![]() | ![]() |
2000 | ||
---|---|---|
3 | Chern-Tang Lin, Shiuh-Pyng Shieh: Chain authentication in mobile communication systems. Telecommunication Systems 13(2-4): 213-240 (2000) | |
1999 | ||
2 | Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu: Optimal Assignment of Mobile Agents for Software Authorization and Protection. Computer Communications 22(1): 46-55 (1999) | |
1 | Shiuh-Pyng Shieh, Chern-Tang Lin: Auditing User Queries in Dynamic Statistical Databases. Inf. Sci. 113(1-2): 131-146 (1999) |
1 | Shiuh-Pyng Shieh (Shiuh-Pyng Winston Shieh) | [1] [2] [3] |
2 | Shianyow Wu | [2] |