2006 | ||
---|---|---|
5 | EE | Fu-Yuan Lee, Shiuh-Pyng Shieh: Packet classification using diagonal-based tuple space search. Computer Networks 50(9): 1406-1423 (2006) |
2005 | ||
4 | EE | Fu-Yuan Lee, Shiuh-Pyng Shieh: Defending against spoofed DDoS attacks with path fingerprint. Computers & Security 24(7): 571-586 (2005) |
3 | EE | Shu-Min Cheng, Shiuh-Pyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo: Designing Authentication Protocols for Third Generation Mobile Communication Systems. J. Inf. Sci. Eng. 21(2): 361-378 (2005) |
2004 | ||
2 | EE | Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin: Accelerating network security services with fast packet classification. Computer Communications 27(16): 1637-1646 (2004) |
1 | EE | Fu-Yuan Lee, Shiuh-Pyng Shieh: Scalable and lightweight key distribution for secure group communications. Int. Journal of Network Management 14(3): 167-176 (2004) |
1 | Shu-Min Cheng | [3] |
2 | Ya-Wen Lin | [2] |
3 | Jia-Ning Luo | [3] |
4 | Shiuh-Pyng Shieh (Shiuh-Pyng Winston Shieh) | [1] [2] [3] [4] [5] |
5 | Wen-Her Yang | [3] |