The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shiuh-Pyng Shieh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shiuh-Pyng Shieh, Virgil D. Gligor
    A Pattern-Oriented Intrusion-Detection Model and Its Applications. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:327-342 [Conf]
  2. Hung-Min Sun, Shiuh-Pyng Shieh
    On Private-Key Cryptosystems Based on Product Codes. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:68-79 [Conf]
  3. Hung-Min Sun, Shiuh-Pyng Shieh
    Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:153-156 [Conf]
  4. Hung-Min Sun, Shiuh-Pyng Shieh
    Optimal Information Dispersal for Reliable Communication in Computer Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1994, pp:460-465 [Conf]
  5. Shiuh-Pyng Shieh, Hung-Min Sun
    On Constructing Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1994, pp:1288-1292 [Conf]
  6. Hung-Min Sun, Shiuh-Pyng Shieh
    Secret Sharing in Graph-Based Prohibited Structures. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:718-724 [Conf]
  7. Shiuh-Pyng Shieh, Virgil D. Gligor
    Auditing the Use of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:285-295 [Conf]
  8. Fu-Yuan Lee, Shiuhpyng Shieh
    Packet classification using diagonal-based tuple space search. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:9, pp:1406-1423 [Journal]
  9. Shiuh-Pyng Shieh, Jun-Nan Chen
    Specification, validation, and verification of time-critical systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:5, pp:460-469 [Journal]
  10. Shiuhpyng Shieh, Fu-Yuan Lee, Ya-Wen Lin
    Accelerating network security services with fast packet classification. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:16, pp:1637-1646 [Journal]
  11. Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu
    Optimal Assignment of Mobile Agents for Software Authorization and Protection. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:1, pp:46-55 [Journal]
  12. Hung-Min Sun, Shiuh-Pyng Shieh
    Secure broadcasting in large networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:3, pp:279-283 [Journal]
  13. Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun
    A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:2, pp:193-194 [Journal]
  14. Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho
    A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2000, v:19, n:5, pp:453-465 [Journal]
  15. Fu-Yuan Lee, Shiuhpyng Shieh
    Defending against spoofed DDoS attacks with path fingerprint. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:571-586 [Journal]
  16. Wen-Her Yang, Shiuh-Pyng Shieh
    Password authentication schemes with smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1999, v:18, n:8, pp:727-733 [Journal]
  17. Wen-Her Yang, Kai-Wei Fan, Shiuh-Pyng Shieh
    A secure multicast protocol for the internet's multicast backbone. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2001, v:11, n:2, pp:129-136 [Journal]
  18. Wen-Her Yang, Shiuh-Pyng Shieh
    Secure key agreement for group communications. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2001, v:11, n:6, pp:365-374 [Journal]
  19. Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo
    Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2000, v:4, n:6, pp:42-49 [Journal]
  20. Hung-Min Sun, Shiuh-Pyng Shieh
    On Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:52, n:4, pp:201-206 [Journal]
  21. Shiuh-Pyng Shieh, Chern-Tang Lin
    Auditing User Queries in Dynamic Statistical Databases. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:113, n:1-2, pp:131-146 [Journal]
  22. Shiuh-Pyng Shieh, Virgil D. Gligor
    Detecting Illicit Leakage of Information in Operating Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:2/3, pp:123-148 [Journal]
  23. Shiuh-Pyng Shieh
    Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:1, pp:91-106 [Journal]
  24. Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang
    An Efficient Authentication Protocol for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:4, pp:505-520 [Journal]
  25. Hung-Min Sun, Shiuh-Pyng Shieh
    Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:679-689 [Journal]
  26. Shiuh-Pyng Shieh, Wen-Her Yang
    Protecting network users in mobile code systems. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2004, v:64, n:2, pp:191-200 [Journal]
  27. Ing-Jye Shyu, Shiuh-Pyng Shieh
    A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 1999, v:8, n:2, pp:219-247 [Journal]
  28. Ing-Jye Shyu, Shiuh-Pyng Shieh
    Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 1999, v:9, n:3, pp:277-294 [Journal]
  29. Shiuh-Pyng Shieh, Wen-Her Yang
    An Authentication and Key Distribution System for Open Network Systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1996, v:30, n:2, pp:32-41 [Journal]
  30. Ing-Jye Shyu, Shiuh-Pyng Shieh
    Virtual Address Translation for Wide-Address Architectures. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:4, pp:37-46 [Journal]
  31. Chern-Tang Lin, Shiuh-Pyng Shieh
    Chain authentication in mobile communication systems. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 2000, v:13, n:2-4, pp:213-240 [Journal]
  32. Shiuh-Pyng Shieh, Virgil D. Gligor
    On a Pattern-Oriented Model for Intrusion Detection. [Citation Graph (0, 8)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:661-667 [Journal]
  33. Shiuh-Pyng Shieh, Fu-Shen Ho
    A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1997, v:8, n:10, pp:1084- [Journal]
  34. Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang
    Optimal information-dispersal for fault-tolerant communication over a burst-error channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2003, v:52, n:3, pp:354-366 [Journal]

  35. SWOON: A Testbed for Secure Wireless Overlay Networks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002