Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Her-Tyan Yeh"'
Autor:
Her-Tyan Yeh, 葉禾田
91
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their intercon
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their intercon
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/16855404717767908467
Publikováno v:
Engineering Computations, 2016, Vol. 33, Issue 6, pp. 1825-1834.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/EC-08-2015-0252
Publikováno v:
Engineering Computations. 34:239-250
Purpose Extensive efforts have been conducted on the real-time strategy (RTS) games. The purpose of this paper is the specific artificial intelligence (AI) challenges posed by RTS games; non-player character (NPC) is started out by collecting game-ma
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319484983
ECC
ECC
This study selected the real-time variety of strategy simulation games, i.e. real-time strategy (RTS) games, in which AI is used in tactics, unit production, reinforcement, combat, and other aspects. In RTS games, assignment and distribution of units
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::0e8b365f8d099eb538d763cb0962f83d
https://doi.org/10.1007/978-3-319-48499-0_23
https://doi.org/10.1007/978-3-319-48499-0_23
Publikováno v:
Applied Sciences; Volume 6; Issue 8; Pages: 215
The Internet has become the main transmission media in modern information systems due to the popularization of information technology and the rapid development of network technology. To use the Internet, we need complete security mechanisms which inc
Publikováno v:
EURASIA Journal of Mathematics, Science and Technology Education. 12
The current study applied cloud computing technology and smart mobile devices combined with a streaming server for parking lots to plan a city parking integration system. It is also equipped with a parking search system, parking navigation system, pa
Publikováno v:
Security and Communication Networks. 6:1161-1168
In order to reach a safe environment that can be automatically used on the Internet and to take precautions against the Internet fishing attack, the system integrates some features including one-time password, Completely Automated Public Turing Test
Autor:
Her-Tyan Yeh, Bing-Chang Chen
Publikováno v:
The Journal of Supercomputing. 65:496-506
A proxy signature scheme is a method which allows an original signer to delegate his signing authority to a designated person, called a proxy signer. Up to now, most of proxy signature schemes are based on the discrete logarithm problem. In this pape
Autor:
Her-Tyan Yeh, Hung-Min Sun
Publikováno v:
Computers & Electrical Engineering. 31:175-189
Up to now, all papers in password-authenticated key exchange protocols are constrained to two-party or three-party models. Under these two models, the clients are registered or authenticated by the same server. However, in reality two communicants ma
Autor:
Her-Tyan Yeh, Hung-Min Sun
Publikováno v:
Journal of Systems and Software. 72:97-103
Up to now, most of the literature on three-party authentication and key distribution protocols has focused on the environment in which two users (clients) establish a session key through an authentication server. In this paper, we discuss another env