2008 |
41 | EE | Yu-Lun Huang,
J. Doug Tygar,
H. Y. Lin,
L. Y. Yeh,
H. Y. Tsai,
K. Sklower,
Shiuh-Pyng Shieh,
C. C. Wu,
P. H. Lu,
S. Y. Chien,
Z. S. Lin,
L. W. Hsu,
C. W. Hsu,
C. T. Hsu,
Y. C. Wu,
M. S. Leong:
SWOON: A Testbed for Secure Wireless Overlay Networks.
CSET 2008 |
2006 |
40 | EE | Fu-Yuan Lee,
Shiuh-Pyng Shieh:
Packet classification using diagonal-based tuple space search.
Computer Networks 50(9): 1406-1423 (2006) |
39 | EE | Jia-Ning Luo,
Shiuh-Pyng Shieh,
Ji-Chiang Shen:
Secure Authentication Protocols Resistant to Guessing Attacks.
J. Inf. Sci. Eng. 22(5): 1125-1143 (2006) |
2005 |
38 | EE | Fu-Yuan Lee,
Shiuh-Pyng Shieh:
Defending against spoofed DDoS attacks with path fingerprint.
Computers & Security 24(7): 571-586 (2005) |
37 | EE | Shu-Min Cheng,
Shiuh-Pyng Shieh,
Wen-Her Yang,
Fu-Yuan Lee,
Jia-Ning Luo:
Designing Authentication Protocols for Third Generation Mobile Communication Systems.
J. Inf. Sci. Eng. 21(2): 361-378 (2005) |
2004 |
36 | EE | Shiuh-Pyng Shieh,
Fu-Yuan Lee,
Ya-Wen Lin:
Accelerating network security services with fast packet classification.
Computer Communications 27(16): 1637-1646 (2004) |
35 | EE | Yu-Lun Huang,
Shiuh-Pyng Shieh,
Fu-Shen Ho,
Jian-Chyuan Wang:
Efficient key distribution schemes for secure media delivery in pay-TV systems.
IEEE Transactions on Multimedia 6(5): 760-769 (2004) |
34 | EE | Fu-Yuan Lee,
Shiuh-Pyng Shieh:
Scalable and lightweight key distribution for secure group communications.
Int. Journal of Network Management 14(3): 167-176 (2004) |
33 | EE | Shiuh-Pyng Shieh,
Wen-Her Yang:
Protecting network users in mobile code systems.
J. Parallel Distrib. Comput. 64(2): 191-200 (2004) |
2003 |
32 | EE | Shiuh-Pyng Shieh,
Yea-Ching Tsai,
Yu-Lun Huang:
Optimal information-dispersal for fault-tolerant communication over a burst-error channel.
IEEE Transactions on Reliability 52(3): 354-366 (2003) |
2002 |
31 | EE | Cheng-Fen Lu,
Shiuh-Pyng Winston Shieh:
Secure Key-Evolving Protocols for Discrete Logarithm Schemes.
CT-RSA 2002: 300-310 |
2001 |
30 | EE | Wen-Her Yang,
Kai-Wei Fan,
Shiuh-Pyng Shieh:
A secure multicast protocol for the internet's multicast backbone.
Int. Journal of Network Management 11(2): 129-136 (2001) |
29 | EE | Wen-Her Yang,
Shiuh-Pyng Shieh:
Secure key agreement for group communications.
Int. Journal of Network Management 11(6): 365-374 (2001) |
2000 |
28 | EE | Yu-Lun Huang,
Shiuh-Pyng Winston Shieh,
Jian-Chyuan Wang:
Practical Key Distribution Schemes for Channel Protection.
COMPSAC 2000: 569-574 |
27 | | Yu-Lun Huang,
Shiuh-Pyng Shieh,
Fu-Shen Ho:
A Generic Electronic Payment Model Supporting Multiple Merchant Transactions.
Computers & Security 19(5): 453-465 (2000) |
26 | EE | Shiuh-Pyng Shieh,
Fu-Shen Ho,
Yu-Lun Huang,
Jia-Ning Luo:
Network Address Translators: Effects on Security Protocols and Applications in the TCP/IP Stack.
IEEE Internet Computing 4(6): 42-49 (2000) |
25 | | Chern-Tang Lin,
Shiuh-Pyng Shieh:
Chain authentication in mobile communication systems.
Telecommunication Systems 13(2-4): 213-240 (2000) |
1999 |
24 | | Shiuh-Pyng Shieh,
Chern-Tang Lin,
Shianyow Wu:
Optimal Assignment of Mobile Agents for Software Authorization and Protection.
Computer Communications 22(1): 46-55 (1999) |
23 | | Hung-Min Sun,
Shiuh-Pyng Shieh,
Hsin-Min Sun:
A Note on Breaking and Repairing a Secure Broadcasting in Large Networks.
Computer Communications 22(2): 193-194 (1999) |
22 | EE | Wen-Her Yang,
Shiuh-Pyng Shieh:
Password authentication schemes with smart cards.
Computers & Security 18(8): 727-733 (1999) |
21 | | Shiuh-Pyng Shieh,
Chern-Tang Lin:
Auditing User Queries in Dynamic Statistical Databases.
Inf. Sci. 113(1-2): 131-146 (1999) |
20 | EE | Shiuh-Pyng Shieh:
Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems.
J. Inf. Sci. Eng. 15(1): 91-106 (1999) |
19 | EE | Shiuh-Pyng Shieh,
Fu-Shen Ho,
Yu-Lun Huang:
An Efficient Authentication Protocol for Mobile Networks.
J. Inf. Sci. Eng. 15(4): 505-520 (1999) |
18 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures.
J. Inf. Sci. Eng. 15(5): 679-689 (1999) |
17 | | Ing-Jye Shyu,
Shiuh-Pyng Shieh:
A Distributed Fault-Tolerant Design for Multiple-Server VOD Systems.
Multimedia Tools Appl. 8(2): 219-247 (1999) |
16 | | Ing-Jye Shyu,
Shiuh-Pyng Shieh:
Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers.
Multimedia Tools Appl. 9(3): 277-294 (1999) |
1998 |
15 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
On Private-Key Cryptosystems Based on Product Codes.
ACISP 1998: 68-79 |
14 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
Secure broadcasting in large networks.
Computer Communications 21(3): 279-283 (1998) |
13 | EE | Shiuh-Pyng Shieh,
Jun-Nan Chen:
Specification, validation, and verification of time-critical systems.
Computer Communications 21(5): 460-469 (1998) |
1997 |
12 | | Hung-Min Sun,
Shiuh-Pyng Shieh:
Secret Sharing in Graph-Based Prohibited Structures.
INFOCOM 1997: 718-724 |
11 | EE | Shiuh-Pyng Shieh,
Virgil D. Gligor:
On a Pattern-Oriented Model for Intrusion Detection.
IEEE Trans. Knowl. Data Eng. 9(4): 661-667 (1997) |
10 | EE | Shiuh-Pyng Shieh,
Fu-Shen Ho:
A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees".
IEEE Trans. Parallel Distrib. Syst. 8(10): 1084 (1997) |
1996 |
9 | EE | Hung-Min Sun,
Shiuh-Pyng Shieh:
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
ACM Conference on Computer and Communications Security 1996: 153-156 |
8 | | Shiuh-Pyng Shieh,
Virgil D. Gligor:
Detecting Illicit Leakage of Information in Operating Systems.
Journal of Computer Security 4(2/3): 123-148 (1996) |
7 | | Shiuh-Pyng Shieh,
Wen-Her Yang:
An Authentication and Key Distribution System for Open Network Systems.
Operating Systems Review 30(2): 32-41 (1996) |
1995 |
6 | | Ing-Jye Shyu,
Shiuh-Pyng Shieh:
Virtual Address Translation for Wide-Address Architectures.
Operating Systems Review 29(4): 37-46 (1995) |
1994 |
5 | | Hung-Min Sun,
Shiuh-Pyng Shieh:
Optimal Information Dispersal for Reliable Communication in Computer Networks.
ICPADS 1994: 460-465 |
4 | | Shiuh-Pyng Shieh,
Hung-Min Sun:
On Constructing Secret Sharing Schemes.
INFOCOM 1994: 1288-1292 |
3 | | Hung-Min Sun,
Shiuh-Pyng Shieh:
On Dynamic Threshold Schemes.
Inf. Process. Lett. 52(4): 201-206 (1994) |
1991 |
2 | | Shiuh-Pyng Shieh,
Virgil D. Gligor:
A Pattern-Oriented Intrusion-Detection Model and Its Applications.
IEEE Symposium on Security and Privacy 1991: 327-342 |
1990 |
1 | | Shiuh-Pyng Shieh,
Virgil D. Gligor:
Auditing the Use of Covert Storage Channels in Secure Systems.
IEEE Symposium on Security and Privacy 1990: 285-295 |