![]() | ![]() |
2006 | ||
---|---|---|
3 | EE | Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen: Secure Authentication Protocols Resistant to Guessing Attacks. J. Inf. Sci. Eng. 22(5): 1125-1143 (2006) |
2005 | ||
2 | EE | Shu-Min Cheng, Shiuh-Pyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo: Designing Authentication Protocols for Third Generation Mobile Communication Systems. J. Inf. Sci. Eng. 21(2): 361-378 (2005) |
2000 | ||
1 | EE | Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo: Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. IEEE Internet Computing 4(6): 42-49 (2000) |
1 | Shu-Min Cheng | [2] |
2 | Fu-Shen Ho | [1] |
3 | Yu-Lun Huang | [1] |
4 | Fu-Yuan Lee | [2] |
5 | Ji-Chiang Shen | [3] |
6 | Shiuh-Pyng Shieh (Shiuh-Pyng Winston Shieh) | [1] [2] [3] |
7 | Wen-Her Yang | [2] |