Search the dblp DataBase
Shiu-Kai Chin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dan Zhou , Shiu-Kai Chin Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol. [Citation Graph (0, 0)][DBLP ] World Congress on Formal Methods, 1999, pp:758-775 [Conf ] Shiu-Kai Chin , Jang Dae Kim An Instruction Set Process Calculus. [Citation Graph (0, 0)][DBLP ] FMCAD, 1998, pp:451-468 [Conf ] Sae Hwan Kim , Shiu-Kai Chin Formal Verification of Tree-Structured Carry-Lookahead Adders. [Citation Graph (0, 0)][DBLP ] Great Lakes Symposium on VLSI, 1999, pp:232-233 [Conf ] Yegnashankar Parasuram , Edward P. Stabler , Shiu-Kai Chin Parallel implementation of BDD Algorithms using a Distributed Shared Memory. [Citation Graph (0, 0)][DBLP ] HICSS (1), 1994, pp:16-25 [Conf ] Dan Zhou , Joncheng C. Kuo , Susan Older , Shiu-Kai Chin Formal Development of Secure Email. [Citation Graph (0, 0)][DBLP ] HICSS, 1999, pp:- [Conf ] Anand Chavan , Shiu-Kai Chin , Shahid Ikram , Jang Dae Kim , Juin-Yeu Zu Extending VLSI design with higher-order logic. [Citation Graph (0, 0)][DBLP ] ICCD, 1995, pp:85-0 [Conf ] Shiu-Kai Chin , Edward P. Stabler , Kevin J. Greene Using higher order logic and functional languages to synthesize correct hardware. [Citation Graph (0, 0)][DBLP ] ICCL, 1988, pp:396-403 [Conf ] Shiu-Kai Chin , John Faust , Joseph Giordano Integrating formal methods tools to support system design. [Citation Graph (0, 0)][DBLP ] ICECCS, 1995, pp:88-0 [Conf ] Shiu-Kai Chin , John Faust , Joseph Giordano Formal Methods Applied to Secure Network Engineering. [Citation Graph (0, 0)][DBLP ] ICECCS, 1996, pp:344-351 [Conf ] Milica Barjaktarovic , Shiu-Kai Chin , Kamal Jabbour Formal specification and verification of communication protocols using automated tools . [Citation Graph (0, 0)][DBLP ] ICECCS, 1995, pp:246-253 [Conf ] Juin-Yeu Joseph Lu , Jang Dae Kim , Shiu-Kai Chin Hardware Composition with Hardware Flowcharts and Process Algebras. [Citation Graph (0, 0)][DBLP ] ICECCS, 1996, pp:352-0 [Conf ] Susan Older , Shiu-Kai Chin Outcomes-based Assessment as an Assurance Education Tool. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:179-196 [Conf ] Milica Barjaktarovic , Shiu-Kai Chin , Kamal Jabbour Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS. [Citation Graph (0, 0)][DBLP ] ISSTA, 1996, pp:270-279 [Conf ] Thumrongsak Kosiyatrakul , Susan Older , Shiu-Kai Chin A Modal Logic for Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2005, pp:179-193 [Conf ] Thumrongsak Kosiyatrakul , Susan Older , Polar R. Humenn , Shiu-Kai Chin Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:32-46 [Conf ] Shiu-Kai Chin Combining Engineering Vigor with Mathematical Rigor. [Citation Graph (0, 0)][DBLP ] Hardware Specification, Verification and Synthesis, 1989, pp:152-176 [Conf ] Damir Jamsek , Kevin J. Greene , Shiu-Kai Chin , Paul R. Humenn WINTER: WAMS in Tim Expression Reduction. [Citation Graph (0, 0)][DBLP ] NACLP, 1989, pp:1013-1029 [Conf ] Stephen H. Brackin , Shiu-Kai Chin Server-Process Restrictiveness in HOL. [Citation Graph (0, 0)][DBLP ] HUG, 1993, pp:450-463 [Conf ] Juin-Yeu Lu , Shiu-Kai Chin Linking HOL to a VLSI CAD System. [Citation Graph (0, 0)][DBLP ] HUG, 1993, pp:199-212 [Conf ] Juin-Yeu Lu , Shiu-Kai Chin Generating Designs Using an Algorithmic Register Transfer Language with Formal Semantics. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1994, pp:316-331 [Conf ] Shiu-Kai Chin Verifying Arithmetic Hardware in Higher-Order Logic. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1991, pp:22-31 [Conf ] Shiu-Kai Chin , Graham M. Birtwistle Implementing and Verifying Finite-State Machines Using Types in Higher-Order Logic. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1991, pp:121-129 [Conf ] Jang Dae Kim , Shiu-Kai Chin Formal Verification of Serial Pipeline Multipliers. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1995, pp:229-244 [Conf ] Shiu-Kai Chin High-Confidence Design for Security: Don't Trust - Verify. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:33-37 [Journal ] Susan Older , Shiu-Kai Chin Formal Methods for Assuring Security of Protocols. [Citation Graph (0, 0)][DBLP ] Comput. J., 2002, v:45, n:1, pp:46-54 [Journal ] Cynthia E. Irvine , Shiu-Kai Chin , Deborah A. Frincke Integrating Security into the Curriculum. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:12, pp:25-30 [Journal ] Shiu-Kai Chin Verified functions for generating signed-binary arithmetic hardware. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 1992, v:11, n:12, pp:1529-1558 [Journal ] Shiu-Kai Chin , Edward P. Stabler Synthesis of arithmetic hardware using hardware metafunctions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. on CAD of Integrated Circuits and Systems, 1990, v:9, n:8, pp:793-803 [Journal ] Credentials Management for High-Value Transactions. [Citation Graph (, )][DBLP ] Policy-Based Design and Verification for Mission Assurance. [Citation Graph (, )][DBLP ] Search in 0.058secs, Finished in 0.059secs