The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shiuhpyng Shieh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, Chih-Ming Hsieh
    An efficient broadcast authentication scheme in wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:311-320 [Conf]
  2. Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin
    Lightweight, pollution-attack resistant multicast authentication scheme. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:148-156 [Conf]
  3. Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu
    Keystroke statistical learning model for web authentication. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:359-361 [Conf]
  4. Fu-Yuan Lee, Shiuhpyng Shieh
    Scalable and lightweight key distribution for secure group communications. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2004, v:14, n:3, pp:167-176 [Journal]
  5. Shu-Min Cheng, Shiuhpyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo
    Designing Authentication Protocols for Third Generation Mobile Communication Systems. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:2, pp:361-378 [Journal]
  6. Cheng-Fen Lu, Shiuhpyng Shieh
    Efficient Key-Evolving Protocol for the GQ Signature. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2004, v:20, n:4, pp:763-769 [Journal]
  7. Cheng-Fen Lu, Shiuhpyng Shieh
    Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2004, v:20, n:2, pp:391-400 [Journal]
  8. Jia-Ning Luo, Shiuhpyng Shieh, Ji-Chiang Shen
    Secure Authentication Protocols Resistant to Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2006, v:22, n:5, pp:1125-1143 [Journal]
  9. Yu-Lun Huang, Shiuhpyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang
    Efficient key distribution schemes for secure media delivery in pay-TV systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2004, v:6, n:5, pp:760-769 [Journal]

  10. SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  11. Tracing Mobile Attackers in Wireless Ad-Hoc Network. [Citation Graph (, )][DBLP]


  12. Provable Secure AKA Scheme with Reliable Key Delegation in UMTS. [Citation Graph (, )][DBLP]


  13. Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  14. A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002