![]() |
| 2008 | ||
|---|---|---|
| 6 | EE | Min-Hua Shao, Shin-Jia Huang: Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks. PDCAT 2008: 335-341 |
| 5 | Min-Hua Shao, Shin-Jia Huang: Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks. WOSIS 2008: 132-137 | |
| 2007 | ||
| 4 | EE | Min-Hua Shao: A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. TrustBus 2007: 44-53 |
| 2006 | ||
| 3 | EE | Min-Hua Shao, Guilin Wang, Jianying Zhou: Some common attacks against certified email protocols and the countermeasures. Computer Communications 29(15): 2759-2769 (2006) |
| 2005 | ||
| 2 | EE | Min-Hua Shao, Jianying Zhou, Guilin Wang: On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710 |
| 2003 | ||
| 1 | Jing-Jang Hwang, Min-Hua Shao, Soushan Wu: Establishing Chain of Evidence as a Base for Non-Repudiation Services. SEC 2003: 49-60 | |
| 1 | Shin-Jia Huang | [5] [6] |
| 2 | Jing-Jang Hwang | [1] |
| 3 | Guilin Wang | [2] [3] |
| 4 | Soushan Wu | [1] |
| 5 | Jianying Zhou | [2] [3] |