يعرض 1 - 15 نتائج من 15 نتيجة بحث عن '"林坤億"', وقت الاستعلام: 0.53s تنقيح النتائج
  1. 1
    Dissertation/ Thesis
  2. 2
    Dissertation/ Thesis
  3. 3
    Dissertation/ Thesis
  4. 4
    Dissertation/ Thesis
  5. 5
    Dissertation/ Thesis
  6. 6
    Dissertation/ Thesis
  7. 7
    Dissertation/ Thesis
  8. 8
    Dissertation/ Thesis
  9. 9
    Dissertation/ Thesis
  10. 10
    Conference
  11. 11
    Academic Journal
  12. 12
  13. 13

    المؤلفون: 林坤, Lin, Kun-Yi

    المساهمون: 淡江大學資訊工程學系博士班, 葛煥昭, Keh, Huan-Chao

    مصطلحات موضوعية: 代理人系統, 時間戳記, SHA-256, Agent system, Time Stamp

    Relation: [1] Schneiderman, B., Direct Manipulation: A Step Beyond Programming Languages, IEEE Computer, Vol. 16, No. 8, pp. 57-69, 1983. [2] Kay, A., User Interface: A Personal View. In: The Art of Human- Computer Interface Design, B. Laurel (ed), Addison-Wesley, 1990. [3] P. Maes., Agents that Reduce Work and Information Overload, Communications of the ACM, Vol. 37, No.7,pp. 31-40, 146, ACM Press, July 1994. [4] Finin T, Weber J, Wiederhold G, Genesereth M, Fritzon R, McKay D, McGuire J, Pelavin R, Shapiro S and Beck C., Specification of the KQML Agent- Communication Language, Draft, February 1994. [5] Appleby S and Steward S., Mobile Software Agents for Control in Telecommunications Networks, BT Technol J, Vol. 12, No. 2, pp. 104-113, April 1994. [6] Thomas, C.G., BASAR: a framework for integrating agents in the World Wide Web, Computer, Vol. 28, No. 5, pp. 84 –86, May 1995. [7] Watt S N K, Zdrahal Z and Brayshaw M., Multiple Agent System for Configuration Design, in Hallam J(Ed):”Frontiers in artificial intelligence and applications”, IOS Press, pp. 217-228, 1994 [8] Available at http://www.cs.cmu.edu/afs/cs.cmu.edu/project/theo-5/www/pleiades.html [9] Wayner P., Agents Unleashed: A Public Domain Look at Agent Technology, Boston, MA, AP Professional, 1995. [10] Huhns, M.N., Agent teams: building and implementing software, IEEE Internet Computing, Vol. 4, No. 1, pp. 93 –95, Jan.-Feb. 2000. [11] R.L. Rivest., Request for Comments 1321: The MD5 Message Digest Algorithm, Internet Engineering Task Force, 1992. (Available at http://www.ietf.org/rfc/rfc1321.txt) [12] Available at http://en.wikipedia.org/wiki/MD5 [13] Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu., Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive Report 2004/199. (Available at http://eprint.iacr.org/2004/199.pdf) [14] Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin., Efficient Collision Search Attacks on SHA-0, Advances in Cryptology-Crypto 05, LNCS 3621: 1-16, 2005. [15] NIST, NIST Brief Comments on Recent Cryptanalytic Attacks on SHA-1, 2004. (Available at http://csrc.nist.gov/hash_standards_comments.pdf) [16] Available at http://csrc.nist.gov/publications/fips/fips180-3/fips180-3_final.pdf [17] Available at http://en.wikipedia.org/wiki/SHA-2 [18] Xiaoyun Wang, Yiqun Yin, Hongbo Yu., Finding Collisions in the Full SHA-1, Advances in Cryptology-Crypto 05, LNCS 3621: 17-36, 2005. [19] BIBLINK project Web (Available at http://hosted.ukoln.ac.uk/biblink/) [20] Available at http://www.ietf.org/proceedings/46/46th-99nov-ietf-129.html [21] Available at http://www.pgpi.org/doc/pgpintro/; U0002-0911201018520900; http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/54178; http://tkuir.lib.tku.edu.tw:8080/dspace/bitstream/987654321/54178/-1/index.html

  14. 14
  15. 15