To see the other types of publications on this topic, follow the link: Research security.

Dissertations / Theses on the topic 'Research security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Research security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Forman, Peter James. "Securing natural gas : entity-attentive security research." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12139/.

Full text
Abstract:
Natural gas is a troublesome and ‘wayward’ material (Bridge, 2004; 396). Amongst other qualities, it is invisible, intangible, naturally odorless, highly inflammable, and constantly resistant to the forces that contain it. This thesis provides an account of how these qualities both introduce a series of insecurities to everyday social environments, and also make it a challenging material to govern. Specifically, I examine the way that security is performed around gas circulations in the UK’s transmission and distribution pipelines, and I describe how a range of specialized security practices h
APA, Harvard, Vancouver, ISO, and other styles
2

Bruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Martonosi, Susan Elizabeth. "An Operations Research approach to aviation security." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33671.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2005.<br>Includes bibliographical references (p. 151-163).<br>Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore first whether securing aviation deserves priority over other potential targets. We compare the historical risk of aviation terrorism to that posed by other forms of terrorism and conclude that the focus on a
APA, Harvard, Vancouver, ISO, and other styles
4

Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
APA, Harvard, Vancouver, ISO, and other styles
5

Daehnick, Christian C. "Blueprints For The Future Comparing National Security Space Architectures /." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seidel, Scott B. "Planning combat outposts to maximize population security." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/61195.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Sloan School of Management, Operations Research Center, 2010.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (p. 123-124).<br>Combat outposts (COPs) are small, well-protected bases from which soldiers reside and conduct operations from. Used extensively during the "Surge" in Iraq, COPs are usually established in populated areas and are prevalent in the counterinsurgency operations in Afghanistan in 2010. This research models population security to determine combat outpost locations in a battalion area of ope
APA, Harvard, Vancouver, ISO, and other styles
7

Young, Jason Osgood Ewen. "Novel Materials for Use in Homeland Security Research." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.

Full text
Abstract:
Organometallic pyridazines and compounds derived from them have been of interest in polymer research due to their atypical environmental stability (as compared to other non-aromatic organic semiconductors) as well as their conductivity. The off-metal synthesis and characterization of several pyridazyl thallium, manganese, and rhenium complexes, beginning with fulvenes 1,2- C5H3(COHR)(COR), are reported here. The diacyl fulvenes were treated with hydrazine hydrate to ring close to pyridazines. Next, the pyridazines were converted to their respective thallium salts through treatment with thalliu
APA, Harvard, Vancouver, ISO, and other styles
8

Ashenden, D. M. "Information security awareness : improving current research and practice." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1469598/.

Full text
Abstract:
Large-scale data losses experienced across both public and private sector organisations have led to expectations that organisations will develop a culture that supports information security aims and objectives. Despite the fact that many organisations now run awareness, education and training programmes for their employees, however, information security incidents due to employee misuse of information still keep occurring. This suggests that these programmes are not working. The research presented in this thesis examines ways to better understand employees’ attitudes towards information securit
APA, Harvard, Vancouver, ISO, and other styles
9

Wai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Miko, Katharina, and Elisabeth Mayr. "Trading Places: Power Distributions in participatory research projects as exemplified by security research." WU Vienna University of Economics and Business, 2015. http://epub.wu.ac.at/4727/1/MikoMayr2015.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hao, Zijiang. "Research on Efficiency and Security for Emerging Distributed Applications." W&M ScholarWorks, 2019. https://scholarworks.wm.edu/etd/1563899040.

Full text
Abstract:
Distributed computing has never stopped its advancement since the early years of computer systems. In recent years, edge computing has emerged as an extension of cloud computing. The main idea of edge computing is to provide hardware resources in proximity to the end devices, thereby offering low network latency and high network bandwidth. However, as an emerging distributed computing paradigm, edge computing currently lacks effective system support. To this end, this dissertation studies the ways of building system support for edge computing. We first study how to support the existing, non-ed
APA, Harvard, Vancouver, ISO, and other styles
12

Mutigwe, C., and F. Aghdasi. "Research trends in RFID technology." Interim : Interdisciplinary Journal, Vol 6, Issue 1: Central University of Technology Free State Bloemfontein, 2007. http://hdl.handle.net/11462/401.

Full text
Abstract:
Published Article<br>While the adoption rate of Radio Frequency Identification (RFID) technology is increasing, mass-market adoption will not be achieved until a few major challenges are addressed. These challenges are: privacy, security and costs from the end-user's view point and limited power supply to the tag from the engineering perspective. We discuss the research efforts aimed at addressing these challenges. We focus our attention on research in: RFID privacy and security, antennas, polymer electronics-based RFID devices, power management circuits and techniques, and efficient RF spectr
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Lei. "Research on security and privacy in vehicular ad hoc networks." Doctoral thesis, Universitat Rovira i Virgili, 2010. http://hdl.handle.net/10803/8488.

Full text
Abstract:
Los sistemas de redes ad hoc vehiculares (VANET) tienen como objetivo proporcionar una plataforma para diversas aplicaciones que pueden mejorar la seguridad vial, la eficiencia del tráfico, la asistencia a la conducción, la regulación del transporte, etc. o que pueden proveer de una mejor información y entretenimiento a los usuarios de los vehículos. Actualmente se está llevando a cabo un gran esfuerzo industrial y de investigación para desarrollar un mercado que se estima alcance en un futuro varios miles de millones de euros. Mientras que los enormes beneficios que se esperan de las comunica
APA, Harvard, Vancouver, ISO, and other styles
14

Birkeland, S. N. "E-Banking security and organisational changes : an action research study." Thesis, University of Liverpool, 2015. http://livrepository.liverpool.ac.uk/3001088/.

Full text
Abstract:
The thesis considers customer security in a major European bank Bank X. The action research focus is to strengthen the processes and the overall solution for online Bank customers which experience a significant growth and increase in use. There seem to be a common misperception between the internal staff of the bank and its customers regarding what security is, and the research considers several new security situations in the banking business. Moving from branch-oriented business to a digital orientation within the time space of just a few years has challenged banks to create new solutions for
APA, Harvard, Vancouver, ISO, and other styles
15

Martin, Brad. "U.S. EPA NATIONAL HOMELAND SECURITY RESEARCH CENTER: AN INTERNSHIP REPORT." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1163622231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Calafato, Trevor. "Security knowledge and terrorism research : filling the gaps with Lombroso." Thesis, University of Sheffield, 2013. http://etheses.whiterose.ac.uk/5349/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

WANG, CHIH-CHUANG, and 汪之莊. "Strengthening Our Airport Security Research." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/31330092301333313961.

Full text
Abstract:
碩士<br>中華科技大學<br>航空運輸研究所在職專班<br>104<br>As the increasing of global trade, the volume of passenger in the Taoyuan Airport increases year by year. The airport volume will be reach 40 million in next year which causes intangible pressure to aviation security. In addition, the Islamic State made used suicide bombers to attack the Brussels Airport in Belgium in this year, and it wounded more than three hundred people. It makes countries all around the world understand the importance of airport security, and transnational crime like drugs transport also highlights the challenges of aviation security.
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, ming-yi, and 王明懿. "Research of China security market." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/65661311763277607726.

Full text
Abstract:
碩士<br>國立臺北大學<br>會計學系<br>90<br>Abstract: Stock market is an important indicator to reflect the macro economy of a country. With the economic reform in China, the security market, a symbol of capitalism, has opened up in succession with the extensively control policy and planning economy. Though it has only 10 years since it was opened in 1990, the market has drawn global investors’ attraction for its booming growth and extensive potential. This thesis aims to explicate and analyze the important articles that the current China security market is complying with, review some major issue
APA, Harvard, Vancouver, ISO, and other styles
19

Li, De-Jia, and 李得嘉. "Research on Security Analysts’ Herding Behavior." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/22667169415974322555.

Full text
Abstract:
碩士<br>元智大學<br>會計學系<br>97<br>This research investigates analysts’ herding behavior. We adopt Rhodes-Kropf, Robinason, and Viswanathan’s (2005) model to measure firms’ mispricing and we explore whether the capital market’s mispricing toward firms has effects on analysts’ herding. Namely, this research examines the relation among forecast boldness, forecast accuracy and mispricing. We also examine whether analysts issue bold forecasts lead to higher abnormal return than analysts herding. Our sample consists of American companies from 1993 through 2006. The financial data are from Compustat, CRSP
APA, Harvard, Vancouver, ISO, and other styles
20

De, Ko Jian, and 柯建德. "Research for cloud computing security architecture." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/30434930514554880775.

Full text
Abstract:
碩士<br>僑光科技大學<br>資訊科技研究所<br>101<br>In the era where the Internet and computation device are ubiquitous, information are available everywhere.Especially with the increase popularity of Cloud Computing, users can utilizes their computing device to access remote resources via the Internet. However, the convenience of cloud computing also brought different aspect of security problems. This means topics on the security, integrity and privacy of users’ data and the ability of crisis handling for cloud computing service manager are very important. One of the cloud service which vendors provide is
APA, Harvard, Vancouver, ISO, and other styles
21

Tsai, Ching-Yao, and 蔡慶耀. "A Research on Vietnam's Food Security." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/21806479424790938363.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>東南亞學系<br>103<br>Abstract Vietnam, with a population of around 91 million, has few arable lands for each person. Without sufficient arable lands, and with the rise of sea-level and the change of climate, Vietnam suffers from the salinization of soils and its impacts on rice production. Although Vietnam's economic performance has been brilliant and gradually met the needs of people on food in recent years, with the increase in population and the decrease of land resources, whether Vietnam has plenty of rices available for export has been the concern of rice importing countries.
APA, Harvard, Vancouver, ISO, and other styles
22

Lan, Su-Yi, and 藍書翊. "Centralized management of cloud security research." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/16063451836115078798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

LYU, WEI-TING, and 呂韋廷. "Cloud Network Information Protection and Security Research." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/84tx24.

Full text
Abstract:
碩士<br>高苑科技大學<br>電子工程研究所<br>103<br>Rapid development worldwide cloud, Now more and more services, businesses, companies, research institutes male surgery, biotechnology, and even the elderly home and community care will rely on the cloud computing. Information and data are stored in the cloud, then the cloud security issues will follow surfaced, has become an important point of view of public attention and concern. Because under the cloud of explosive advent and popularity of the world's brightest hackers players have been gearing up to write a lot of different programs to attack, Many hackers
APA, Harvard, Vancouver, ISO, and other styles
24

蔡水田. "Technology Research of Intelligent Self Security Protection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/3facmk.

Full text
Abstract:
博士<br>大葉大學<br>電機工程學系<br>105<br>Materials of this study present smart system designs, which integrate of sensors and microprocessors. For considerations of computer numerical controllers and electric bicycles, an intelligent fire extinguisher of machine tool and a self-preservation monitoring system of bicycle have been designed and implemented. An intelligent fire extinguisher of machine tool is composed of installing electromagnetic control telescopic rod on the handle of the fire extinguisher, and combined with temperature detections, warning, extinguishing, intelligent judgments and smart
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Jun-Hong, and 陳俊宏. "The Intellectual Core of Information Security Research." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/83696137536935423769.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士班<br>101<br>Since the Internet Worm event began, Information Security incidents occur repeatedly and more and more diversification, and then cause serious damage of economic. This phenomenon continuously increases the number of Information Security related research literature. Understanding Information Security from a large amount of data is not easy. Therefore purpose of this paper is to explore the intellectual core of Information Security research. The major resource is from ISI database. Citation and Co-Citation are used to analyze and calculate the reference frequenc
APA, Harvard, Vancouver, ISO, and other styles
26

YANG, CHEN-MING, and 楊鎮銘. "OTT Video on Demand Web Security Research." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/9t9fya.

Full text
Abstract:
碩士<br>國立暨南國際大學<br>資訊管理學系<br>107<br>OTT is a fast-growing market and a trend changing people's daily life, but most of OTT service providers do not have enough protections implemented, left vulnerabilities in their systems in different levels. We studied top sixteen popular OTT services in Taiwan from the perspective of information security, did black-box analysis of their systems implementations and architectures, to identify weaknesses in modules related to DRM, User Verification and Authorization, Video Preview, Access Control, Metadata, License and Token Control. And we also found solut
APA, Harvard, Vancouver, ISO, and other styles
27

Yao, Hsueh-chu, and 姚學竹. "THE STABILITY OF DYNAMIC SECURITY RESEARCH MODEL." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/28986531576245437968.

Full text
Abstract:
碩士<br>南華大學<br>經濟學研究所<br>93<br>This paper examines how the security research affects the trader''s investment decision in the financial market and whether the equilibrium is the stability of the equilibrium in dynamic security research model. We find that (a) an increase in precision of private information will lead to increase in precision of individual total information and individual assessment of the risky asset return; (b) individual demand for risky asset is positively correlated with the precision of individual total information, individual assessment of the risky return and precision of
APA, Harvard, Vancouver, ISO, and other styles
28

CHOU, TZU-HSIANG, and 周子翔. "Research on Security Verification of Program Coding." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/y747bf.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊工程學系<br>106<br>In recent years, the development of international software has been booming due to the demand for information system management and applications related to the cloud and smart phones. Some people say that the software can grasp the world. In the 21st century, the use and dependence of software are getting more and more important. All servers, data centers, Internet and web applications use indispensable codes, not to mention the big data information retrieval, attribute classification pretreatment, the follow-up analysis and processing of the classification
APA, Harvard, Vancouver, ISO, and other styles
29

Pan, Shun-Meng, and 潘順盟. "A research on ID-based security protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/7ch34k.

Full text
Abstract:
碩士<br>國立臺中科技大學<br>資訊工程系碩士班<br>101<br>Communication technologies enable people communicate with each other easily. Meanwhile, how to ensure secure communication becomes an important issue. Thus, many security protocols are proposed. These security protocols can be applied to protecting transmitted information. This study focuses on identity-based (ID-based) security protocols. In ID-based security protocols, a user’s identity or public information is the user’s public key. This property makes them differ from protocols in traditional public-key cryptosystems. In these ID-based security protocol
APA, Harvard, Vancouver, ISO, and other styles
30

LIN, YEH TSUNG, and 葉宗霖. "Research on WEB Security Program Development Tools." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/h7phuz.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊管理學系碩士在職專班<br>107<br>The trend of transforming various systems into web systems is inevitable. In order to pursue the rapid transmission and immediacy of system information, it is inevitable to switch to the use of web. Therefore, in the design of websites, it is necessary to pay attention to various kinds of Security details, so the development appeal of the WEB system not only requires quick response to cloud transmission, but also needs to pay attention to the relevant details of the information security of the website. However, due to the cumbersome and tedious part of th
APA, Harvard, Vancouver, ISO, and other styles
31

"A research in SQL injection." 2005. http://library.cuhk.edu.hk/record=b5892623.

Full text
Abstract:
Leung Siu Kuen.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.<br>Includes bibliographical references (leaves 67-68).<br>Abstracts in English and Chinese.<br>Abstract --- p.i<br>Acknowledgement --- p.iii<br>Chapter 1 --- Introduction --- p.1<br>Chapter 1.1 --- Motivation --- p.1<br>Chapter 1.1.1 --- A Story --- p.1<br>Chapter 1.2 --- Overview --- p.2<br>Chapter 1.2.1 --- Introduction of SQL Injection --- p.4<br>Chapter 1.3 --- The importance of SQL Injection --- p.6<br>Chapter 1.4 --- Thesis organization --- p.8<br>Chapter 2 --- Background --- p.10<br>Chapter 2.1 --- Flo
APA, Harvard, Vancouver, ISO, and other styles
32

Liu, Che-Chun, and 劉哲均. "A Research on China’s Petroleum Transportation Security Strategy." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/26912565773614231333.

Full text
Abstract:
碩士<br>淡江大學<br>中國大陸研究所碩士班<br>99<br>China had been one of the net import countries for petroleum in 1993. Its demand for petroleum is increasing, which caused many problems of the supply -demand. In particular, after it became the second largest oil consuming country, the gap of the country’s energy construction was more prominent. To face this important challenge of the energy supply-demand instability, China begins to plan petroleum distribution and safety transportation. The transportation of oil resources can be returned smoothly to China, which would let its economy rapidly taking off, and
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Yang-Yu, and 王揚宇. "Minimum Living Security System Research in Mainland China." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/09399759203098025567.

Full text
Abstract:
碩士<br>淡江大學<br>中國大陸研究所碩士班<br>99<br>Since Mainland China was reformed and opened in 1979, regardless of the economic data in GDP growth rate or foreign exchange reserves ranked have significant results. However, under the spectacular growth figures, it represents the fact of widening gap between the richness and the poverty. Some studies show that the more serious division between the rich and the poor, the more instable community it would evolve. Concerning the government of Mainland China, it is leaded by Communist Party, which controls Mainland China severely. It is necessary to handle the si
APA, Harvard, Vancouver, ISO, and other styles
34

Tseng, Yu-kuo, and 曾昱國. "The Research of Network Security in IP Traceback." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/66452706975773723274.

Full text
Abstract:
博士<br>國立中山大學<br>資訊工程學系研究所<br>93<br>With the dramatic expansion of computers and communication networks, computer crimes, such as threatening letters, fraud, and theft of intellectual property have been growing at a dreadful rate. The increasing frequency of malicious computer attacks on government agencies and Internet businesses has caused severe economic waste and unique social threats. The problems of protecting data and information on computers and communication networks has become even more critical and challenging, since the widespread adoption of the Internet and the Web. Consequently,
APA, Harvard, Vancouver, ISO, and other styles
35

Chun-Che, Wu, and 吳俊哲. "Strategic marketing research of Taiwan electronics security product." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/49860013149699878711.

Full text
Abstract:
碩士<br>國立中興大學<br>企業管理學系<br>87<br>This issued is a case study of Taiwan Security Products strategic marketing research. Most of security product manufacturers are small and medium business company. They have a lot of problems about marketing strategy that leakage of long term and spacious planning like others industrial small and medium business company in Taiwan. Indeed Taiwan security industry majority market still dedicated in domestic market so most of suppliers that only running business in Taiwan. To compare with Information Technology and Security Industry it likes a peanut of annual turn
APA, Harvard, Vancouver, ISO, and other styles
36

YI, LI TZU, and 李慈宜. "A Research on Food Security Policy in Taiwan." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/53432929982660671636.

Full text
Abstract:
碩士<br>國立臺灣師範大學<br>政治學研究所<br>100<br>As the on-going process of globalization, military force is no longer an important element of security of the world. It is emphasized that various aspects of non-traditional security is much higher than traditional security issues. Food security is one of the non-traditional security issues. Particularly after the outbreak of the food crisis in 2008, food security became a focus which more countries paid more attention just want to prevent food crisis. Taiwan’s food self-sufficiency rate is about 32%, rice, as one of the primary food, is maintained at the l
APA, Harvard, Vancouver, ISO, and other styles
37

Wang, Kai-Yi, and 王愷儀. "The research of XSS – Security threat of Ajax." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/45089097483989217632.

Full text
Abstract:
碩士<br>樹德科技大學<br>資訊管理研究所<br>96<br>Since the age of network began, there are many convenient services such as Webmail, blog, online album, online hard disk…etc. When client communicate with server, due to the request-response model, the client suffer from screen blinking and delay of response. The AJAX(Asynchronous Javascript And XML) is a popular solution, it will improve the performance of web services to be as quick as host applications. The famous applications such as google suggest, google earth and google mail are the trend of web application. But web service with AJAX may exist the securi
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Chang-Ching, and 林長青. "The Research of China's Oil Diplomacy Security Complex." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43109633045312719895.

Full text
Abstract:
碩士<br>國立政治大學<br>東亞研究所<br>95<br>China’s oil diplomacy security complex is divided into three aspects: Sea lines of communication, Eurasia energy bridge, and Global cooperation. Middle East and Africa are now the main areas for China’s imported petroleum, and their production are transported through Indian Ocean to the southeast China coast. China’s strategies to build oil diplomacy security complex on account of diversification of importing sources are to protect Sea lines of communication by promoting Sino-ASEAN relations, to construct energy bridge from Russia and Central Asia in order to po
APA, Harvard, Vancouver, ISO, and other styles
39

Yu, Chi, and 余績. "A Research on the Taiwan National Security Association." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/67319561133961253394.

Full text
Abstract:
碩士<br>元智大學<br>資訊社會學研究所<br>94<br>This dissertation aimed to discuss the issue of whether Non-Governmental Organization (NGO) could have its manoeuvring over the high politics issues, such as regional security, and tried to find out the contribution of the targeted Taiwan National Security Association on the peace and stability over Taiwan Strait via documentary analyses and interviews. The dissertation would also examine the relevant theories of NGO with actual circumstances and make some useful supplement towards the existing research portfolio at the end. The phenomenon of vast growing NGOs
APA, Harvard, Vancouver, ISO, and other styles
40

Wu, Ching-fang, and 吳青芳. "Third-party Payment System of Information Security Research." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/89298600875678777852.

Full text
Abstract:
碩士<br>世新大學<br>資訊管理學研究所(含碩專班)<br>103<br>Developed Internet has changed the traditional consumption patterns of consumers, so that consumers in addition to physical stores consumption, another increase Internet consumer platform, making e-commerce more flourishing, with consumers via smartphones, tablets computers, notebook computers and other mobile devices through the Internet to shop, to promote consumption behavior can be anywhere, therefore B2C, C2C and other patterns of e-commerce transaction volume and transaction amount increased year by year, which is derived from the study to investiga
APA, Harvard, Vancouver, ISO, and other styles
41

Kuo, Pao-Hsiu, and 郭寶秀. "The Research to Ensure Real Estate Transaction Security." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/79402080500823139946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Lu, Han-Yu, and 盧翰宇. "Security Marine Training Planning Research in Scuba Diving." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/64288998220907454233.

Full text
Abstract:
碩士<br>輔仁大學<br>體育學系碩士班<br>101<br>The study used qualitative research method, interviewed six senior diving instructors. The purpose of this study is to explore diving marine trainings’ system and safety plan’s diverseness, obstruction and prospect. Findings of this study are as follows: I. Diving marine training system:Most organizations reference license’s rule; some extend their own systems. Instructor plays the most important role to protect students’ safety when training. Assistant’s most significant responsibility is to assist instructor in protecting students. II. Diverseness of diving s
APA, Harvard, Vancouver, ISO, and other styles
43

Jiang, Yu-Ling, and 蔣妤羚. "Research on Identity Security of On-Line Game." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/45121016649283880418.

Full text
Abstract:
碩士<br>樹德科技大學<br>資訊管理研究所<br>96<br>The Internet already become the communication and entertainment platform of teenagers. They spend a lot of time in the internet cafes which provided the network service to talk with friends through instant message program, play on-line game and etc. It cause a lot of problems to the family, school and society when teenagers stay late in the internet cafes. Most of teenagers experienced the stolen of ID and password and lost of fictitious treasures of on-line game. In Taiwan, this situation become a cyber crime of teenagers. A lot of teenagers offended against t
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Hsiang-Yu, and 王祥宇. "Research of data security processing in computer systems." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/07793120169359422828.

Full text
Abstract:
碩士<br>中國文化大學<br>資訊管理學系<br>99<br>The security data must keep security in the computer system. We propose the safe treatment of these data in security. We insert the dummy data into the security data to combine to one file. We set encryption data and use it to encrypt the combined file to cipher text. After we insert encryption data to cipher text, we store the cipher text to the computer system. When we want to get the original security data, we use decryption algorithm to decrypt to get it. Every user has different location code to store encryption data in the cipher text. We use this locatio
APA, Harvard, Vancouver, ISO, and other styles
45

HSIEH, CHIEH-HSIU, and 謝杰修. "A Research on Protection of HTML5 CORS Security." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/xfn3fe.

Full text
Abstract:
碩士<br>大同大學<br>資訊經營學系(所)<br>105<br>Web is the most common technology for information delivery or interaction between people on the internet. The emergence of HTML5 in recent years has changed the world of the Web. CORS (Cross-Origin Resource Sharing) is the most common application in HTML5 because it breaks the traditional Same-origin policy (SOP) Exchange messages between different domains. However, in recent years, experts have put forward the HTML5 security report, pointed out that there are many security threats in HTML5, these security issues, in fact, most of the negligence caused by the
APA, Harvard, Vancouver, ISO, and other styles
46

Chin-Low, Chang, and 張金樓. "Research on Legalization of Building Transaction and Security." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/v4hqnx.

Full text
Abstract:
碩士<br>東南科技大學<br>營建與空間設計系營建科技與防災碩士班<br>106<br>Abstract This study mainly comes from domestic disputes in civil lawsuits, disputes in building transactions continue, and people’s knowledge of buildings is limited. Even professional architects, technicians, etc. will not be involved in everything inside or outside the building. All of them have learned and therefore derived how to formulate a legal system for building transaction security inspections as the subject of this thesis. Although there are information on the publication of sea sand houses, radiation houses, haunted houses, etc., during
APA, Harvard, Vancouver, ISO, and other styles
47

Huang, Wen-Hsin, and 黃文欣. "A Research on Security Mechanisms for Cloud Computing." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/b9b5jn.

Full text
Abstract:
碩士<br>國立臺中科技大學<br>資訊工程系碩士班<br>106<br>Cloud computing, a new and widely-applied concept, makes hardware, software and information shared. It provides low-cost services for business and improves efficiency. Although cloud computing brings people convenience, cloud service providers must focus on data protection, identity management, application security, and privacy to ensure that data is secure and data privacy is protected. In this thesis, we make discussions on security mechanisms for cloud computing. In 2017, Kumari et al. proposed a biometrics-based authentication scheme to ensure the secur
APA, Harvard, Vancouver, ISO, and other styles
48

KUO, CHENG-CHE, and 郭政哲. "Research on Security Protection Architecture for Enterprise Intranet." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/knzu4e.

Full text
Abstract:
碩士<br>國立高雄科技大學<br>資訊管理系<br>107<br>With the rise of the Internet, the signals of wired and wireless networks are becoming more and more dense, and there are more and more opportunities for governments and enterprises to use the Internet to support services. In the past, computer viruses used a magnetic disk and a flash drive to make a single. The spread of equipment has evolved through attacks on the Internet and operating systems, and most attacks have a tendency to spread horizontally. In the past, the network of government and enterprise users mostly used routers to do the third layer of com
APA, Harvard, Vancouver, ISO, and other styles
49

Li, Yuan-Fu, and 李元輔. "A research on security analyses of cryptographic protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/rcwytw.

Full text
Abstract:
碩士<br>國立臺中科技大學<br>資訊工程系碩士班<br>101<br>With the rapid development of the Internet technologies recently, various kinds of business activities are done via the Internet for convenience. How to protect the security of users and these activities becomes an important issue. As a result, many e-commerce applications and user authentication schemes have been proposed. In this study, we first introduce three representative schemes for e-commerce applications and user authentication schemes, respectively. The first scheme is an electronic cash scheme providing anonymity revocation proposed by Chen et al
APA, Harvard, Vancouver, ISO, and other styles
50

Wu, Wei-Na, and 吳維娜. "A research on security analysis of communication protocols." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/rqxe76.

Full text
Abstract:
碩士<br>國立臺中科技大學<br>資訊工程系碩士班<br>101<br>With the rapid development of network technologies, more and more people use the Internet for the exchange of information, multimedia conferencing, online gaming, medical services and commercial behavior and so on. However, the Internet is a public but insecure channel. If the communication content is sensitive for some security issues, the transmitted data needs to be encrypted to prevent leakage. Information security prevents systems and users from being threatened by potential or existing security threats, where integrity and authentication are important
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!