English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 114898/145937 (79%)
Visitors : 53916531      Online Users : 820
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    國科會研究計畫 [223/223]
    學位論文 [830/838]
    專利 [6/6]
    專書/專書篇章 [49/49]
    會議論文 [823/1215]
    研究報告 [3/22]
    考古題 [55/55]

    Collection Statistics

    近3年內發表的文件:32(5.52%)
    含全文筆數:568(97.93%)

    文件下載次數統計
    下載大於0次:567(99.82%)
    下載大於100次:555(97.71%)
    檔案下載總次數:468058(12.65%)

    最後更新時間: 2025-03-07 04:19


    Top Upload

    Loading...

    Top Download

    Loading...

    RSS Feed RSS Feed
    Jump to a point in the index:
    Or type in a year:
    Ordering With Most Recent First Show Oldest First

    Showing items 76-100 of 580. (24 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    DateTitleAuthors
    2021-05 Designated-ciphertext searchable encryption 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin; Mambo, Masahiro
    2021-02 Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function 左瑞麟; 曾一凡; Tso, Raylin; Tseng, Yi-Fan; Liu, Zi-Yuan; Hsu,  Jen-Chieh
    2021-02 Message Propagation in DTN Based on Virtual Contact of Behavior Model 蔡子傑; Tsai, Tzu-Chieh; Chan, Ho-Hsiang
    2021-01 Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks 左瑞麟; Tso, Raylin; Wu, Tsu‑Yang ; Lee, Zhiyuan; Yang, Lei 
    2021-01 Online consumers` brain activities when purchasing second-hand versus new products that are brand-name or brand-less 謝佩璇; Hsieh, P. H.; Chang, Fang-Ning
    2020-12 Practical Inner Product Encryption with Constant Private Key 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin
    2020-12 Decision-making models for using multimedia marketing in enterprises 謝佩璇; Hsieh, P. H.; Hsiung, Yu-Lu
    2020-12 On-site personnel`s use of mobile cloud computing applications— A case study of an LCD panel manufacturing company 謝佩璇; Hsieh, P. H.; wang, Chih-Hao
    2020-11 Intelligence-led response: turning theory into law enforcement practice in cyber security incidents 左瑞麟; Tso, Raylin; Kao, Da-Yu; Hsiao, Shou-Ching
    2020-09 Supervised Word Sense Disambiguation on Polysemy with Neural Network Models: A Case Study of BUN in Taiwan Hakka 賴惠玲; 劉吉軒; Lai, Huei-Ling; Hsu, Hsiao-Ling; Liu, Jyi-Shane; Lin, Chia-Hung; Chen, Yanhong
    2020-08 Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing 左瑞麟; Tso, Raylin; Huang, Kaibin; Chen, Yu-Chi; RAHMAN, SK MD MIZANUR; Wu, Tsu-Yang
    2020-05 PrivGRU: Privacy-preserving GRU inference using additive secret sharing 左瑞麟; Tso, Raylin
    2020-01 城市知名度網絡的數字人文研究——以《人民日報》(1946-2016)中深圳主題報導為例 劉昭麟; Chaolin, Liu; 邱伟云; Weiyun, Chiu
    2019-12 MS2CNN: Predicting MS/MS spectrum based on protein sequence using deep convolutional neural networks 張家銘; Chang, Jia-Ming; Lin, Yang Ming; Chen, Ching-Tai
    2019-12 Identity-based Blind Multisignature from Lattices 曾一凡; Tseng, Yi-Fan; Tso, Raylin; Liu, Zi-Yuan
    2019-11 On the Approximability and Hardness of the Minimum Connected Dominating Set with Routing Cost Constraint 郭桐惟; Tung-Wei Kuo
    2019-11 The CAFA challenge reports improved protein function prediction and new functional annotations for hundreds of genes through experimental screens 張家銘; Chang, Jia-Ming; organization, CAFA3
    2019-11 Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki
    2019-11 A Fast and Low Cost Repetitive Movement Pattern Indicator for Massive Dementia Screening 廖峻鋒; Liao, Chun-Feng; Li, Ting-Ying; Chien, Yi-Wei; Chou, Chi-Chun; Cheah, Wen-Ting; Fu, Li-Chen; Chen, Chery Chia-Hui; Chou, Chun-Chen; Chen, I-An
    2019-10 Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wu, Si-Jing; Kuo, Hsin-Nan; Huang, Jheng-Jia
    2019-10 自駕車時代的車聯網概念與第五代(5G)行動通訊技術 孫士勝; 詹博帆; 陳茂南; Sun, Shi-sheng; Chan, Po-fan; Chen, Mao-nan
    2019-09 Influence of Culture, Transparency,Trust, and Degree of Automation on Automation Use 劉吉軒; Liu, Jyi-Shane; Chien, Shih-Yi; Lewis, Michael; Sycara, Katia; Kumru, siye
    2019-09 Top-Level Secure Certificateless Signature Scheme in the Standard Model 曾一凡; Tseng, Yi-Fan; Chen, Ching-Wen; Fan, Chun-I
    2019-07 Learning English–Chinese bilingual word representations from sentence-aligned parallel corpus 黃瀚萱*; Chen, Hsin-Hsi; Yen, An-Zi; Chen, Hsin-Hsi
    2019-07 On the Approximability and Hardness of the Minimum Connected Dominating Set with Routing Cost Constraint 郭桐惟; Kuo, Tung-Wei

    Showing items 76-100 of 580. (24 Page(s) Totally)
    << < 1 2 3 4 5 6 7 8 9 10 > >>
    View [10|25|50] records per page

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback