![]() |
| 2000 | ||
|---|---|---|
| 3 | Chern-Tang Lin, Shiuh-Pyng Shieh: Chain authentication in mobile communication systems. Telecommunication Systems 13(2-4): 213-240 (2000) | |
| 1999 | ||
| 2 | Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu: Optimal Assignment of Mobile Agents for Software Authorization and Protection. Computer Communications 22(1): 46-55 (1999) | |
| 1 | Shiuh-Pyng Shieh, Chern-Tang Lin: Auditing User Queries in Dynamic Statistical Databases. Inf. Sci. 113(1-2): 131-146 (1999) | |
| 1 | Shiuh-Pyng Shieh (Shiuh-Pyng Winston Shieh) | [1] [2] [3] |
| 2 | Shianyow Wu | [2] |