|
Search the dblp DataBase
Yu-Lun Huang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Y. L. Huang, F. S. Ho, H. Y. Tsai, H. M. Kao
A control flow obfuscation method to discourage malicious tampering of software codes. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:362- [Conf]
- Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang
Practical Key Distribution Schemes for Channel Protection. [Citation Graph (0, 0)][DBLP] COMPSAC, 2000, pp:569-574 [Conf]
- Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:5, pp:453-465 [Journal]
- Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo
Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2000, v:4, n:6, pp:42-49 [Journal]
- Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang
An Efficient Authentication Protocol for Mobile Networks. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 1999, v:15, n:4, pp:505-520 [Journal]
- Yu-Lun Huang, Shiuhpyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang
Efficient key distribution schemes for secure media delivery in pay-TV systems. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Multimedia, 2004, v:6, n:5, pp:760-769 [Journal]
- Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang
Optimal information-dispersal for fault-tolerant communication over a burst-error channel. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Reliability, 2003, v:52, n:3, pp:354-366 [Journal]
Design methodology and hands-on practices for Embedded Operating Systems. [Citation Graph (, )][DBLP]
SWOON: A Testbed for Secure Wireless Overlay Networks. [Citation Graph (, )][DBLP]
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|