The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shiuh-Jeng Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shiuh-Jeng Wang
    Multicasting Secret Images using a Knapsack-like Cipher System. [Citation Graph (0, 0)][DBLP]
    CAINE, 2004, pp:67-72 [Conf]
  2. Shiuh-Jeng Wang, Jin-Fu Chang
    A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing. [Citation Graph (0, 0)][DBLP]
    DEXA, 1999, pp:372-381 [Conf]
  3. Shiuh-Jeng Wang, Kai-Sheng Yang
    Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2002, pp:333-342 [Conf]
  4. Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang
    Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:644-646 [Conf]
  5. Shiuh-Jeng Wang, Cheng-Hsing Yang
    Gathering Digital Evidence in Response to Information Security Incidents. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:644-645 [Conf]
  6. Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Ywh-Ren Tsai
    ID-based authentication for mobile conference call. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:49-58 [Conf]
  7. Shiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Yao-Han Chang
    Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1136-1142 [Conf]
  8. Shiuh-Jeng Wang, Jin-Fu Chang
    Smart card based secure password authentication scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:3, pp:231-237 [Journal]
  9. Shiuh-Jeng Wang, Jinn-ke Jan
    A displacement addressing method for letter-oriented keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:46, n:1, pp:77-88 [Journal]
  10. Shiuh-Jeng Wang
    Anonymous Wireless Authentication on a Portable Cellular Mobile System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:10, pp:1317-1329 [Journal]
  11. Yuh-Ren Tsai, Shiuh-Jeng Wang
    Two-tier authentication for cluster and individual sets in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:3, pp:883-900 [Journal]

  12. An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems. [Citation Graph (, )][DBLP]


  13. Non-embedded Image Protection Approaches Based on Vector Quantization. [Citation Graph (, )][DBLP]


  14. Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. [Citation Graph (, )][DBLP]


  15. Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems. [Citation Graph (, )][DBLP]


  16. Flexible Key Assignment for a Time-Token Constraint in a Hierarchy. [Citation Graph (, )][DBLP]


  17. Histogram-based undetectable fidelity image in steganography as MSB controller. [Citation Graph (, )][DBLP]


  18. Robustness-set in watermarking embedding systems using codebook classifications. [Citation Graph (, )][DBLP]


  19. Hierarchical Key Agreement Protocols in Group-User Systems. [Citation Graph (, )][DBLP]


  20. Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. [Citation Graph (, )][DBLP]


  21. Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. [Citation Graph (, )][DBLP]


  22. Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. [Citation Graph (, )][DBLP]


  23. Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps. [Citation Graph (, )][DBLP]


  24. Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. [Citation Graph (, )][DBLP]


  25. A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN. [Citation Graph (, )][DBLP]


  26. Temporal and Location-Based RBAC Model. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002