Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for +publisher:"NSYSU" +contributor:("D. J. Guan"). Showing records 1 – 30 of 98 total matches.

[1] [2] [3] [4]

Search Limiters

Last 2 Years | English Only

Degrees

Languages

▼ Search Limiters


NSYSU

1. Hsin, Tsung-Chin. Design and Implementation of User Authentication Based on Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2008, NSYSU

 In the traditional login systems, we use the username and the password to identify the legalities of users. It is a simple and convenient way… (more)

Subjects/Keywords: User Authentication; Biometrics Feature; Keystroke Dynamic

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsin, T. (2008). Design and Implementation of User Authentication Based on Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsin, Tsung-Chin. “Design and Implementation of User Authentication Based on Keystroke Dynamic.” 2008. Web. 17 Sep 2019.

Vancouver:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsin T. Design and Implementation of User Authentication Based on Keystroke Dynamic. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0128108-135223

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

2. Chang, Chia-Jung. Triangle-free subcubic graphs with small bipartite density.

Degree: Master, Applied Mathematics, 2008, NSYSU

 Suppose G is a graph with n vertices and m edges. Let nâ² be the maximum number of vertices in an induced bipartite subgraph of… (more)

Subjects/Keywords: planar graph; triangle-free; subcubic; bipartite density; bipartite ratio

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chang, C. (2008). Triangle-free subcubic graphs with small bipartite density. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620108-164144

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chang, Chia-Jung. “Triangle-free subcubic graphs with small bipartite density.” 2008. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620108-164144.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chang, Chia-Jung. “Triangle-free subcubic graphs with small bipartite density.” 2008. Web. 17 Sep 2019.

Vancouver:

Chang C. Triangle-free subcubic graphs with small bipartite density. [Internet] [Thesis]. NSYSU; 2008. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620108-164144.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chang C. Triangle-free subcubic graphs with small bipartite density. [Thesis]. NSYSU; 2008. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620108-164144

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

3. Chen, Hsiao-ying. A Comparison of Three Verification Methods for Keystroke Dynamic.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In login systems, a user is asked to enter his correct account and password in order to be allowed to enter to the system. The… (more)

Subjects/Keywords: User Authentication; Keystroke Dynamic; Biometrics Feature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, H. (2009). A Comparison of Three Verification Methods for Keystroke Dynamic. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Hsiao-ying. “A Comparison of Three Verification Methods for Keystroke Dynamic.” 2009. Web. 17 Sep 2019.

Vancouver:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen H. A Comparison of Three Verification Methods for Keystroke Dynamic. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0211109-214139

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

4. Tsai, Wan-yi. Malicious Web Page Detection Based on Anomaly Behavior.

Degree: Master, Information Management, 2009, NSYSU

 Because of the convenience of the Internet, we rely closely on the Internet to do information searching and sharing, forum discussion, and online services. However,… (more)

Subjects/Keywords: drive-by download; malicious web page; anomaly behavior

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, W. (2009). Malicious Web Page Detection Based on Anomaly Behavior. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Wan-yi. “Malicious Web Page Detection Based on Anomaly Behavior.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Wan-yi. “Malicious Web Page Detection Based on Anomaly Behavior.” 2009. Web. 17 Sep 2019.

Vancouver:

Tsai W. Malicious Web Page Detection Based on Anomaly Behavior. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai W. Malicious Web Page Detection Based on Anomaly Behavior. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

5. Chen, Yan-heng. Analysis of Another Left Shift Binary GCD Algorithm.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 In general, to compute the modular inverse is very important in information security, many encrypt/decrypt and signature algorithms always need to use it. In 2007,… (more)

Subjects/Keywords: Self-test; Modular inverse; GCD

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). Analysis of Another Left Shift Binary GCD Algorithm. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yan-heng. “Analysis of Another Left Shift Binary GCD Algorithm.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yan-heng. “Analysis of Another Left Shift Binary GCD Algorithm.” 2009. Web. 17 Sep 2019.

Vancouver:

Chen Y. Analysis of Another Left Shift Binary GCD Algorithm. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. Analysis of Another Left Shift Binary GCD Algorithm. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0714109-121741

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

6. Wu, De-kai. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Wireless sensor network has applications in environmental surveillance, healthcare, and military operations. Because the energy of sensor nodes is limited and nodes are unable to… (more)

Subjects/Keywords: Heuristic Algorithm; Wireless Sensor Network; Lifetime

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wu, D. (2009). A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wu, De-kai. “A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wu, De-kai. “A Heuristic Algorithm for Maximizing Lifetime in Sensor Network.” 2009. Web. 17 Sep 2019.

Vancouver:

Wu D. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wu D. A Heuristic Algorithm for Maximizing Lifetime in Sensor Network. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-154428

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

7. Lin, Jia-bin. Anomaly Based Malicious URL Detection in Instant Messaging.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Instant messaging (IM) has been a platform of spreading malware for hackers due to its popularity and immediacy. To evade anti-virus detection, hacker might send… (more)

Subjects/Keywords: Malicious URL; Instant Messaging; IM Worms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, J. (2009). Anomaly Based Malicious URL Detection in Instant Messaging. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Jia-bin. “Anomaly Based Malicious URL Detection in Instant Messaging.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Jia-bin. “Anomaly Based Malicious URL Detection in Instant Messaging.” 2009. Web. 17 Sep 2019.

Vancouver:

Lin J. Anomaly Based Malicious URL Detection in Instant Messaging. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin J. Anomaly Based Malicious URL Detection in Instant Messaging. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0715109-165704

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

8. Chen, Yung-Chih. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 It is necessary to authenticate users when they want to access services in WLANs. Extensible Authentication Protocol (EAP) is an authentication framework widely used in… (more)

Subjects/Keywords: Extensible Authentication Protocol (EAP); Lightweight Computation; Wireless Local Area Networks (WLANs); Three-Factor Authentication; Forward Secrecy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chen, Y. (2009). An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chen, Yung-Chih. “An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs.” 2009. Web. 17 Sep 2019.

Vancouver:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chen Y. An EAP Method with Biometrics Privacy Preserving in IEEE 802.11 Wireless LANs. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0815109-160229

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

9. Luo, Jing-Siang. Malicious Web Page Detection Based on Anomaly Semantics.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Web services are becoming the dominant way to provide access to on-line information. Web services have a lot of applications, like e-mail, web search engine,… (more)

Subjects/Keywords: Dynamic Webpage; Malicious Webpage; Web Application

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Luo, J. (2009). Malicious Web Page Detection Based on Anomaly Semantics. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Luo, Jing-Siang. “Malicious Web Page Detection Based on Anomaly Semantics.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Luo, Jing-Siang. “Malicious Web Page Detection Based on Anomaly Semantics.” 2009. Web. 17 Sep 2019.

Vancouver:

Luo J. Malicious Web Page Detection Based on Anomaly Semantics. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Luo J. Malicious Web Page Detection Based on Anomaly Semantics. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0820109-151509

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

10. Yu, Yao-chun. An E-Cash Protocol with Efficient Double-Spending Revocability.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Due to the fast progress of the internet technologies, electronic commerce becomes more and more popular. Many people and businesses deal with their transactions via… (more)

Subjects/Keywords: Double-Spending; Chameleon Hash Functions; E-Cash; Anonymity; Untraceability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yu, Y. (2009). An E-Cash Protocol with Efficient Double-Spending Revocability. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Yu, Yao-chun. “An E-Cash Protocol with Efficient Double-Spending Revocability.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Yu, Yao-chun. “An E-Cash Protocol with Efficient Double-Spending Revocability.” 2009. Web. 17 Sep 2019.

Vancouver:

Yu Y. An E-Cash Protocol with Efficient Double-Spending Revocability. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Yu Y. An E-Cash Protocol with Efficient Double-Spending Revocability. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0825109-012834

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

11. Lu, Yi-shan. Efficient Implementation of the Weil Pairing.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 The most efficient algorithm for solving the elliptic curve discrete logarithm problem can only be done in exponential time. Hence, we can use it in… (more)

Subjects/Keywords: Miller's algorithm; Weil Pairing; Elliptic Curve

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lu, Y. (2009). Efficient Implementation of the Weil Pairing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lu, Yi-shan. “Efficient Implementation of the Weil Pairing.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lu, Yi-shan. “Efficient Implementation of the Weil Pairing.” 2009. Web. 17 Sep 2019.

Vancouver:

Lu Y. Efficient Implementation of the Weil Pairing. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lu Y. Efficient Implementation of the Weil Pairing. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0831109-235209

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

12. Chu, I-chun. Phishing Detection Based on URL and TF-IDF.

Degree: Master, Computer Science and Engineering, 2009, NSYSU

 Peopel now use E-mail to communicate mutually is widespread. For example, schools convey information to students through e-mail, companies convey to the staff in charge… (more)

Subjects/Keywords: URL; Domain; Phishing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chu, I. (2009). Phishing Detection Based on URL and TF-IDF. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chu, I-chun. “Phishing Detection Based on URL and TF-IDF.” 2009. Web. 17 Sep 2019.

Vancouver:

Chu I. Phishing Detection Based on URL and TF-IDF. [Internet] [Thesis]. NSYSU; 2009. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chu I. Phishing Detection Based on URL and TF-IDF. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0908109-012739

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

13. Huang, Ming-Zong. Hybrid Botnet Detection.

Degree: Master, Information Management, 2010, NSYSU

 There are three mail types of Botnet: IRC-based Botnet, P2P-based Botnet,Web-based Botnet and they have become major threat to the Internet recently. Web-based Botnet is… (more)

Subjects/Keywords: Botnet; Web-based Botnet; Fast Flux Domain

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, M. (2010). Hybrid Botnet Detection. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Ming-Zong. “Hybrid Botnet Detection.” 2010. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Ming-Zong. “Hybrid Botnet Detection.” 2010. Web. 17 Sep 2019.

Vancouver:

Huang M. Hybrid Botnet Detection. [Internet] [Thesis]. NSYSU; 2010. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang M. Hybrid Botnet Detection. [Thesis]. NSYSU; 2010. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0813110-025210

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Ho, Pei-hsiu. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.

Degree: PhD, Computer Science and Engineering, 2011, NSYSU

 Wireless communication has played a very important role in people communication activities due to the properties of fast mobility and high portability. Many security mechanisms… (more)

Subjects/Keywords: one-time secrets; mobile security; mutual authentication; key exchange; information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Ho, P. (2011). Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. (Doctoral Dissertation). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909

Chicago Manual of Style (16th Edition):

Ho, Pei-hsiu. “Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.” 2011. Doctoral Dissertation, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909.

MLA Handbook (7th Edition):

Ho, Pei-hsiu. “Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.” 2011. Web. 17 Sep 2019.

Vancouver:

Ho P. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. [Internet] [Doctoral dissertation]. NSYSU; 2011. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909.

Council of Science Editors:

Ho P. Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. [Doctoral Dissertation]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0210111-172909


NSYSU

15. Tsai, Chen-yu. Applications of Homomorphic Encryption.

Degree: Master, Computer Science and Engineering, 2013, NSYSU

 First, we prove that if an asymmetric homomorphic encryption (homomorphic on addoperation) which can detect zero, detect equality, compare the value or detect overflow without… (more)

Subjects/Keywords: IND-CPA; detect zero; symmetric encryption scheme; asymmetric encryption; homomorphic encryption

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, C. (2013). Applications of Homomorphic Encryption. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Chen-yu. “Applications of Homomorphic Encryption.” 2013. Web. 17 Sep 2019.

Vancouver:

Tsai C. Applications of Homomorphic Encryption. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai C. Applications of Homomorphic Encryption. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0616113-170345

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

16. Lin, Hui-chun. Study of Effectiveness of Social Engineering Spam Prevention Operation.

Degree: Master, Information Management, 2013, NSYSU

 Due to the rise of e-organization, a great quantity of valuable and confidential information is saved in digitalized way. With the more population of computer… (more)

Subjects/Keywords: Social Engineering; Spam; Information security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, H. (2013). Study of Effectiveness of Social Engineering Spam Prevention Operation. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Hui-chun. “Study of Effectiveness of Social Engineering Spam Prevention Operation.” 2013. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Hui-chun. “Study of Effectiveness of Social Engineering Spam Prevention Operation.” 2013. Web. 17 Sep 2019.

Vancouver:

Lin H. Study of Effectiveness of Social Engineering Spam Prevention Operation. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin H. Study of Effectiveness of Social Engineering Spam Prevention Operation. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0705113-155104

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. Wang, Wen. Domination number of Cartesian product of graphs.

Degree: Master, Applied Mathematics, 2013, NSYSU

 For a graph G, (G) is the domination number of G. Vizing [2] conjectured that gamma(G Box H) >= gamma(G)gamma(H) for any graph G and… (more)

Subjects/Keywords: domination number; Cartesian Product; Vizing Conjecture

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, W. (2013). Domination number of Cartesian product of graphs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-171827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Wen. “Domination number of Cartesian product of graphs.” 2013. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-171827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Wen. “Domination number of Cartesian product of graphs.” 2013. Web. 17 Sep 2019.

Vancouver:

Wang W. Domination number of Cartesian product of graphs. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-171827.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang W. Domination number of Cartesian product of graphs. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726113-171827

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

18. Tseng, Yi-Fan. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 In a multi-receiver encryption system, a sender chooses a set of authorized receivers and sends them a massage securely and efficiently as the message is… (more)

Subjects/Keywords: Multi-Receiver Encryption; Anonymity; Identity-Based Encryption; Bilinear Pairing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, Y. (2014). Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Yi-Fan. “Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security.” 2014. Web. 17 Sep 2019.

Vancouver:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng Y. Anonymous Multi-Receiver Identity-Based Encryption with Complete CCA Security. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621114-130416

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

19. Tseng, Shang-Wei. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 Cloud computing is increasingly popular today. Cloud services such as data-outsourcing services provide a growing number of users access to cloud storage for large quantities… (more)

Subjects/Keywords: Dependable System; Data Outsourcing; Cloud-of-Clouds Approach; Cloud Computing; Data Privacy

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tseng, S. (2014). Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tseng, Shang-Wei. “Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach.” 2014. Web. 17 Sep 2019.

Vancouver:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tseng S. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-102500

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

20. Cheng, Yu-Shan. Parity Detection for Some Three-Modulus Residue Number System.

Degree: Master, Computer Science and Engineering, 2014, NSYSU

 The residue number system (RNS) can be applied to cryptography, image processing, digital filtering, parallel computation, and cloud computing. It represents a large integer using… (more)

Subjects/Keywords: parity detection technique; residue number system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Cheng, Y. (2014). Parity Detection for Some Three-Modulus Residue Number System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Cheng, Yu-Shan. “Parity Detection for Some Three-Modulus Residue Number System.” 2014. Web. 17 Sep 2019.

Vancouver:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Cheng Y. Parity Detection for Some Three-Modulus Residue Number System. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0628114-155538

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

21. Hsieh, Hsuan. Jordan Isomorphisms of Prime Rings with characteristic 2.

Degree: Master, Applied Mathematics, 2014, NSYSU

 Let F be a field with char(F) = 2, and let Ï : M_n(F) â M_n(F) be a Jordan isomorphism. We prove that if Ï… (more)

Subjects/Keywords: Isomorphisms; Jordan; characteristic; Prime Ring; Jordan Isomorphisms

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsieh, H. (2014). Jordan Isomorphisms of Prime Rings with characteristic 2. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-121910

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsieh, Hsuan. “Jordan Isomorphisms of Prime Rings with characteristic 2.” 2014. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-121910.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsieh, Hsuan. “Jordan Isomorphisms of Prime Rings with characteristic 2.” 2014. Web. 17 Sep 2019.

Vancouver:

Hsieh H. Jordan Isomorphisms of Prime Rings with characteristic 2. [Internet] [Thesis]. NSYSU; 2014. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-121910.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsieh H. Jordan Isomorphisms of Prime Rings with characteristic 2. [Thesis]. NSYSU; 2014. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0615114-121910

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

22. Kuo, Jui-hsiang. Study on the Integration of Information Security Management System and Personal Information Management System.

Degree: Master, Information Management, 2013, NSYSU

 With the formally carrying out of the Personal Information Protection Act, the Party is going to realize his own rights to his personal information. Therefore,… (more)

Subjects/Keywords: Personal Information Management System; Information Security Management System; Information Security and Personal Information Management System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kuo, J. (2013). Study on the Integration of Information Security Management System and Personal Information Management System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Kuo, Jui-hsiang. “Study on the Integration of Information Security Management System and Personal Information Management System.” 2013. Web. 17 Sep 2019.

Vancouver:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Internet] [Thesis]. NSYSU; 2013. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Kuo J. Study on the Integration of Information Security Management System and Personal Information Management System. [Thesis]. NSYSU; 2013. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0624113-215807

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

23. Huang, Yu-Zhi. Detecting Attack Sequence in Cloud Based on Hidden Markov Model.

Degree: Master, Computer Science and Engineering, 2012, NSYSU

 Cloud computing provides business new working paradigm with the benefit of cost reduce and resource sharing. Tasks from different users may be performed on the… (more)

Subjects/Keywords: Cloud Computing; Hidden Markov Model; Attack Plan

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, Y. (2012). Detecting Attack Sequence in Cloud Based on Hidden Markov Model. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Yu-Zhi. “Detecting Attack Sequence in Cloud Based on Hidden Markov Model.” 2012. Web. 17 Sep 2019.

Vancouver:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Internet] [Thesis]. NSYSU; 2012. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang Y. Detecting Attack Sequence in Cloud Based on Hidden Markov Model. [Thesis]. NSYSU; 2012. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726112-150041

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

24. Lo, Wen-Ling. Botnet Detection Based on HTTP Header Anomaly.

Degree: Master, Information Management, 2015, NSYSU

 Nowadays, botnets use virus to infect computers all around the world and turn them into bots. By controlling the large number of bots, attacker can… (more)

Subjects/Keywords: Ant Colony Optimization; Behavior of botnets; HTTP Header; HTTP Botnet; DBScan

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lo, W. (2015). Botnet Detection Based on HTTP Header Anomaly. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lo, Wen-Ling. “Botnet Detection Based on HTTP Header Anomaly.” 2015. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lo, Wen-Ling. “Botnet Detection Based on HTTP Header Anomaly.” 2015. Web. 17 Sep 2019.

Vancouver:

Lo W. Botnet Detection Based on HTTP Header Anomaly. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lo W. Botnet Detection Based on HTTP Header Anomaly. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0719115-145411

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

25. Hsu, Sung-Chien. Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks.

Degree: Master, Information Management, 2015, NSYSU

 Recently, with the development of IPv6 and Internet, wireless sensor network becomes more popular in Internet of thing. ZigBee Alliance announced ZigBee IP specification in… (more)

Subjects/Keywords: IPv6; wireless sensor network; wormhole attack

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hsu, S. (2015). Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Hsu, Sung-Chien. “Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks.” 2015. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Hsu, Sung-Chien. “Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks.” 2015. Web. 17 Sep 2019.

Vancouver:

Hsu S. Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Hsu S. Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0726115-181051

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

26. Lin, Yu-shen. A study of digital signature batch verification.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Batch verification is a technique for saving time on verifying signatures. It has many applications in the world. Almost all batch verification algorithm assume that… (more)

Subjects/Keywords: RSA digital signature scheme; Batch Verification; Digital Signature; BLS digital signature scheme; Forgery signature

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, Y. (2016). A study of digital signature batch verification. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Yu-shen. “A study of digital signature batch verification.” 2016. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Yu-shen. “A study of digital signature batch verification.” 2016. Web. 17 Sep 2019.

Vancouver:

Lin Y. A study of digital signature batch verification. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin Y. A study of digital signature batch verification. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0729116-201905

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

27. Huang, Shao-lun. The Z-Semimagic of Some Graphs.

Degree: Master, Applied Mathematics, 2011, NSYSU

 We call a finite simple graph G = (V (G),E(G)) to be Z-semimagic if it admits an edge labeling l : E(G) â Z {0}… (more)

Subjects/Keywords: index set; index; semimagic index; Z-semimagic; edge labeling

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Huang, S. (2011). The Z-Semimagic of Some Graphs. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0822111-161243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Huang, Shao-lun. “The Z-Semimagic of Some Graphs.” 2011. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0822111-161243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Huang, Shao-lun. “The Z-Semimagic of Some Graphs.” 2011. Web. 17 Sep 2019.

Vancouver:

Huang S. The Z-Semimagic of Some Graphs. [Internet] [Thesis]. NSYSU; 2011. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0822111-161243.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Huang S. The Z-Semimagic of Some Graphs. [Thesis]. NSYSU; 2011. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0822111-161243

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

28. Lin, Cheng-Ting. A Secret-Sharing-Based Method for Cloud Storage System.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many… (more)

Subjects/Keywords: exclusive-or operation; random number; cloud computing system; secret sharing; cloud storage system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, C. (2015). A Secret-Sharing-Based Method for Cloud Storage System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Cheng-Ting. “A Secret-Sharing-Based Method for Cloud Storage System.” 2015. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Cheng-Ting. “A Secret-Sharing-Based Method for Cloud Storage System.” 2015. Web. 17 Sep 2019.

Vancouver:

Lin C. A Secret-Sharing-Based Method for Cloud Storage System. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin C. A Secret-Sharing-Based Method for Cloud Storage System. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

29. Wang, Ying-Fang. Defense Mechanism of Industrial Control Systems.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In recent years, the process of industrial development improved from complex to simple. The theory of automatic control also develops rapidly, and the level of… (more)

Subjects/Keywords: Conpot; SNMP; Industrial Control System

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang, Y. (2015). Defense Mechanism of Industrial Control Systems. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang, Ying-Fang. “Defense Mechanism of Industrial Control Systems.” 2015. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang, Ying-Fang. “Defense Mechanism of Industrial Control Systems.” 2015. Web. 17 Sep 2019.

Vancouver:

Wang Y. Defense Mechanism of Industrial Control Systems. [Internet] [Thesis]. NSYSU; 2015. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang Y. Defense Mechanism of Industrial Control Systems. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0731115-213252

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

30. Chan, Huang-Ting. The Definitions and Computation of the Two Dimensional Largest Common Substructure Problems.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 The traditional longest common subsequence (LCS) problem is to find the maximum number of ordered matches in two sequences. The similarity of two one-dimensional sequences… (more)

Subjects/Keywords: Longest Common Subsequence; Similarity; NP-hard; Matrices; Integer Linear Programming; Heuristic Algorithm

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chan, H. (2016). The Definitions and Computation of the Two Dimensional Largest Common Substructure Problems. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0031116-004017

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chan, Huang-Ting. “The Definitions and Computation of the Two Dimensional Largest Common Substructure Problems.” 2016. Thesis, NSYSU. Accessed September 17, 2019. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0031116-004017.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chan, Huang-Ting. “The Definitions and Computation of the Two Dimensional Largest Common Substructure Problems.” 2016. Web. 17 Sep 2019.

Vancouver:

Chan H. The Definitions and Computation of the Two Dimensional Largest Common Substructure Problems. [Internet] [Thesis]. NSYSU; 2016. [cited 2019 Sep 17]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0031116-004017.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chan H. The Definitions and Computation of the Two Dimensional Largest Common Substructure Problems. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0031116-004017

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

[1] [2] [3] [4]

.