dblp.uni-trier.dewww.uni-trier.de

Dong-Her Shih

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEShe-I Chang, Chih-Fong Tsai, Dong-Her Shih, Chia-Ling Hwang: The development of audit detection risk assessment system: Using the fuzzy theory and audit risk model. Expert Syst. Appl. 35(3): 1053-1067 (2008)
12EEDong-Her Shih, Hsiu-Sen Chiang, Binshan Lin: Collaborative spam filtering with heterogeneous agents. Expert Syst. Appl. 35(4): 1555-1566 (2008)
11EEJui-Chi Shen, Dong-Her Shih, Han-Chuan Wei, Chiao-Chu Li: Differential quality-of-service provision in mobile networks. IJMC 6(1): 133-150 (2008)
10EEYi-Min Lin, Dong-Her Shih: Deconstructing mobile commerce service with continuance intention. IJMC 6(1): 67-87 (2008)
2007
9EEDong-Her Shih, Chih-Hung Cheng, Jui-Chi Shen: A Secure Protocol of Reverse Discriminatory Auction with Bid Privacy. ICMB 2007: 52
8EEDong-Her Shih, Binshan Lin, Shin-Yi Huang: MoRVAM: A reverse Vickrey auction system for mobile commerce. Expert Syst. Appl. 32(4): 1113-1123 (2007)
7EEDong-Her Shih, Hsiu-Sen Chiang, Binshan Lin: A Generalized Associative Petri Net for Reasoning. IEEE Trans. Knowl. Data Eng. 19(9): 1241-1251 (2007)
6EEJui-Chi Shen, Dong-Her Shih, Hsiu-Sen Chiang, Shih-Bin Lin: A mobile physiological monitoring system for patient transport. J. High Speed Networks 16(1): 51-68 (2007)
2006
5EEDong-Her Shih, Po-Ling Sun, David C. Yen, Shi-Ming Huang: Taxonomy and survey of RFID anti-collision protocols. Computer Communications 29(11): 2150-2166 (2006)
4EEDong-Her Shih, Shin-Yi Huang, Binshan Lin: Linking secure reverse auction with web service. IJSS 2(1): 15-31 (2006)
3EEDong-Her Shih, Hsin-Yi Huang, David C. Yen: A secure reverse Vickrey auction scheme with bid privacy. Inf. Sci. 176(5): 550-564 (2006)
2005
2EEDong-Her Shih, Chin-Yi Lin, Binshan Lin: RFID tags: privacy and security aspects. IJMC 3(3): 214-230 (2005)
1EEDong-Her Shih, Hsiu-Sen Chiang, David C. Yen: Classification methods in the detection of new malicious emails. Inf. Sci. 172(1-2): 241-261 (2005)

Coauthor Index

1She-I Chang [13]
2Chih-Hung Cheng [9]
3Hsiu-Sen Chiang [1] [6] [7] [12]
4Hsin-Yi Huang [3]
5Shi-Ming Huang [5]
6Shin-Yi Huang [4] [8]
7Chia-Ling Hwang [13]
8Chiao-Chu Li [11]
9Binshan Lin [2] [4] [7] [8] [12]
10Chin-Yi Lin [2]
11Shih-Bin Lin [6]
12Yi-Min Lin [10]
13Jui-Chi Shen [6] [9] [11]
14Po-Ling Sun [5]
15Chih-Fong Tsai [13]
16Han-Chuan Wei [11]
17David C. Yen [1] [3] [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)