|
Search the dblp DataBase
Shiuhpyng Shieh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh
An efficient broadcast authentication scheme in wireless sensor networks. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:311-320 [Conf]
- Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
Lightweight, pollution-attack resistant multicast authentication scheme. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:148-156 [Conf]
- Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
Keystroke statistical learning model for web authentication. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:359-361 [Conf]
- Fu-Yuan Lee, Shiuhpyng Shieh
Scalable and lightweight key distribution for secure group communications. [Citation Graph (0, 0)][DBLP] Int. Journal of Network Management, 2004, v:14, n:3, pp:167-176 [Journal]
- Shu-Min Cheng, Shiuhpyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo
Designing Authentication Protocols for Third Generation Mobile Communication Systems. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2005, v:21, n:2, pp:361-378 [Journal]
- Cheng-Fen Lu, Shiuhpyng Shieh
Efficient Key-Evolving Protocol for the GQ Signature. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2004, v:20, n:4, pp:763-769 [Journal]
- Cheng-Fen Lu, Shiuhpyng Shieh
Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2004, v:20, n:2, pp:391-400 [Journal]
- Jia-Ning Luo, Shiuhpyng Shieh, Ji-Chiang Shen
Secure Authentication Protocols Resistant to Guessing Attacks. [Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2006, v:22, n:5, pp:1125-1143 [Journal]
- Yu-Lun Huang, Shiuhpyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang
Efficient key distribution schemes for secure media delivery in pay-TV systems. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Multimedia, 2004, v:6, n:5, pp:760-769 [Journal]
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Tracing Mobile Attackers in Wireless Ad-Hoc Network. [Citation Graph (, )][DBLP]
Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. [Citation Graph (, )][DBLP]
Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss. [Citation Graph (, )][DBLP]
Search in 0.012secs, Finished in 0.013secs
|