dblp.uni-trier.dewww.uni-trier.de

Shiuh-Pyng Shieh

Shiuh-Pyng Winston Shieh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
41EEYu-Lun Huang, J. Doug Tygar, H. Y. Lin, L. Y. Yeh, H. Y. Tsai, K. Sklower, Shiuh-Pyng Shieh, C. C. Wu, P. H. Lu, S. Y. Chien, Z. S. Lin, L. W. Hsu, C. W. Hsu, C. T. Hsu, Y. C. Wu, M. S. Leong: SWOON: A Testbed for Secure Wireless Overlay Networks. CSET 2008
2006
40EEFu-Yuan Lee, Shiuh-Pyng Shieh: Packet classification using diagonal-based tuple space search. Computer Networks 50(9): 1406-1423 (2006)
39EEJia-Ning Luo, Shiuh-Pyng Shieh, Ji-Chiang Shen: Secure Authentication Protocols Resistant to Guessing Attacks. J. Inf. Sci. Eng. 22(5): 1125-1143 (2006)
2005
38EEFu-Yuan Lee, Shiuh-Pyng Shieh: Defending against spoofed DDoS attacks with path fingerprint. Computers & Security 24(7): 571-586 (2005)
37EEShu-Min Cheng, Shiuh-Pyng Shieh, Wen-Her Yang, Fu-Yuan Lee, Jia-Ning Luo: Designing Authentication Protocols for Third Generation Mobile Communication Systems. J. Inf. Sci. Eng. 21(2): 361-378 (2005)
2004
36EEShiuh-Pyng Shieh, Fu-Yuan Lee, Ya-Wen Lin: Accelerating network security services with fast packet classification. Computer Communications 27(16): 1637-1646 (2004)
35EEYu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho, Jian-Chyuan Wang: Efficient key distribution schemes for secure media delivery in pay-TV systems. IEEE Transactions on Multimedia 6(5): 760-769 (2004)
34EEFu-Yuan Lee, Shiuh-Pyng Shieh: Scalable and lightweight key distribution for secure group communications. Int. Journal of Network Management 14(3): 167-176 (2004)
33EEShiuh-Pyng Shieh, Wen-Her Yang: Protecting network users in mobile code systems. J. Parallel Distrib. Comput. 64(2): 191-200 (2004)
2003
32EEShiuh-Pyng Shieh, Yea-Ching Tsai, Yu-Lun Huang: Optimal information-dispersal for fault-tolerant communication over a burst-error channel. IEEE Transactions on Reliability 52(3): 354-366 (2003)
2002
31EECheng-Fen Lu, Shiuh-Pyng Winston Shieh: Secure Key-Evolving Protocols for Discrete Logarithm Schemes. CT-RSA 2002: 300-310
2001
30EEWen-Her Yang, Kai-Wei Fan, Shiuh-Pyng Shieh: A secure multicast protocol for the internet's multicast backbone. Int. Journal of Network Management 11(2): 129-136 (2001)
29EEWen-Her Yang, Shiuh-Pyng Shieh: Secure key agreement for group communications. Int. Journal of Network Management 11(6): 365-374 (2001)
2000
28EEYu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang: Practical Key Distribution Schemes for Channel Protection. COMPSAC 2000: 569-574
27 Yu-Lun Huang, Shiuh-Pyng Shieh, Fu-Shen Ho: A Generic Electronic Payment Model Supporting Multiple Merchant Transactions. Computers & Security 19(5): 453-465 (2000)
26EEShiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang, Jia-Ning Luo: Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack. IEEE Internet Computing 4(6): 42-49 (2000)
25 Chern-Tang Lin, Shiuh-Pyng Shieh: Chain authentication in mobile communication systems. Telecommunication Systems 13(2-4): 213-240 (2000)
1999
24 Shiuh-Pyng Shieh, Chern-Tang Lin, Shianyow Wu: Optimal Assignment of Mobile Agents for Software Authorization and Protection. Computer Communications 22(1): 46-55 (1999)
23 Hung-Min Sun, Shiuh-Pyng Shieh, Hsin-Min Sun: A Note on Breaking and Repairing a Secure Broadcasting in Large Networks. Computer Communications 22(2): 193-194 (1999)
22EEWen-Her Yang, Shiuh-Pyng Shieh: Password authentication schemes with smart cards. Computers & Security 18(8): 727-733 (1999)
21 Shiuh-Pyng Shieh, Chern-Tang Lin: Auditing User Queries in Dynamic Statistical Databases. Inf. Sci. 113(1-2): 131-146 (1999)
20EEShiuh-Pyng Shieh: Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems. J. Inf. Sci. Eng. 15(1): 91-106 (1999)
19EEShiuh-Pyng Shieh, Fu-Shen Ho, Yu-Lun Huang: An Efficient Authentication Protocol for Mobile Networks. J. Inf. Sci. Eng. 15(4): 505-520 (1999)
18EEHung-Min Sun, Shiuh-Pyng Shieh: Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures. J. Inf. Sci. Eng. 15(5): 679-689 (1999)
17 Ing-Jye Shyu, Shiuh-Pyng Shieh: A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems. Multimedia Tools Appl. 8(2): 219-247 (1999)
16 Ing-Jye Shyu, Shiuh-Pyng Shieh: Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers. Multimedia Tools Appl. 9(3): 277-294 (1999)
1998
15EEHung-Min Sun, Shiuh-Pyng Shieh: On Private-Key Cryptosystems Based on Product Codes. ACISP 1998: 68-79
14EEHung-Min Sun, Shiuh-Pyng Shieh: Secure broadcasting in large networks. Computer Communications 21(3): 279-283 (1998)
13EEShiuh-Pyng Shieh, Jun-Nan Chen: Specification, validation, and verification of time-critical systems. Computer Communications 21(5): 460-469 (1998)
1997
12 Hung-Min Sun, Shiuh-Pyng Shieh: Secret Sharing in Graph-Based Prohibited Structures. INFOCOM 1997: 718-724
11EEShiuh-Pyng Shieh, Virgil D. Gligor: On a Pattern-Oriented Model for Intrusion Detection. IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997)
10EEShiuh-Pyng Shieh, Fu-Shen Ho: A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees". IEEE Trans. Parallel Distrib. Syst. 8(10): 1084 (1997)
1996
9EEHung-Min Sun, Shiuh-Pyng Shieh: Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes. ACM Conference on Computer and Communications Security 1996: 153-156
8 Shiuh-Pyng Shieh, Virgil D. Gligor: Detecting Illicit Leakage of Information in Operating Systems. Journal of Computer Security 4(2/3): 123-148 (1996)
7 Shiuh-Pyng Shieh, Wen-Her Yang: An Authentication and Key Distribution System for Open Network Systems. Operating Systems Review 30(2): 32-41 (1996)
1995
6 Ing-Jye Shyu, Shiuh-Pyng Shieh: Virtual Address Translation for Wide-Address Architectures. Operating Systems Review 29(4): 37-46 (1995)
1994
5 Hung-Min Sun, Shiuh-Pyng Shieh: Optimal Information Dispersal for Reliable Communication in Computer Networks. ICPADS 1994: 460-465
4 Shiuh-Pyng Shieh, Hung-Min Sun: On Constructing Secret Sharing Schemes. INFOCOM 1994: 1288-1292
3 Hung-Min Sun, Shiuh-Pyng Shieh: On Dynamic Threshold Schemes. Inf. Process. Lett. 52(4): 201-206 (1994)
1991
2 Shiuh-Pyng Shieh, Virgil D. Gligor: A Pattern-Oriented Intrusion-Detection Model and Its Applications. IEEE Symposium on Security and Privacy 1991: 327-342
1990
1 Shiuh-Pyng Shieh, Virgil D. Gligor: Auditing the Use of Covert Storage Channels in Secure Systems. IEEE Symposium on Security and Privacy 1990: 285-295

Coauthor Index

1Jun-Nan Chen [13]
2Shu-Min Cheng [37]
3S. Y. Chien [41]
4Kai-Wei Fan [30]
5Virgil D. Gligor [1] [2] [8] [11]
6Fu-Shen Ho [10] [19] [26] [27] [35]
7C. T. Hsu [41]
8C. W. Hsu [41]
9L. W. Hsu [41]
10Yu-Lun Huang [19] [26] [27] [28] [32] [35] [41]
11Fu-Yuan Lee [34] [36] [37] [38] [40]
12M. S. Leong [41]
13Chern-Tang Lin [21] [24] [25]
14H. Y. Lin [41]
15Ya-Wen Lin [36]
16Z. S. Lin [41]
17Cheng-Fen Lu [31]
18P. H. Lu [41]
19Jia-Ning Luo [26] [37] [39]
20Ji-Chiang Shen [39]
21Ing-Jye Shyu [6] [16] [17]
22K. Sklower [41]
23Hsin-Min Sun [23]
24Hung-Min Sun [3] [4] [5] [9] [12] [14] [15] [18] [23]
25H. Y. Tsai [41]
26Yea-Ching Tsai [32]
27J. Doug Tygar (J. D. Tygar) [41]
28Jian-Chyuan Wang [28] [35]
29C. C. Wu [41]
30Shianyow Wu [24]
31Y. C. Wu [41]
32Wen-Her Yang [7] [22] [29] [30] [33] [37]
33L. Y. Yeh [41]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)