Shiuh-Jeng Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

25EEWen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang: Robustness-set in watermarking embedding systems using codebook classifications. ICUIMC 2009: 207-215
24EEShiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Shu-Wen Lin: Visual-based embedding systems with targeted secret disclosures and applications. IJAHUC 4(1): 44-53 (2009)
23EEHung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang: Histogram-based undetectable fidelity image in steganography as MSB controller. ICUIMC 2008: 566-569
22EEDa-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia, Saurabh Gupta: Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. ISI Workshops 2008: 245-250
21EEChung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai: Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems. MUE 2008: 499-504
20EEHsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen: Flexible Key Assignment for a Time-Token Constraint in a Hierarchy. MUE 2008: 521-526
19EECheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun: Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Transactions on Information Forensics and Security 3(3): 488-497 (2008)
18EEShiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen: Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks. JCM 3(1): 20-26 (2008)
17EEShiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai: Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. FGCN (1) 2007: 328-331
16EEShiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang: Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. FGCN (2) 2007: 125-129
15EEShiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Yao-Han Chang: Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems. MUE 2007: 1136-1142
14EEYuh-Ren Tsai, Shiuh-Jeng Wang: Two-tier authentication for cluster and individual sets in mobile ad hoc networks. Computer Networks 51(3): 883-900 (2007)
13EEHsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen: Packet construction for secure conference call request in ad hoc network systems. Inf. Sci. 177(24): 5598-5610 (2007)
12EEDa-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang: Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. ISI 2006: 644-646
11EEShiuh-Jeng Wang, Cheng-Hsing Yang: Gathering Digital Evidence in Response to Information Security Incidents. ISI 2005: 644-645
10EEShiuh-Jeng Wang, Cheng-Hsing Yang: Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanism. Applied Mathematics and Computation 162(2): 559-576 (2005)
9EEShiuh-Jeng Wang: Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation 164(1): 99-116 (2005)
8 Shiuh-Jeng Wang: Multicasting Secret Images using a Knapsack-like Cipher System. CAINE 2004: 67-72
7EEShiuh-Jeng Wang, Chen-Ming Chuang: Anonymous message communications with user hierarchy in a multicast system. Applied Mathematics and Computation 159(1): 95-112 (2004)
6EEShiuh-Jeng Wang: Anonymous Wireless Authentication on a Portable Cellular Mobile System. IEEE Trans. Computers 53(10): 1317-1329 (2004)
5EEShiuh-Jeng Wang, Kai-Sheng Yang: Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data. EC-Web 2002: 333-342
4EEShiuh-Jeng Wang, Jin-Fu Chang: A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing. DEXA 1999: 372-381
3EEShiuh-Jeng Wang, Jinn-ke Jan: A displacement addressing method for letter-oriented keys. Journal of Systems and Software 46(1): 77-88 (1999)
2 Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Yuh-Ren Tsai: ID-based authentication for mobile conference call. SEC 1996: 49-58
1EEShiuh-Jeng Wang, Jin-Fu Chang: Smart card based secure password authentication scheme. Computers & Security 15(3): 231-237 (1996)

Coauthor Index

1Sajal Bhatia [22]
2Jin-Fu Chang [1] [2] [4]
3Yao-Han Chang [15] [16]
4Chung-Wei Chen [18] [20] [21]
5Hsing-Chung Chen [13] [20]
6Hung Hsuan Chen [17]
7Pin-You Chen [17]
8Wen-Ya Chiang [16] [25]
9Le-Pond Chin [2]
10Chen-Ming Chuang [7]
11Saurabh Gupta [22]
12Frank Fu-Yuan Huang [12] [22]
13Jinn-ke Jan [3]
14Wen-Shenq Juang [16]
15Da-Yu Kao [12] [22]
16Hung-Jui Ke [15] [24]
17Jian-Yi Lin [15] [24]
18Shu-Wen Lin [24]
19Hung-Min Sun [19] [23]
20Yuh-Ren Tsai [2] [14] [17] [18] [21]
21Jyh-Horng Wen [13] [20]
22Chi-Yao Weng [19] [23] [25]
23Cheng-Hsing Yang [10] [11] [19] [25]
24Kai-Sheng Yang [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)