|
Search the dblp DataBase
Shiuh-Jeng Wang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shiuh-Jeng Wang
Multicasting Secret Images using a Knapsack-like Cipher System. [Citation Graph (0, 0)][DBLP] CAINE, 2004, pp:67-72 [Conf]
- Shiuh-Jeng Wang, Jin-Fu Chang
A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing. [Citation Graph (0, 0)][DBLP] DEXA, 1999, pp:372-381 [Conf]
- Shiuh-Jeng Wang, Kai-Sheng Yang
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data. [Citation Graph (0, 0)][DBLP] EC-Web, 2002, pp:333-342 [Conf]
- Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:644-646 [Conf]
- Shiuh-Jeng Wang, Cheng-Hsing Yang
Gathering Digital Evidence in Response to Information Security Incidents. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:644-645 [Conf]
- Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Ywh-Ren Tsai
ID-based authentication for mobile conference call. [Citation Graph (0, 0)][DBLP] SEC, 1996, pp:49-58 [Conf]
- Shiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Yao-Han Chang
Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems. [Citation Graph (0, 0)][DBLP] MUE, 2007, pp:1136-1142 [Conf]
- Shiuh-Jeng Wang, Jin-Fu Chang
Smart card based secure password authentication scheme. [Citation Graph (0, 0)][DBLP] Computers & Security, 1996, v:15, n:3, pp:231-237 [Journal]
- Shiuh-Jeng Wang, Jinn-ke Jan
A displacement addressing method for letter-oriented keys. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1999, v:46, n:1, pp:77-88 [Journal]
- Shiuh-Jeng Wang
Anonymous Wireless Authentication on a Portable Cellular Mobile System. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2004, v:53, n:10, pp:1317-1329 [Journal]
- Yuh-Ren Tsai, Shiuh-Jeng Wang
Two-tier authentication for cluster and individual sets in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:3, pp:883-900 [Journal]
An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems. [Citation Graph (, )][DBLP]
Non-embedded Image Protection Approaches Based on Vector Quantization. [Citation Graph (, )][DBLP]
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. [Citation Graph (, )][DBLP]
Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems. [Citation Graph (, )][DBLP]
Flexible Key Assignment for a Time-Token Constraint in a Hierarchy. [Citation Graph (, )][DBLP]
Histogram-based undetectable fidelity image in steganography as MSB controller. [Citation Graph (, )][DBLP]
Robustness-set in watermarking embedding systems using codebook classifications. [Citation Graph (, )][DBLP]
Hierarchical Key Agreement Protocols in Group-User Systems. [Citation Graph (, )][DBLP]
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. [Citation Graph (, )][DBLP]
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. [Citation Graph (, )][DBLP]
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. [Citation Graph (, )][DBLP]
Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps. [Citation Graph (, )][DBLP]
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. [Citation Graph (, )][DBLP]
A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN. [Citation Graph (, )][DBLP]
Temporal and Location-Based RBAC Model. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|