2009 |
25 | EE | Wen-Ya Chiang,
Shiuh-Jeng Wang,
Chi-Yao Weng,
Cheng-Hsing Yang:
Robustness-set in watermarking embedding systems using codebook classifications.
ICUIMC 2009: 207-215 |
24 | EE | Shiuh-Jeng Wang,
Jian-Yi Lin,
Hung-Jui Ke,
Shu-Wen Lin:
Visual-based embedding systems with targeted secret disclosures and applications.
IJAHUC 4(1): 44-53 (2009) |
2008 |
23 | EE | Hung-Min Sun,
Chi-Yao Weng,
Shiuh-Jeng Wang:
Histogram-based undetectable fidelity image in steganography as MSB controller.
ICUIMC 2008: 566-569 |
22 | EE | Da-Yu Kao,
Shiuh-Jeng Wang,
Frank Fu-Yuan Huang,
Sajal Bhatia,
Saurabh Gupta:
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks.
ISI Workshops 2008: 245-250 |
21 | EE | Chung-Wei Chen,
Shiuh-Jeng Wang,
Yuh-Ren Tsai:
Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems.
MUE 2008: 499-504 |
20 | EE | Hsing-Chung Chen,
Shiuh-Jeng Wang,
Jyh-Horng Wen,
Chung-Wei Chen:
Flexible Key Assignment for a Time-Token Constraint in a Hierarchy.
MUE 2008: 521-526 |
19 | EE | Cheng-Hsing Yang,
Chi-Yao Weng,
Shiuh-Jeng Wang,
Hung-Min Sun:
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems.
IEEE Transactions on Information Forensics and Security 3(3): 488-497 (2008) |
18 | EE | Shiuh-Jeng Wang,
Yuh-Ren Tsai,
Chung-Wei Chen:
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks.
JCM 3(1): 20-26 (2008) |
2007 |
17 | EE | Shiuh-Jeng Wang,
Hung Hsuan Chen,
Pin-You Chen,
Yuh-Ren Tsai:
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia.
FGCN (1) 2007: 328-331 |
16 | EE | Shiuh-Jeng Wang,
Yao-Han Chang,
Wen-Ya Chiang,
Wen-Shenq Juang:
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions.
FGCN (2) 2007: 125-129 |
15 | EE | Shiuh-Jeng Wang,
Jian-Yi Lin,
Hung-Jui Ke,
Yao-Han Chang:
Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems.
MUE 2007: 1136-1142 |
14 | EE | Yuh-Ren Tsai,
Shiuh-Jeng Wang:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks.
Computer Networks 51(3): 883-900 (2007) |
13 | EE | Hsing-Chung Chen,
Shiuh-Jeng Wang,
Jyh-Horng Wen:
Packet construction for secure conference call request in ad hoc network systems.
Inf. Sci. 177(24): 5598-5610 (2007) |
2006 |
12 | EE | Da-Yu Kao,
Shiuh-Jeng Wang,
Frank Fu-Yuan Huang:
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement.
ISI 2006: 644-646 |
2005 |
11 | EE | Shiuh-Jeng Wang,
Cheng-Hsing Yang:
Gathering Digital Evidence in Response to Information Security Incidents.
ISI 2005: 644-645 |
10 | EE | Shiuh-Jeng Wang,
Cheng-Hsing Yang:
Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanism.
Applied Mathematics and Computation 162(2): 559-576 (2005) |
9 | EE | Shiuh-Jeng Wang:
Steganography of capacity required using modulo operator for embedding secret image.
Applied Mathematics and Computation 164(1): 99-116 (2005) |
2004 |
8 | | Shiuh-Jeng Wang:
Multicasting Secret Images using a Knapsack-like Cipher System.
CAINE 2004: 67-72 |
7 | EE | Shiuh-Jeng Wang,
Chen-Ming Chuang:
Anonymous message communications with user hierarchy in a multicast system.
Applied Mathematics and Computation 159(1): 95-112 (2004) |
6 | EE | Shiuh-Jeng Wang:
Anonymous Wireless Authentication on a Portable Cellular Mobile System.
IEEE Trans. Computers 53(10): 1317-1329 (2004) |
2002 |
5 | EE | Shiuh-Jeng Wang,
Kai-Sheng Yang:
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data.
EC-Web 2002: 333-342 |
1999 |
4 | EE | Shiuh-Jeng Wang,
Jin-Fu Chang:
A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing.
DEXA 1999: 372-381 |
3 | EE | Shiuh-Jeng Wang,
Jinn-ke Jan:
A displacement addressing method for letter-oriented keys.
Journal of Systems and Software 46(1): 77-88 (1999) |
1996 |
2 | | Shiuh-Jeng Wang,
Le-Pond Chin,
Jin-Fu Chang,
Yuh-Ren Tsai:
ID-based authentication for mobile conference call.
SEC 1996: 49-58 |
1 | EE | Shiuh-Jeng Wang,
Jin-Fu Chang:
Smart card based secure password authentication scheme.
Computers & Security 15(3): 231-237 (1996) |