|
Search the dblp DataBase
Wen-Her Yang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Wen-Her Yang, Shiuh-Pyng Shieh
Password authentication schemes with smart cards. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:8, pp:727-733 [Journal]
- Wen-Her Yang, Kai-Wei Fan, Shiuh-Pyng Shieh
A secure multicast protocol for the internet's multicast backbone. [Citation Graph (0, 0)][DBLP] Int. Journal of Network Management, 2001, v:11, n:2, pp:129-136 [Journal]
- Wen-Her Yang, Shiuh-Pyng Shieh
Secure key agreement for group communications. [Citation Graph (0, 0)][DBLP] Int. Journal of Network Management, 2001, v:11, n:6, pp:365-374 [Journal]
- Shu-Min Cheng, Shiuhpyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo
Designing Authentication Protocols for Third Generation Mobile Communication Systems. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2005, v:21, n:2, pp:361-378 [Journal]
- Shiuh-Pyng Shieh, Wen-Her Yang
Protecting network users in mobile code systems. [Citation Graph (0, 0)][DBLP] J. Parallel Distrib. Comput., 2004, v:64, n:2, pp:191-200 [Journal]
- Shiuh-Pyng Shieh, Wen-Her Yang
An Authentication and Key Distribution System for Open Network Systems. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1996, v:30, n:2, pp:32-41 [Journal]
Search in 0.001secs, Finished in 0.001secs
|