Search the dblp DataBase
Shiuh-Pyng Shieh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Shiuh-Pyng Shieh , Virgil D. Gligor A Pattern-Oriented Intrusion-Detection Model and Its Applications. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:327-342 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh On Private-Key Cryptosystems Based on Product Codes. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:68-79 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:153-156 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh Optimal Information Dispersal for Reliable Communication in Computer Networks. [Citation Graph (0, 0)][DBLP ] ICPADS, 1994, pp:460-465 [Conf ] Shiuh-Pyng Shieh , Hung-Min Sun On Constructing Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1994, pp:1288-1292 [Conf ] Hung-Min Sun , Shiuh-Pyng Shieh Secret Sharing in Graph-Based Prohibited Structures. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:718-724 [Conf ] Shiuh-Pyng Shieh , Virgil D. Gligor Auditing the Use of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:285-295 [Conf ] Fu-Yuan Lee , Shiuhpyng Shieh Packet classification using diagonal-based tuple space search. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:9, pp:1406-1423 [Journal ] Shiuh-Pyng Shieh , Jun-Nan Chen Specification, validation, and verification of time-critical systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:5, pp:460-469 [Journal ] Shiuhpyng Shieh , Fu-Yuan Lee , Ya-Wen Lin Accelerating network security services with fast packet classification. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:16, pp:1637-1646 [Journal ] Shiuh-Pyng Shieh , Chern-Tang Lin , Shianyow Wu Optimal Assignment of Mobile Agents for Software Authorization and Protection. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:1, pp:46-55 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh Secure broadcasting in large networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:3, pp:279-283 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh , Hsin-Min Sun A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:2, pp:193-194 [Journal ] Yu-Lun Huang , Shiuh-Pyng Shieh , Fu-Shen Ho A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2000, v:19, n:5, pp:453-465 [Journal ] Fu-Yuan Lee , Shiuhpyng Shieh Defending against spoofed DDoS attacks with path fingerprint. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:7, pp:571-586 [Journal ] Wen-Her Yang , Shiuh-Pyng Shieh Password authentication schemes with smart cards. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1999, v:18, n:8, pp:727-733 [Journal ] Wen-Her Yang , Kai-Wei Fan , Shiuh-Pyng Shieh A secure multicast protocol for the internet's multicast backbone. [Citation Graph (0, 0)][DBLP ] Int. Journal of Network Management, 2001, v:11, n:2, pp:129-136 [Journal ] Wen-Her Yang , Shiuh-Pyng Shieh Secure key agreement for group communications. [Citation Graph (0, 0)][DBLP ] Int. Journal of Network Management, 2001, v:11, n:6, pp:365-374 [Journal ] Shiuh-Pyng Shieh , Fu-Shen Ho , Yu-Lun Huang , Jia-Ning Luo Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2000, v:4, n:6, pp:42-49 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh On Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:52, n:4, pp:201-206 [Journal ] Shiuh-Pyng Shieh , Chern-Tang Lin Auditing User Queries in Dynamic Statistical Databases. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1999, v:113, n:1-2, pp:131-146 [Journal ] Shiuh-Pyng Shieh , Virgil D. Gligor Detecting Illicit Leakage of Information in Operating Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:2/3, pp:123-148 [Journal ] Shiuh-Pyng Shieh Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:1, pp:91-106 [Journal ] Shiuh-Pyng Shieh , Fu-Shen Ho , Yu-Lun Huang An Efficient Authentication Protocol for Mobile Networks. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:4, pp:505-520 [Journal ] Hung-Min Sun , Shiuh-Pyng Shieh Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:5, pp:679-689 [Journal ] Shiuh-Pyng Shieh , Wen-Her Yang Protecting network users in mobile code systems. [Citation Graph (0, 0)][DBLP ] J. Parallel Distrib. Comput., 2004, v:64, n:2, pp:191-200 [Journal ] Ing-Jye Shyu , Shiuh-Pyng Shieh A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 1999, v:8, n:2, pp:219-247 [Journal ] Ing-Jye Shyu , Shiuh-Pyng Shieh Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers. [Citation Graph (0, 0)][DBLP ] Multimedia Tools Appl., 1999, v:9, n:3, pp:277-294 [Journal ] Shiuh-Pyng Shieh , Wen-Her Yang An Authentication and Key Distribution System for Open Network Systems. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1996, v:30, n:2, pp:32-41 [Journal ] Ing-Jye Shyu , Shiuh-Pyng Shieh Virtual Address Translation for Wide-Address Architectures. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1995, v:29, n:4, pp:37-46 [Journal ] Chern-Tang Lin , Shiuh-Pyng Shieh Chain authentication in mobile communication systems. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 2000, v:13, n:2-4, pp:213-240 [Journal ] Shiuh-Pyng Shieh , Virgil D. Gligor On a Pattern-Oriented Model for Intrusion Detection. [Citation Graph (0, 8)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:661-667 [Journal ] Shiuh-Pyng Shieh , Fu-Shen Ho A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1997, v:8, n:10, pp:1084- [Journal ] Shiuh-Pyng Shieh , Yea-Ching Tsai , Yu-Lun Huang Optimal information-dispersal for fault-tolerant communication over a burst-error channel. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Reliability, 2003, v:52, n:3, pp:354-366 [Journal ] SWOON: A Testbed for Secure Wireless Overlay Networks. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs