; E-Cash; Anonymity; Untraceability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, Y. (2009). An E-Cash Protocol with Efficient Double-Spending Revocability. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Yao-chun. “An E-Cash Protocol with Efficient Double-Spending Revocability.” 2009. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Yao-chun. “An E-Cash Protocol with Efficient Double-Spending Revocability.” 2009. Web. 10 May 2021.

Vancouver:

Yu Y. An E-Cash Protocol with Efficient Double-Spending Revocability. [Internet] [Thesis]. NSYSU; 2009. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Y. An E-Cash Protocol with Efficient Double-Spending Revocability. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Huang, Yu-Kai. Improved Security Protocols for SCTP.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 With fast and prosperous development in communication technology, desktop or mobile devices may be equipped with wired and wireless network interfaces. Hence, users need a… (more)

Subjects/Keywords: Stream Control Transmission Protocol (SCTP); Cryptography; Multihoming; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2009). Improved Security Protocols for SCTP. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Yu-Kai. “Improved Security Protocols for SCTP.” 2009. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Yu-Kai. “Improved Security Protocols for SCTP.” 2009. Web. 10 May 2021.

Vancouver:

Huang Y. Improved Security Protocols for SCTP. [Internet] [Thesis]. NSYSU; 2009. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Y. Improved Security Protocols for SCTP. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828109-124953

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Liao, Shih-Yi. Message Authentication, Anonymousness and Private Communication in VANETs without RSU.

Degree: Master, Electrical Engineering, 2013, NSYSU

 Vehicular ad-hoc networks(VANETs) is a popular topic received attention of academia in recent years. By broadcasting messages among vehicles can pass the information about the… (more)

Subjects/Keywords: Anonymousness; RSP; Message Authentication; Private communication; VANETs

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liao, S. (2013). Message Authentication, Anonymousness and Private Communication in VANETs without RSU. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Liao, Shih-Yi. “Message Authentication, Anonymousness and Private Communication in VANETs without RSU.” 2013. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Liao, Shih-Yi. “Message Authentication, Anonymousness and Private Communication in VANETs without RSU.” 2013. Web. 10 May 2021.

Vancouver:

Liao S. Message Authentication, Anonymousness and Private Communication in VANETs without RSU. [Internet] [Thesis]. NSYSU; 2013. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Liao S. Message Authentication, Anonymousness and Private Communication in VANETs without RSU. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0618113-120020

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Cho, Yan-Fu. Authenticated Re-Encryption Scheme for Named Data Network.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 With the rapid growth of technology and the Internet, the digital communication is increasingly based on the architecture of TCP/IP. However, TCP/IPâs architecture has limitations… (more)

Subjects/Keywords: Authentication; Secure Transfer Protocol; Named Data Network; Proxy Re-Encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cho, Y. (2014). Authenticated Re-Encryption Scheme for Named Data Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cho, Yan-Fu. “Authenticated Re-Encryption Scheme for Named Data Network.” 2014. Web. 10 May 2021.

Vancouver:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cho Y. Authenticated Re-Encryption Scheme for Named Data Network. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-175841

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Lin, Yu-chi. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a collaborative workflow platform, when a group leader receives a document which requires cooperators' support, she/he assigns the task to the cooperators. Each cooperator… (more)

Subjects/Keywords: Online/Offline Signature; Trapdoor Hash Function; Collaborative Workflow Platform

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2014). Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yu-chi. “Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.” 2014. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yu-chi. “Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function.” 2014. Web. 10 May 2021.

Vancouver:

Lin Y. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0718114-144850

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Zhong, Min-Zhe. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Due to the rising number of mobile devices and the increasing demand for better quality of service (QoS), issues related to the next generation of… (more)

Subjects/Keywords: handover; authentication; privacy preserving; active revocation; 5G mobile communications

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhong, M. (2014). Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Zhong, Min-Zhe. “Fast Handover Authentication for Fifth Generation (5G) Mobile Communications.” 2014. Web. 10 May 2021.

Vancouver:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Internet] [Thesis]. NSYSU; 2014. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Zhong M. Fast Handover Authentication for Fifth Generation (5G) Mobile Communications. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715114-180628

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Chen, Liang-Chih. The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 In the VANET environment, the security of traffic information between vehicles is very important. The messages need to be real-time, and the complexity of authentication… (more)

Subjects/Keywords: Chameleon hashing function; VANET; Identity-based Cryptography; Message Authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, L. (2011). The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Liang-Chih. “The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks.” 2011. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Liang-Chih. “The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks.” 2011. Web. 10 May 2021.

Vancouver:

Chen L. The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks. [Internet] [Thesis]. NSYSU; 2011. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen L. The Authentication Scheme Based on IBC and Chameleon Hashing for Vehicular Ad-Hoc Networks. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-175911

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Chen, Nan-Tung. Reversible Watermarking Using Multi-Prediction values.

Degree: Master, Computer Science and Engineering, 2011, NSYSU

 Reversible watermarking techniques extract the watermark and recover the original image from the watermarked image without any distortion. They have been applied for those sensitive… (more)

Subjects/Keywords: histogram shifting; prediction; watermarking; reversible watermarking

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, N. (2011). Reversible Watermarking Using Multi-Prediction values. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-165538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Nan-Tung. “Reversible Watermarking Using Multi-Prediction values.” 2011. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-165538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Nan-Tung. “Reversible Watermarking Using Multi-Prediction values.” 2011. Web. 10 May 2021.

Vancouver:

Chen N. Reversible Watermarking Using Multi-Prediction values. [Internet] [Thesis]. NSYSU; 2011. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-165538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen N. Reversible Watermarking Using Multi-Prediction values. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0720111-165538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Huang, Li-te. Improving the Caching Performances in Web using Cooperative Proxies.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Nowadays, Web caching technique has been widely used and become one of the most promising ways to reduce network traffic, server load, and user-experienced latency… (more)

Subjects/Keywords: Hit Ratio; Cache Cooperation; Proxies; Web Caching

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, L. (2009). Improving the Caching Performances in Web using Cooperative Proxies. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203109-152521

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Li-te. “Improving the Caching Performances in Web using Cooperative Proxies.” 2009. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203109-152521.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Li-te. “Improving the Caching Performances in Web using Cooperative Proxies.” 2009. Web. 10 May 2021.

Vancouver:

Huang L. Improving the Caching Performances in Web using Cooperative Proxies. [Internet] [Thesis]. NSYSU; 2009. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203109-152521.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang L. Improving the Caching Performances in Web using Cooperative Proxies. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0203109-152521

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Lin, Jiun-An. Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Wireless sensor networks (WSNs) have been widely used in many areas, such as early earthquake monitoring, building structure monitoring, and military surveillance. In this thesis,… (more)

Subjects/Keywords: prediction.; node capture attack; security analysis; wireless sensor network; key management scheme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2012). Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0206112-161954

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Jiun-An. “Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective.” 2012. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0206112-161954.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Jiun-An. “Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective.” 2012. Web. 10 May 2021.

Vancouver:

Lin J. Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective. [Internet] [Thesis]. NSYSU; 2012. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0206112-161954.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin J. Analysis of Random Key Predistribution Scheme for Wireless Sensor Network: An Adversarial Perspective. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0206112-161954

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

13. Sun, Wei-Zhe. Provably Secure Randomized Blind Signature Scheme and Its Application.

Degree: PhD, Computer Science and Engineering, 2011, NSYSU

 Due to resource-saving and efficiency consideration, electronic voting (e-voting) gradually replaces traditional paper-based voting in some developed countries. An anonymous e-voting system that can be… (more)

Subjects/Keywords: Information Security; Blind Signatures; Cryptography; Uncoercibility; Electronic Voting

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sun, W. (2011). Provably Secure Randomized Blind Signature Scheme and Its Application. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719111-174117

Chicago Manual of Style (16th Edition):

Sun, Wei-Zhe. “Provably Secure Randomized Blind Signature Scheme and Its Application.” 2011. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719111-174117.

MLA Handbook (7th Edition):

Sun, Wei-Zhe. “Provably Secure Randomized Blind Signature Scheme and Its Application.” 2011. Web. 10 May 2021.

Vancouver:

Sun W. Provably Secure Randomized Blind Signature Scheme and Its Application. [Internet] [Doctoral dissertation]. NSYSU; 2011. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719111-174117.

Council of Science Editors:

Sun W. Provably Secure Randomized Blind Signature Scheme and Its Application. [Doctoral Dissertation]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719111-174117

14. Lin, Yi-Hui. User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking.

Degree: PhD, Computer Science and Engineering, 2012, NSYSU

 Authentication protocols are used for two parties to authenticate each other and build a secure channel over wired or wireless public channels. However, the present… (more)

Subjects/Keywords: Wireless Local Area Networks (WLANs); Wired and Wireless Security; Model Checking; Standard Reduction; Formal Security Proofs; Lightweight Devices; Authentication; Passwords; Smart Cards; Forward Secrecy; Extensible Authentication Protocol (EAP); Biometric Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2012). User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-040549

Chicago Manual of Style (16th Edition):

Lin, Yi-Hui. “User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking.” 2012. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-040549.

MLA Handbook (7th Edition):

Lin, Yi-Hui. “User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking.” 2012. Web. 10 May 2021.

Vancouver:

Lin Y. User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking. [Internet] [Doctoral dissertation]. NSYSU; 2012. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-040549.

Council of Science Editors:

Lin Y. User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking. [Doctoral Dissertation]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0912112-040549


NSYSU

15. Weng, Mu-Lung. Incentive Mechanism Using Game Theory for Wireless Multi-hop Networks.

Degree: PhD, Computer Science and Engineering, 2014, NSYSU

 Due to the low cost, easy deployment, wireless multi-hop networks have attracted many researchersâ attention in recent years. In wireless multi-hop network, the nodes are… (more)

Subjects/Keywords: Wireless multi-hop network; Game Theory; Evolutionary Game Theory; Stag Hunt game; Mechanism Design

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Weng, M. (2014). Incentive Mechanism Using Game Theory for Wireless Multi-hop Networks. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0112114-221249

Chicago Manual of Style (16th Edition):

Weng, Mu-Lung. “Incentive Mechanism Using Game Theory for Wireless Multi-hop Networks.” 2014. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0112114-221249.

MLA Handbook (7th Edition):

Weng, Mu-Lung. “Incentive Mechanism Using Game Theory for Wireless Multi-hop Networks.” 2014. Web. 10 May 2021.

Vancouver:

Weng M. Incentive Mechanism Using Game Theory for Wireless Multi-hop Networks. [Internet] [Doctoral dissertation]. NSYSU; 2014. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0112114-221249.

Council of Science Editors:

Weng M. Incentive Mechanism Using Game Theory for Wireless Multi-hop Networks. [Doctoral Dissertation]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0112114-221249


NSYSU

16. Chen, Yi-uan. Analysis and Evaluation of Random-Based Message Propagation Models on the Social Networks.

Degree: PhD, Computer Science and Engineering, 2016, NSYSU

 Social network services (SNS) have become a major internet service for people to communicate with each other. It is full of complex relationships among people… (more)

Subjects/Keywords: Hadoop; MPM (Message Propagation Model); Cloud computing; SNS (Social Network Service); Social Cluster

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2016). Analysis and Evaluation of Random-Based Message Propagation Models on the Social Networks. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0627116-090424

Chicago Manual of Style (16th Edition):

Chen, Yi-uan. “Analysis and Evaluation of Random-Based Message Propagation Models on the Social Networks.” 2016. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0627116-090424.

MLA Handbook (7th Edition):

Chen, Yi-uan. “Analysis and Evaluation of Random-Based Message Propagation Models on the Social Networks.” 2016. Web. 10 May 2021.

Vancouver:

Chen Y. Analysis and Evaluation of Random-Based Message Propagation Models on the Social Networks. [Internet] [Doctoral dissertation]. NSYSU; 2016. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0627116-090424.

Council of Science Editors:

Chen Y. Analysis and Evaluation of Random-Based Message Propagation Models on the Social Networks. [Doctoral Dissertation]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0627116-090424


NSYSU

17. Tai, Chih-kun. A Real-Time Traffic-Aware Routing Strategy for Vehicular Ad-Hoc Networks.

Degree: PhD, Computer Science and Engineering, 2016, NSYSU

 Since high mobility of vehicle and variable network topology are challenges in Vehicular Ad Hoc Networks (VANETs), routing protocols in Mobile Ad Hoc Network (MANET)… (more)

Subjects/Keywords: vehicular ad hoc networks (VANETs); mobile ad hoc network (MANET); traffic flow; routing protocol; Quality-of Service (QoS); link quality

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tai, C. (2016). A Real-Time Traffic-Aware Routing Strategy for Vehicular Ad-Hoc Networks. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806116-095312

Chicago Manual of Style (16th Edition):

Tai, Chih-kun. “A Real-Time Traffic-Aware Routing Strategy for Vehicular Ad-Hoc Networks.” 2016. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806116-095312.

MLA Handbook (7th Edition):

Tai, Chih-kun. “A Real-Time Traffic-Aware Routing Strategy for Vehicular Ad-Hoc Networks.” 2016. Web. 10 May 2021.

Vancouver:

Tai C. A Real-Time Traffic-Aware Routing Strategy for Vehicular Ad-Hoc Networks. [Internet] [Doctoral dissertation]. NSYSU; 2016. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806116-095312.

Council of Science Editors:

Tai C. A Real-Time Traffic-Aware Routing Strategy for Vehicular Ad-Hoc Networks. [Doctoral Dissertation]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0806116-095312


NSYSU

18. Liang, Yu-Kuang. Privacy Enhancement Mechanisms for Electronic Payment Protocols.

Degree: PhD, Computer Science and Engineering, 2013, NSYSU

 ããWith the development of electronic commerce, an increasing number of users are willing to adopt electronic payment in order to experience fast and convenient online… (more)

Subjects/Keywords: Micropayment; Fair Transaction; Fairness; Security; Privacy; Electronic Commerce

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Liang, Y. (2013). Privacy Enhancement Mechanisms for Electronic Payment Protocols. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204113-220957

Chicago Manual of Style (16th Edition):

Liang, Yu-Kuang. “Privacy Enhancement Mechanisms for Electronic Payment Protocols.” 2013. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204113-220957.

MLA Handbook (7th Edition):

Liang, Yu-Kuang. “Privacy Enhancement Mechanisms for Electronic Payment Protocols.” 2013. Web. 10 May 2021.

Vancouver:

Liang Y. Privacy Enhancement Mechanisms for Electronic Payment Protocols. [Internet] [Doctoral dissertation]. NSYSU; 2013. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204113-220957.

Council of Science Editors:

Liang Y. Privacy Enhancement Mechanisms for Electronic Payment Protocols. [Doctoral Dissertation]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204113-220957


NSYSU

19. Su, Tung-shih. The Researches on Performance Enhancement in Ad Hoc Networks.

Degree: PhD, Computer Science and Engineering, 2010, NSYSU

 The most studies on ad hoc network mainly focus on TCP (Transmission Control Protocol) of transport layer, the routing of network layer, multi-hop of Data-link… (more)

Subjects/Keywords: IP naming; channel assignment; ad hoc networks; dual-card-mode; code division; pre-deployment; network interface card; self-organization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Su, T. (2010). The Researches on Performance Enhancement in Ad Hoc Networks. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0105110-170618

Chicago Manual of Style (16th Edition):

Su, Tung-shih. “The Researches on Performance Enhancement in Ad Hoc Networks.” 2010. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0105110-170618.

MLA Handbook (7th Edition):

Su, Tung-shih. “The Researches on Performance Enhancement in Ad Hoc Networks.” 2010. Web. 10 May 2021.

Vancouver:

Su T. The Researches on Performance Enhancement in Ad Hoc Networks. [Internet] [Doctoral dissertation]. NSYSU; 2010. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0105110-170618.

Council of Science Editors:

Su T. The Researches on Performance Enhancement in Ad Hoc Networks. [Doctoral Dissertation]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0105110-170618


NSYSU

20. Lin, Jyh-Long. An Efficient Method to Increase the Capacity of Digital Watermarking.

Degree: Master, Computer Science and Engineering, 2000, NSYSU

 Digital watermarking technology is a potential future technology, which uses to protect copyright. Traditional digital watermarking is usually suffered from the limited information capacity and… (more)

Subjects/Keywords: Digital Watermarking; Quality; Capacity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2000). An Efficient Method to Increase the Capacity of Digital Watermarking. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0710100-164312

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Jyh-Long. “An Efficient Method to Increase the Capacity of Digital Watermarking.” 2000. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0710100-164312.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Jyh-Long. “An Efficient Method to Increase the Capacity of Digital Watermarking.” 2000. Web. 10 May 2021.

Vancouver:

Lin J. An Efficient Method to Increase the Capacity of Digital Watermarking. [Internet] [Thesis]. NSYSU; 2000. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0710100-164312.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin J. An Efficient Method to Increase the Capacity of Digital Watermarking. [Thesis]. NSYSU; 2000. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0710100-164312

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Huang, Tien-Chi. An Adaptive Route Optimization Scheme for Mobile IP Networks.

Degree: Master, Computer Science and Engineering, 2005, NSYSU

 In mobile IP, a triangular routing problem usually leads to additional delays and non-seamless handoff, which causes the loss of a large amount of in-fly… (more)

Subjects/Keywords: seamless handoff; mobile IP; route optimization

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, T. (2005). An Adaptive Route Optimization Scheme for Mobile IP Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802105-162040

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Tien-Chi. “An Adaptive Route Optimization Scheme for Mobile IP Networks.” 2005. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802105-162040.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Tien-Chi. “An Adaptive Route Optimization Scheme for Mobile IP Networks.” 2005. Web. 10 May 2021.

Vancouver:

Huang T. An Adaptive Route Optimization Scheme for Mobile IP Networks. [Internet] [Thesis]. NSYSU; 2005. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802105-162040.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang T. An Adaptive Route Optimization Scheme for Mobile IP Networks. [Thesis]. NSYSU; 2005. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802105-162040

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

22. Hu, Li-Chun. Distributed Dynamic Channel Assignment of Multi-channel MAC Protocol in Ad-Hoc Network.

Degree: Master, Computer Science and Engineering, 2007, NSYSU

 This work proposes a distributed dynamic channel assignment of multi-channel MAC protocol in Ad-Hoc networks. Major characteristics of the proposed protocol are: (a) each mobile… (more)

Subjects/Keywords: channel assignment; multi-channel MAC protocol

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hu, L. (2007). Distributed Dynamic Channel Assignment of Multi-channel MAC Protocol in Ad-Hoc Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0801107-023909

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hu, Li-Chun. “Distributed Dynamic Channel Assignment of Multi-channel MAC Protocol in Ad-Hoc Network.” 2007. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0801107-023909.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hu, Li-Chun. “Distributed Dynamic Channel Assignment of Multi-channel MAC Protocol in Ad-Hoc Network.” 2007. Web. 10 May 2021.

Vancouver:

Hu L. Distributed Dynamic Channel Assignment of Multi-channel MAC Protocol in Ad-Hoc Network. [Internet] [Thesis]. NSYSU; 2007. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0801107-023909.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hu L. Distributed Dynamic Channel Assignment of Multi-channel MAC Protocol in Ad-Hoc Network. [Thesis]. NSYSU; 2007. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0801107-023909

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

23. Kao, Hui-hsiang. Throughput Analysis and Enhancement of Multi-Channel MAC Protocol in Ad-Hoc Networks.

Degree: Master, Computer Science and Engineering, 2006, NSYSU

 Multi-channel MAC protocol is that schedules frames to be exchanged on different channels. To analyze the performance of multi-channel MAC protocol, an analytical model is… (more)

Subjects/Keywords: multi-channel; throughput analysis; Ad-Hoc networks

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kao, H. (2006). Throughput Analysis and Enhancement of Multi-Channel MAC Protocol in Ad-Hoc Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907106-232921

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kao, Hui-hsiang. “Throughput Analysis and Enhancement of Multi-Channel MAC Protocol in Ad-Hoc Networks.” 2006. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907106-232921.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kao, Hui-hsiang. “Throughput Analysis and Enhancement of Multi-Channel MAC Protocol in Ad-Hoc Networks.” 2006. Web. 10 May 2021.

Vancouver:

Kao H. Throughput Analysis and Enhancement of Multi-Channel MAC Protocol in Ad-Hoc Networks. [Internet] [Thesis]. NSYSU; 2006. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907106-232921.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kao H. Throughput Analysis and Enhancement of Multi-Channel MAC Protocol in Ad-Hoc Networks. [Thesis]. NSYSU; 2006. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0907106-232921

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

24. Chan, Yung-Cheng. Robust Remote Authentication Schemes with Smart Cards.

Degree: Master, Computer Science and Engineering, 2005, NSYSU

 Due to low computation cost and convenient portability, smart cards are usually adopted to store the personal secret information of users for remote authentication. Although… (more)

Subjects/Keywords: Information security; Login; Remote authentication; Smart cards; Cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chan, Y. (2005). Robust Remote Authentication Schemes with Smart Cards. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chan, Yung-Cheng. “Robust Remote Authentication Schemes with Smart Cards.” 2005. Thesis, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chan, Yung-Cheng. “Robust Remote Authentication Schemes with Smart Cards.” 2005. Web. 10 May 2021.

Vancouver:

Chan Y. Robust Remote Authentication Schemes with Smart Cards. [Internet] [Thesis]. NSYSU; 2005. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chan Y. Robust Remote Authentication Schemes with Smart Cards. [Thesis]. NSYSU; 2005. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714105-165720

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

25. Wu, Chuan-Fu. The Research of Improving the Image Quality of Digital Watermarking Technique and Its Applications.

Degree: PhD, Computer Science and Engineering, 2001, NSYSU

 The major topic of this dissertation is how to improve the image quality and application of digital watermarking techniques. Most traditional digital watermarking techniques focus… (more)

Subjects/Keywords: Digital Watermarking Technique; Image Quality; Image Steganography; Key Distribution; Image Refining

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, C. (2001). The Research of Improving the Image Quality of Digital Watermarking Technique and Its Applications. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612101-142904

Chicago Manual of Style (16th Edition):

Wu, Chuan-Fu. “The Research of Improving the Image Quality of Digital Watermarking Technique and Its Applications.” 2001. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612101-142904.

MLA Handbook (7th Edition):

Wu, Chuan-Fu. “The Research of Improving the Image Quality of Digital Watermarking Technique and Its Applications.” 2001. Web. 10 May 2021.

Vancouver:

Wu C. The Research of Improving the Image Quality of Digital Watermarking Technique and Its Applications. [Internet] [Doctoral dissertation]. NSYSU; 2001. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612101-142904.

Council of Science Editors:

Wu C. The Research of Improving the Image Quality of Digital Watermarking Technique and Its Applications. [Doctoral Dissertation]. NSYSU; 2001. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0612101-142904


NSYSU

26. Jian, Ming-shen. Routing Distribution and Selection Based on Resource Management in Heterogeneous Mobile Wireless Networks.

Degree: PhD, Computer Science and Engineering, 2007, NSYSU

 In wireless ad hoc networks, the resources such as bandwidth, power, computing ability, etc., for end users are limited by the environments and hardware. In… (more)

Subjects/Keywords: Mobile Wireless Networks; Route Selection; Resource Management; Heterogeneous

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Jian, M. (2007). Routing Distribution and Selection Based on Resource Management in Heterogeneous Mobile Wireless Networks. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828107-114238

Chicago Manual of Style (16th Edition):

Jian, Ming-shen. “Routing Distribution and Selection Based on Resource Management in Heterogeneous Mobile Wireless Networks.” 2007. Doctoral Dissertation, NSYSU. Accessed May 10, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828107-114238.

MLA Handbook (7th Edition):

Jian, Ming-shen. “Routing Distribution and Selection Based on Resource Management in Heterogeneous Mobile Wireless Networks.” 2007. Web. 10 May 2021.

Vancouver:

Jian M. Routing Distribution and Selection Based on Resource Management in Heterogeneous Mobile Wireless Networks. [Internet] [Doctoral dissertation]. NSYSU; 2007. [cited 2021 May 10]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828107-114238.

Council of Science Editors:

Jian M. Routing Distribution and Selection Based on Resource Management in Heterogeneous Mobile Wireless Networks. [Doctoral Dissertation]. NSYSU; 2007. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0828107-114238

.