The SCEAS System
Navigation Menu

Search the dblp DataBase


Woei-Jiunn Tsaur: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Woei-Jiunn Tsaur, Shi-Jinn Horng
    Toward Software Metrics for Distributed Software. [Citation Graph (0, 0)][DBLP]
    APSEC, 1995, pp:209-0 [Conf]
  2. Woei-Jiunn Tsaur
    A Flexible User Authentication Scheme for Multi-server Internet Services. [Citation Graph (0, 0)][DBLP]
    ICN (1), 2001, pp:174-183 [Conf]
  3. Woei-Jiunn Tsaur, Shi-Jinn Horng, Shung-Shing Lee, Ruey-Chang Tsai
    An Efficient and Authenticated Group-Oriented Cryptoscheme Based on a Geometric Method in Internet Environments. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1997, pp:640-647 [Conf]
  4. Woei-Jiunn Tsaur, Shi-Jinn Horng
    Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1996, pp:326-329 [Conf]
  5. Woei-Jiunn Tsaur, Shi-Jinn Horng, R. Tsai
    A Scheme for Auditing Causal Relationships in Group Oriented Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PDSE, 1998, pp:115-0 [Conf]
  6. Woei-Jiunn Tsaur, Shi-Jinn Horng, Chia-Ho Chen
    An authentication-combined access control scheme using a geometric approach in distributed systems. [Citation Graph (0, 0)][DBLP]
    SAC, 1997, pp:361-365 [Conf]
  7. Woei-Jiunn Tsaur, Shi-Jinn Horng
    Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1998, v:41, n:2, pp:125-133 [Journal]
  8. Woei-Jiunn Tsaur, Shi-Jinn Horng
    A new generalized software complexity metric for distributed programs. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1998, v:40, n:5-6, pp:259-269 [Journal]
  9. Wei-Bin Lee, Chia Chun Wu, Woei-Jiunn Tsaur
    A novel deniable authentication protocol using generalized ElGamal signature scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:6, pp:1376-1381 [Journal]
  10. Woei-Jiunn Tsaur, Shi-Jinn Horng
    Auditing Causal Relationships of Group Multicast Communications in Group-Oriented Distributed Systems. [Citation Graph (0, 0)][DBLP]
    The Journal of Supercomputing, 2001, v:18, n:1, pp:25-45 [Journal]
  11. Woei-Jiunn Tsaur, Haw-Tyng Pai
    Dynamic Key Management Schemes for Secure Group Communication Based on Hierarchical Clustering in Mobile AdHocNetworks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:475-484 [Conf]
  12. Woei-Jiunn Tsaur, Haw-Tyng Pai
    A Secure On-Demand Source Routing Scheme Using Hierarchical Clustering in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:513-522 [Conf]
  13. Chia Chun Wu, Wei-Bin Lee, Woei-Jiunn Tsaur
    A secure protocol for misbehavior-penalization-based fair digital signature exchange. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:138-139 [Conf]
  14. Woei-Jiunn Tsaur, Haw-Tyng Pai
    A new security scheme for on-demand source routing in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:577-582 [Conf]

  15. Constructing Secure Commercial Vehicle Operation Systems Based on XML and RFID Techniques. [Citation Graph (, )][DBLP]

  16. An Agent-Based Single Sign-On Scheme for Web Services Environments. [Citation Graph (, )][DBLP]

  17. A New Windows Driver-Hidden Rootkit Based on Direct Kernel Object Manipulation. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002