The SCEAS System
Navigation Menu

Search the dblp DataBase


Shiu-Kai Chin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dan Zhou, Shiu-Kai Chin
    Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol. [Citation Graph (0, 0)][DBLP]
    World Congress on Formal Methods, 1999, pp:758-775 [Conf]
  2. Shiu-Kai Chin, Jang Dae Kim
    An Instruction Set Process Calculus. [Citation Graph (0, 0)][DBLP]
    FMCAD, 1998, pp:451-468 [Conf]
  3. Sae Hwan Kim, Shiu-Kai Chin
    Formal Verification of Tree-Structured Carry-Lookahead Adders. [Citation Graph (0, 0)][DBLP]
    Great Lakes Symposium on VLSI, 1999, pp:232-233 [Conf]
  4. Yegnashankar Parasuram, Edward P. Stabler, Shiu-Kai Chin
    Parallel implementation of BDD Algorithms using a Distributed Shared Memory. [Citation Graph (0, 0)][DBLP]
    HICSS (1), 1994, pp:16-25 [Conf]
  5. Dan Zhou, Joncheng C. Kuo, Susan Older, Shiu-Kai Chin
    Formal Development of Secure Email. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  6. Anand Chavan, Shiu-Kai Chin, Shahid Ikram, Jang Dae Kim, Juin-Yeu Zu
    Extending VLSI design with higher-order logic. [Citation Graph (0, 0)][DBLP]
    ICCD, 1995, pp:85-0 [Conf]
  7. Shiu-Kai Chin, Edward P. Stabler, Kevin J. Greene
    Using higher order logic and functional languages to synthesize correct hardware. [Citation Graph (0, 0)][DBLP]
    ICCL, 1988, pp:396-403 [Conf]
  8. Shiu-Kai Chin, John Faust, Joseph Giordano
    Integrating formal methods tools to support system design. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1995, pp:88-0 [Conf]
  9. Shiu-Kai Chin, John Faust, Joseph Giordano
    Formal Methods Applied to Secure Network Engineering. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1996, pp:344-351 [Conf]
  10. Milica Barjaktarovic, Shiu-Kai Chin, Kamal Jabbour
    Formal specification and verification of communication protocols using automated tools . [Citation Graph (0, 0)][DBLP]
    ICECCS, 1995, pp:246-253 [Conf]
  11. Juin-Yeu Joseph Lu, Jang Dae Kim, Shiu-Kai Chin
    Hardware Composition with Hardware Flowcharts and Process Algebras. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1996, pp:352-0 [Conf]
  12. Susan Older, Shiu-Kai Chin
    Outcomes-based Assessment as an Assurance Education Tool. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:179-196 [Conf]
  13. Milica Barjaktarovic, Shiu-Kai Chin, Kamal Jabbour
    Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS. [Citation Graph (0, 0)][DBLP]
    ISSTA, 1996, pp:270-279 [Conf]
  14. Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin
    A Modal Logic for Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:179-193 [Conf]
  15. Thumrongsak Kosiyatrakul, Susan Older, Polar R. Humenn, Shiu-Kai Chin
    Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:32-46 [Conf]
  16. Shiu-Kai Chin
    Combining Engineering Vigor with Mathematical Rigor. [Citation Graph (0, 0)][DBLP]
    Hardware Specification, Verification and Synthesis, 1989, pp:152-176 [Conf]
  17. Damir Jamsek, Kevin J. Greene, Shiu-Kai Chin, Paul R. Humenn
    WINTER: WAMS in Tim Expression Reduction. [Citation Graph (0, 0)][DBLP]
    NACLP, 1989, pp:1013-1029 [Conf]
  18. Stephen H. Brackin, Shiu-Kai Chin
    Server-Process Restrictiveness in HOL. [Citation Graph (0, 0)][DBLP]
    HUG, 1993, pp:450-463 [Conf]
  19. Juin-Yeu Lu, Shiu-Kai Chin
    Linking HOL to a VLSI CAD System. [Citation Graph (0, 0)][DBLP]
    HUG, 1993, pp:199-212 [Conf]
  20. Juin-Yeu Lu, Shiu-Kai Chin
    Generating Designs Using an Algorithmic Register Transfer Language with Formal Semantics. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1994, pp:316-331 [Conf]
  21. Shiu-Kai Chin
    Verifying Arithmetic Hardware in Higher-Order Logic. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1991, pp:22-31 [Conf]
  22. Shiu-Kai Chin, Graham M. Birtwistle
    Implementing and Verifying Finite-State Machines Using Types in Higher-Order Logic. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1991, pp:121-129 [Conf]
  23. Jang Dae Kim, Shiu-Kai Chin
    Formal Verification of Serial Pipeline Multipliers. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1995, pp:229-244 [Conf]
  24. Shiu-Kai Chin
    High-Confidence Design for Security: Don't Trust - Verify. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:33-37 [Journal]
  25. Susan Older, Shiu-Kai Chin
    Formal Methods for Assuring Security of Protocols. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:1, pp:46-54 [Journal]
  26. Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke
    Integrating Security into the Curriculum. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:12, pp:25-30 [Journal]
  27. Shiu-Kai Chin
    Verified functions for generating signed-binary arithmetic hardware. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1992, v:11, n:12, pp:1529-1558 [Journal]
  28. Shiu-Kai Chin, Edward P. Stabler
    Synthesis of arithmetic hardware using hardware metafunctions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1990, v:9, n:8, pp:793-803 [Journal]

  29. Credentials Management for High-Value Transactions. [Citation Graph (, )][DBLP]

  30. Policy-Based Design and Verification for Mission Assurance. [Citation Graph (, )][DBLP]

Search in 0.058secs, Finished in 0.059secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002