Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Tzu-Chang Yeh"'
Autor:
Tzu-Chang Yeh, 葉慈章
91
The popularity of the Internet paves its way to the prevailing dominance rapidly and globally. In traditional transactions, we can confirm the other side’s identity easily by credential、signature or stamp. However, on the Internet, the tr
The popularity of the Internet paves its way to the prevailing dominance rapidly and globally. In traditional transactions, we can confirm the other side’s identity easily by credential、signature or stamp. However, on the Internet, the tr
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/49073578538249616195
Publikováno v:
International Journal of Precision Engineering and Manufacturing. 15:241-249
In low-carbon product design, product environment, as well as economic and manufacturing capabilities, should be considered simultaneously. The purpose of this paper is to improve the product carbon footprint calculation efficiency. This study not on
Publikováno v:
Computer Communications. 34:337-341
RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modifi
Publikováno v:
Expert Systems with Applications. 37:7678-7683
RFID, capable of remote automatic identification, is taking the place of barcodes to become electronic tags of the new generation. However, the information transmitted in the air could easily be intercepted and eavesdropped due to its radio transmiss
Autor:
Shih-Chang Tsai, Tzu-Chang Yeh
Publikováno v:
IEICE Transactions on Communications. :2608-2611
Lam, Chung, Gu and Sun (2003) proposed a lightweight security mechanism for mobile commerce transactions to meet the security needs in the face of the resource constraints of mobile devices. End-to-end security between the mobile device and the mobil
Publikováno v:
Computer Standards & Interfaces. 25:119-129
Two revisions of the original Secure Electronic Transaction (SET) protocol are proposed to conceal cardholders' identities in the electronic marketplace in which cardholders' trust for banks can be reduced to a minimum. Constrained by being extension
Publikováno v:
JCIS
Interests continue to grow in recent years for the adoption of Radio Frequency Identification (RFID) in many different areas including transportation and supply chain management. Those RFID-included objects can be targeted more efficiently by real-ti
Publikováno v:
International Journal of Ad Hoc and Ubiquitous Computing. 16:183
To provide reliable communications in wireless environments, two fundamental error control mechanisms, automatic repeat request (ARQ) and forward error correction (FEC) are proposed. However, the ARQ mechanism may suffer frequent retransmissions and
Autor:
Tzu-Chang Yeh, Chia-Sheng Wu
Publikováno v:
2009 Joint Conferences on Pervasive Computing (JCPC); 2009, p799-804, 6p