歡迎來到論文上傳系統


新增報告紀錄      回研究生管理資訊系統首頁

蒐尋關鍵字
上一頁 第1頁 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 下一頁

i
i
DΥXB
U
2011-12-29
ؾTextual and Visual Content-Based Anti-Phishing: A Bayesian Approach, IEEE transactions on neural networks, Haijun Zhang, Gang Liu, Tommy W.S., and Wenyin Liu, Vol.22,No.10, 2011, pp. 1532-1546
g
v פ y
2011-12-09
]AEAn Encryption Scheme for a Secure Policy Updating, Proceeding of 5th International Conference on Security and Cryptography (SECRYPT), Luan Ibraimi, Muhammad Asim, and Milan Petkovi., , 2010, pp. 1-10
Cloud computing
v פ y
2011-11-18
]AEAchieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing, Proceeding of 29th IEEE Conference on Computer Communications (INFOCOM), Shucheng Yu, Cong Wang, Kui Ren, and Wenjing Lou., , 2010, pp. 1-9
Cloud computing
v פ y
2011-11-17
]AETowards Secure and Dependable Storage Services in Cloud Computing, IEEE Transactions on Services Computing, Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou., Vol.6, No. 6, 2011, pp. 1-14
Cloud computing
v פ y
2011-10-27
}@Wireless Ad-hoc Network Model for Video Transmission in the Tunnel of Mine, JOURNAL OF NETWORKS, Zhao Xu, Lei Sun, Wenyan Zhai, 6, 2011, pp.
Lu
v פ y
2011-10-13
²yCComputer Forensic Timeline Visualization Tool , Digital Investigation, Jens Olsson, Martin Boldt, 6, 2009, pp. S78-S87
ƦŲ
v פ y
2011-10-13
ؾA Neural Network Application in Predicting Slope Stability, Electric Information and Control Engineering (ICEICE), 2011 International Conference o, Zhao ming, , 2011, pp.
g
v פ y
2011-10-13
ؾA Remote Password Authentication Scheme for Multiserver Architecture, IEEE transactions on neural networks, Li-Hua Li, Iuon-Chang Lin, and Min-Shiang Hwang, Vol.12,No.6, 2001, pp.
g
v פ y
2011-10-06
_ZA Content-Boosted Collaborative Filtering Approach for Movie Recommendation Based on Local and Global Similarity and Missing Data Prediction, The Computer Journal, Ozbal Gozde; Karaman Hilal; Alpaslan Ferda N., 9, 2011, pp. 1535-1546
qlӰ
v פ y
2011-10-06
iA Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing, International Journal of Computers Communications & Control, Z. Hao, S. Zhong, and N. Yu, 6, 2011, pp. 227-235
Cloud computing
v פ y