Shiuh-Pyng Winston Shieh
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
41 | EE | Yu-Lun Huang, J. Doug Tygar, H. Y. Lin, L. Y. Yeh, H. Y. Tsai, K. Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, C. W. Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong: SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008 |
2006 | ||
40 | EE | Fu-Yuan Lee, Shiuh-Pyng Shieh: Packet classification using diagonal-based tuple space search. Computer Networks 50(9): 1406-1423 (2006) |
39 | EE | Jia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen: Secure Authentication Protocols Resistant to Guessing Attacks. J. Inf. Sci. Eng. 22(5): 1125-1143 (2006) |
2005 | ||
38 | EE | Fu-Yuan Lee, Shiuh-Pyng Shieh: Defending against spoofed DDoS attacks with path fingerprint. Computers & Security 24(7): 571-586 (2005) |
37 | EE | Shu-Min Cheng, Shiuh-Pyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo: Designing Authentication Protocols for Third Generation Mobile Communication Systems. J. Inf. Sci. Eng. 21(2): 361-378 (2005) |
2004 | ||
36 | EE | Shiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin: Accelerating network security services with fast packet classification. Computer Communications 27(16): 1637-1646 (2004) |
35 | EE | Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang: Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Transactions on Multimedia 6(5): 760-769 (2004) |
34 | EE | Fu-Yuan Lee, Shiuh-Pyng Shieh: Scalable and lightweight key distribution for secure group communications. Int. Journal of Network Management 14(3): 167-176 (2004) |
33 | EE | Shiuh-Pyng Shieh, Wen-Her Yang: Protecting network users in mobile code systems. J. Parallel Distrib. Comput. 64(2): 191-200 (2004) |
2003 | ||
32 | EE | Shiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang: Optimal information-dispersal for fault-tolerant communication over a burst-error channel. IEEE Transactions on Reliability 52(3): 354-366 (2003) |
2002 | ||
31 | EE | Cheng-Fen Lu, Shiuh-Pyng Winston Shieh: Secure Key-Evolving Protocols for Discrete Logarithm Schemes. CT-RSA 2002: 300-310 |
2001 | ||
30 | EE | Wen-Her Yang, Kai-Wei Fan, Shiuh-Pyng Shieh: A secure multicast protocol for the internet's multicast backbone. Int. Journal of Network Management 11(2): 129-136 (2001) |
29 | EE | Wen-Her Yang, Shiuh-Pyng Shieh: Secure key agreement for group communications. Int. Journal of Network Management 11(6): 365-374 (2001) |
2000 | ||
28 | EE | Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang: Practical Key Distribution Schemes for Channel Protection. COMPSAC 2000: 569-574 |
27 | Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho: A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. Computers & Security 19(5): 453-465 (2000) | |
26 | EE | Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo: Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. IEEE Internet Computing 4(6): 42-49 (2000) |
25 | Chern-Tang Lin, Shiuh-Pyng Shieh: Chain authentication in mobile communication systems. Telecommunication Systems 13(2-4): 213-240 (2000) | |
1999 | ||
24 | Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu: Optimal Assignment of Mobile Agents for Software Authorization and Protection. Computer Communications 22(1): 46-55 (1999) | |
23 | Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun: A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Computer Communications 22(2): 193-194 (1999) | |
22 | EE | Wen-Her Yang, Shiuh-Pyng Shieh: Password authentication schemes with smart cards. Computers & Security 18(8): 727-733 (1999) |
21 | Shiuh-Pyng Shieh, Chern-Tang Lin: Auditing User Queries in Dynamic Statistical Databases. Inf. Sci. 113(1-2): 131-146 (1999) | |
20 | EE | Shiuh-Pyng Shieh: Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. J. Inf. Sci. Eng. 15(1): 91-106 (1999) |
19 | EE | Shiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang: An Efficient Authentication Protocol for Mobile Networks. J. Inf. Sci. Eng. 15(4): 505-520 (1999) |
18 | EE | Hung-Min Sun, Shiuh-Pyng Shieh: Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. J. Inf. Sci. Eng. 15(5): 679-689 (1999) |
17 | Ing-Jye Shyu, Shiuh-Pyng Shieh: A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems. Multimedia Tools Appl. 8(2): 219-247 (1999) | |
16 | Ing-Jye Shyu, Shiuh-Pyng Shieh: Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers. Multimedia Tools Appl. 9(3): 277-294 (1999) | |
1998 | ||
15 | EE | Hung-Min Sun, Shiuh-Pyng Shieh: On Private-Key Cryptosystems Based on Product Codes. ACISP 1998: 68-79 |
14 | EE | Hung-Min Sun, Shiuh-Pyng Shieh: Secure broadcasting in large networks. Computer Communications 21(3): 279-283 (1998) |
13 | EE | Shiuh-Pyng Shieh, Jun-Nan Chen: Specification, validation, and verification of time-critical systems. Computer Communications 21(5): 460-469 (1998) |
1997 | ||
12 | Hung-Min Sun, Shiuh-Pyng Shieh: Secret Sharing in Graph-Based Prohibited Structures. INFOCOM 1997: 718-724 | |
11 | EE | Shiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) |
10 | EE | Shiuh-Pyng Shieh, Fu-Shen Ho: A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees". IEEE Trans. Parallel Distrib. Syst. 8(10): 1084 (1997) |
1996 | ||
9 | EE | Hung-Min Sun, Shiuh-Pyng Shieh: Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. ACM Conference on Computer and Communications Security 1996: 153-156 |
8 | Shiuh-Pyng Shieh, Virgil D. Gligor: Detecting Illicit Leakage of Information in Operating Systems. Journal of Computer Security 4(2/3): 123-148 (1996) | |
7 | Shiuh-Pyng Shieh, Wen-Her Yang: An Authentication and Key Distribution System for Open Network Systems. Operating Systems Review 30(2): 32-41 (1996) | |
1995 | ||
6 | Ing-Jye Shyu, Shiuh-Pyng Shieh: Virtual Address Translation for Wide-Address Architectures. Operating Systems Review 29(4): 37-46 (1995) | |
1994 | ||
5 | Hung-Min Sun, Shiuh-Pyng Shieh: Optimal Information Dispersal for Reliable Communication in Computer Networks. ICPADS 1994: 460-465 | |
4 | Shiuh-Pyng Shieh, Hung-Min Sun: On Constructing Secret Sharing Schemes. INFOCOM 1994: 1288-1292 | |
3 | Hung-Min Sun, Shiuh-Pyng Shieh: On Dynamic Threshold Schemes. Inf. Process. Lett. 52(4): 201-206 (1994) | |
1991 | ||
2 | Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342 | |
1990 | ||
1 | Shiuh-Pyng Shieh, Virgil D. Gligor: Auditing the Use of Covert Storage Channels in Secure Systems. IEEE Symposium on Security and Privacy 1990: 285-295 |
1 | Jun-Nan Chen | [13] |
2 | Shu-Min Cheng | [37] |
3 | S. Y. Chien | [41] |
4 | Kai-Wei Fan | [30] |
5 | Virgil D. Gligor | [1] [2] [8] [11] |
6 | Fu-Shen Ho | [10] [19] [26] [27] [35] |
7 | C. T. Hsu | [41] |
8 | C. W. Hsu | [41] |
9 | L. W. Hsu | [41] |
10 | Yu-Lun Huang | [19] [26] [27] [28] [32] [35] [41] |
11 | Fu-Yuan Lee | [34] [36] [37] [38] [40] |
12 | M. S. Leong | [41] |
13 | Chern-Tang Lin | [21] [24] [25] |
14 | H. Y. Lin | [41] |
15 | Ya-Wen Lin | [36] |
16 | Z. S. Lin | [41] |
17 | Cheng-Fen Lu | [31] |
18 | P. H. Lu | [41] |
19 | Jia-Ning Luo | [26] [37] [39] |
20 | Ji-Chiang Shen | [39] |
21 | Ing-Jye Shyu | [6] [16] [17] |
22 | K. Sklower | [41] |
23 | Hsin-Min Sun | [23] |
24 | Hung-Min Sun | [3] [4] [5] [9] [12] [14] [15] [18] [23] |
25 | H. Y. Tsai | [41] |
26 | Yea-Ching Tsai | [32] |
27 | J. Doug Tygar (J. D. Tygar) | [41] |
28 | Jian-Chyuan Wang | [28] [35] |
29 | C. C. Wu | [41] |
30 | Shianyow Wu | [24] |
31 | Y. C. Wu | [41] |
32 | Wen-Her Yang | [7] [22] [29] [30] [33] [37] |
33 | L. Y. Yeh | [41] |