Home
Add Document
Sign In
Register
Yung-Hsiao Chiang's Documents
Home
Yung-Hsiao Chiang's Documents
Yung-Hsiao Chiang's Documents
Malicious Cryptography: Exposing Cryptovirology
Read more
Malicious cryptography: Exposing cryptovirology
Read more
Non-Linear Elliptic Equations in Conformal Geometry
Read more
Assessment Reform in Science: Fairness and Fear (Science & Technology Education Library)
Read more
Applied Cryptography and Network Security, 5 conf., ACNS 2007
Read more
Problems and solutions on atomic, nuclear and particle physics
Read more
Information Security and Cryptology: Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
Read more
Problems and Solutions on Thermodynamics and Statistical Mechanics (Major American Universities Ph.D. Qualifying Questions and Solutions)
Read more
Problems and solutions on mechanics
Read more
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks (Wireless Networks and Mobile Communications)
Read more
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17 conf., AAECC-17
Read more
Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks
Read more
Mobile WiMAX: toward broadband wireless metropolitan area networks
Read more
Embedded Systems Handbook,: Embedded Systems Design and Verification
Read more
Applied algebra, algebraic algorithms and error-correcting codes: 17th international symposium, AAECC-17, Bangalore, India, December 16-20, 2007: proceedings
Read more
Next Generation Wireless Systems and Networks
Read more
Grammars for Language and Genes: Theoretical and Empirical Investigations (Theory and Applications of Natural Language Processing)
Read more
Theory and Applications of Ocean Surface Waves (Advanced Series on Ocean Engineering) (Advanced Series on Ocean Engineering)
Read more
Decision support systems
Read more
Intelligent Systems: Modeling, Optimization, and Control
Read more
Security and Cryptography for Networks: 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings
Read more
Financial Cryptography and Data Security: 9th International Conference, FC 2005, Roseau, The Commonwealth Of Dominica, February 28 - March 3, 2005,
Read more
Homogenization Methods for Multiscale Mechanics
Read more
Five Chinese Communist plays
Read more
Monetary and Financial Integration in East Asia: The Relevance of European Experience
Read more
Information Security Applications: 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers (Lecture Notes in Computer Science Security and Cryptology)
Read more
Intelligent Systems: Modeling, Optimization, and Control (Automation and Control Engineering)
Read more
Geriatric Rheumatology: A Comprehensive Approach
Read more
Intelligent systems: modeling, optimization, and control
Read more
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Read more
«
1
2
3
4
5
6
7
8
9
»
×
Sign In
Email
Password
Remember me
Forgot password?
Sign In
Login with Facebook
Our partners will collect data and use cookies for ad personalization and measurement.
Learn how we and our ad partner Google, collect and use data
.
Agree & close