2005 |
28 | EE | Thumrongsak Kosiyatrakul,
Susan Older,
Shiu-Kai Chin:
A Modal Logic for Role-Based Access Control.
MMM-ACNS 2005: 179-193 |
2003 |
27 | EE | Thumrongsak Kosiyatrakul,
Susan Older,
Polar Humenn,
Shiu-Kai Chin:
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.
MMM-ACNS 2003: 32-46 |
26 | | Susan Older,
Shiu-Kai Chin:
Outcomes-based Assessment as an Assurance Education Tool.
World Conference on Information Security Education 2003: 179-196 |
2002 |
25 | EE | Susan Older,
Shiu-Kai Chin:
Formal Methods for Assuring Security of Protocols.
Comput. J. 45(1): 46-54 (2002) |
1999 |
24 | EE | Sae Hwan Kim,
Shiu-Kai Chin:
Formal Verification of Tree-Structured Carry-Lookahead Adders.
Great Lakes Symposium on VLSI 1999: 232-233 |
23 | EE | Dan Zhou,
Joncheng C. Kuo,
Susan Older,
Shiu-Kai Chin:
Formal Development of Secure Email.
HICSS 1999 |
22 | EE | Dan Zhou,
Shiu-Kai Chin:
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol.
World Congress on Formal Methods 1999: 758-775 |
21 | EE | Shiu-Kai Chin:
High-Confidence Design for Security: Don't Trust - Verify.
Commun. ACM 42(7): 33-37 (1999) |
1998 |
20 | EE | Shiu-Kai Chin,
Jang Dae Kim:
An Instruction Set Process Calculus.
FMCAD 1998: 451-468 |
19 | | Cynthia E. Irvine,
Shiu-Kai Chin,
Deborah A. Frincke:
Integrating Security into the Curriculum.
IEEE Computer 31(12): 25-30 (1998) |
1996 |
18 | EE | Shiu-Kai Chin,
John Faust,
Joseph Giordano:
Formal Methods Applied to Secure Network Engineering.
ICECCS 1996: 344-351 |
17 | EE | Juin-Yeu Joseph Lu,
Jang Dae Kim,
Shiu-Kai Chin:
Hardware Composition with Hardware Flowcharts and Process Algebras.
ICECCS 1996: 352- |
16 | EE | Milica Barjaktarovic,
Shiu-Kai Chin,
Kamal Jabbour:
Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS.
ISSTA 1996: 270-279 |
1995 |
15 | EE | Anand Chavan,
Shiu-Kai Chin,
Shahid Ikram,
Jang Dae Kim,
Juin-Yeu Zu:
Extending VLSI design with higher-order logic.
ICCD 1995: 85- |
14 | EE | Milica Barjaktarovic,
Shiu-Kai Chin,
Kamal Jabbour:
Formal specification and verification of communication protocols using automated tools .
ICECCS 1995: 246-253 |
13 | EE | Shiu-Kai Chin,
John Faust,
Joseph Giordano:
Integrating formal methods tools to support system design.
ICECCS 1995: 88- |
12 | | Jang Dae Kim,
Shiu-Kai Chin:
Formal Verification of Serial Pipeline Multipliers.
TPHOLs 1995: 229-244 |
1994 |
11 | | Yegnashankar Parasuram,
Edward P. Stabler,
Shiu-Kai Chin:
Parallel implementation of BDD Algorithms using a Distributed Shared Memory.
HICSS (1) 1994: 16-25 |
10 | | Juin-Yeu Lu,
Shiu-Kai Chin:
Generating Designs Using an Algorithmic Register Transfer Language with Formal Semantics.
TPHOLs 1994: 316-331 |
1993 |
9 | | Juin-Yeu Lu,
Shiu-Kai Chin:
Linking HOL to a VLSI CAD System.
HUG 1993: 199-212 |
8 | | Stephen H. Brackin,
Shiu-Kai Chin:
Server-Process Restrictiveness in HOL.
HUG 1993: 450-463 |
1992 |
7 | EE | Shiu-Kai Chin:
Verified functions for generating signed-binary arithmetic hardware.
IEEE Trans. on CAD of Integrated Circuits and Systems 11(12): 1529-1558 (1992) |
1991 |
6 | | Shiu-Kai Chin,
Graham M. Birtwistle:
Implementing and Verifying Finite-State Machines Using Types in Higher-Order Logic.
TPHOLs 1991: 121-129 |
5 | | Shiu-Kai Chin:
Verifying Arithmetic Hardware in Higher-Order Logic.
TPHOLs 1991: 22-31 |
1990 |
4 | EE | Shiu-Kai Chin,
Edward P. Stabler:
Synthesis of arithmetic hardware using hardware metafunctions.
IEEE Trans. on CAD of Integrated Circuits and Systems 9(8): 793-803 (1990) |
1989 |
3 | | Shiu-Kai Chin:
Combining Engineering Vigor with Mathematical Rigor.
Hardware Specification, Verification and Synthesis 1989: 152-176 |
2 | | Damir Jamsek,
Kevin J. Greene,
Shiu-Kai Chin,
Paul R. Humenn:
WINTER: WAMS in Tim Expression Reduction.
NACLP 1989: 1013-1029 |
1988 |
1 | EE | Shiu-Kai Chin,
Edward P. Stabler,
Kevin J. Greene:
Using higher order logic and functional languages to synthesize correct hardware.
ICCL 1988: 396-403 |