![]() | ![]() |
2006 | ||
---|---|---|
5 | EE | Shyh-Yih Wang, Chi-Sung Laih: Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Dependable Sec. Comput. 3(1): 91-100 (2006) |
2005 | ||
4 | EE | Shyh-Yih Wang, Chi-Sung Laih: Cryptanalyses of two key assignment schemes based on polynomial interpolations. Computers & Security 24(2): 134-138 (2005) |
3 | EE | Shyh-Yih Wang, Chi-Sung Laih: Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. Journal of Systems and Software 75(1-2): 189-192 (2005) |
1992 | ||
2 | Chung-Ju Chang, Shyh-Yih Wang: Performance Analysis of a Statistical Multiplexer for Integrated Service in the Customer-Premise Equipment. Computer Networks and ISDN Systems 25(2): 191-201 (1992) | |
1991 | ||
1 | Chung-Ju Chang, Shyh-Yih Wang: Performance Analysis of an Integrated Multiplexer in the Customer Premise Node of Broadband Integrated Services Network. INFOCOM 1991: 76-82 |
1 | Chung-Ju Chang | [1] [2] |
2 | Chi-Sung Laih | [3] [4] [5] |