Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shiuh-Pyng Shieh
@article{DBLP:journals/tr/RupeLS24, author = {Jason Rupe and Phil Laplante and Shiuhpyng Winston Shieh}, title = {Guest Editorial Celebrating 75 Years of Excellence: The Enduring Legacy and Future Outlook of the {IEEE} Reliability Society}, journal = {{IEEE} Trans. Reliab.}, volume = {73}, number = {1}, pages = {3--6}, year = {2024}, url = {https://doi.org/10.1109/TR.2024.3366027}, doi = {10.1109/TR.2024.3366027}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/RupeLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/ShiehVLRHWCLW24, author = {Shiuhpyng Winston Shieh and Jeffrey M. Voas and Phil Laplante and Jason Rupe and Christian K. Hansen and Yu{-}Sung Wu and Yi{-}Ting Chen and Chi{-}Yu Li and Kai{-}Chiang Wu}, title = {Reliability Engineering in a Time of Rapidly Converging Technologies}, journal = {{IEEE} Trans. Reliab.}, volume = {73}, number = {1}, pages = {73--82}, year = {2024}, url = {https://doi.org/10.1109/TR.2024.3355905}, doi = {10.1109/TR.2024.3355905}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/ShiehVLRHWCLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/LeeTS24, author = {Shanhsin Lee and Mengru Tsai and Shiuhpyng Winston Shieh}, title = {The Game of Spear and Shield in Next Era of Cybersecurity}, journal = {{IEEE} Trans. Reliab.}, volume = {73}, number = {1}, pages = {85--92}, year = {2024}, url = {https://doi.org/10.1109/TR.2023.3342874}, doi = {10.1109/TR.2023.3342874}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/LeeTS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/TsaiLS24, author = {Mengru Tsai and Shanhsin Lee and Shiuhpyng Winston Shieh}, title = {Strategy for Implementing of Zero Trust Architecture}, journal = {{IEEE} Trans. Reliab.}, volume = {73}, number = {1}, pages = {93--100}, year = {2024}, url = {https://doi.org/10.1109/TR.2023.3345665}, doi = {10.1109/TR.2023.3345665}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/TsaiLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeCS23, author = {Shanhsin Lee and Yung{-}Shiu Chen and Shiuhpyng Winston Shieh}, title = {CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023.10354203}, doi = {10.1109/DSC61021.2023.10354203}, timestamp = {Tue, 23 Jan 2024 20:30:56 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ShiehLT22, author = {Shiuhpyng Shieh and Shanhsin Lee and Mengru Tsai}, title = {Strategy and Tactics Against Ransomware}, journal = {Computer}, volume = {55}, number = {5}, pages = {85--92}, year = {2022}, url = {https://doi.org/10.1109/MC.2022.3146733}, doi = {10.1109/MC.2022.3146733}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ShiehLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/HuangZCHJS22, author = {Hsiu{-}Chuan Huang and Zhi{-}Kai Zhang and Chung{-}Kuan Chen and Wei{-}da Hong and Jui{-}Chien Jao and Shiuhpyng Shieh}, title = {Adaptive Entry Point Discovery for Web Vulnerability Scanning}, journal = {J. Inf. Sci. Eng.}, volume = {38}, number = {1}, pages = {185--205}, year = {2022}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=184\_2495}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/HuangZCHJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LeeLHHCS21, author = {Shan{-}Hsin Lee and Shen{-}Chieh Lan and Hsiu{-}Chuan Huang and Chia{-}Wei Hsu and Yung{-}Shiu Chen and Shiuhpyng Shieh}, title = {EC-Model: An Evolvable Malware Classification Model}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021.9346248}, doi = {10.1109/DSC49826.2021.9346248}, timestamp = {Wed, 17 Feb 2021 11:46:28 +0100}, biburl = {https://dblp.org/rec/conf/desec/LeeLHHCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenQCYLPZS20, author = {Chi{-}Yuan Chen and Wei Quan and Nan Cheng and Shui Yu and Jong{-}Hyouk Lee and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Hongke Zhang and Shiuhpyng Shieh}, title = {{IEEE} Access Special Section Editorial: Artificial Intelligence in Cybersecurity}, journal = {{IEEE} Access}, volume = {8}, pages = {163329--163333}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3021604}, doi = {10.1109/ACCESS.2020.3021604}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChenQCYLPZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020asia, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269}, doi = {10.1145/3320269}, isbn = {978-1-4503-6750-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/LinLHWHS19, author = {Chun{-}Han Lin and Shan{-}Hsin Lee and Hsiu{-}Chuan Huang and Chi{-}Wei Wang and Chia{-}Wei Hsu and Shiuh{-}Pyng Shieh}, title = {DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937592}, doi = {10.1109/DSC47296.2019.8937592}, timestamp = {Mon, 16 Mar 2020 18:03:41 +0100}, biburl = {https://dblp.org/rec/conf/desec/LinLHWHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenZLS18, author = {Chung{-}Kuan Chen and Zhi{-}Kai Zhang and Shan{-}Hsin Lee and Shiuhpyng Shieh}, title = {Penetration Testing in the IoT Age}, journal = {Computer}, volume = {51}, number = {4}, pages = {82--85}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2141033}, doi = {10.1109/MC.2018.2141033}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChenZLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenCS18, author = {Chung{-}Kuan Chen and Shang{-}Kuei Chen and Shiuhpyng Winston Shieh}, title = {Mitigating Over-Permissible Transfer for Control Flow Integrity}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625104}, doi = {10.1109/DESEC.2018.8625104}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/desec/ChenCS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenHS18, author = {Chung{-}Kuan Chen and E.{-}Lin Ho and Shiuhpyng Winston Shieh}, title = {DeepMemIntrospect: Recognizing Data Structures in Memory with Neural Networks}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625160}, doi = {10.1109/DESEC.2018.8625160}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/HsuWS18, author = {Chia{-}Wei Hsu and Sheng{-}Ru Wei and Shiuhpyng Shieh}, title = {Finder: Automatic {ICC} Data Reconstruction for Long-Term Runtime Semantics}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/DESEC.2018.8625155}, doi = {10.1109/DESEC.2018.8625155}, timestamp = {Sat, 26 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/HsuWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuangZCS17, author = {Hsiu{-}Chuan Huang and Zhi{-}Kai Zhang and Hao{-}Wen Cheng and Shiuhpyng Winston Shieh}, title = {Web Application Security: Threats, Countermeasures, and Pitfalls}, journal = {Computer}, volume = {50}, number = {6}, pages = {81--85}, year = {2017}, url = {https://doi.org/10.1109/MC.2017.183}, doi = {10.1109/MC.2017.183}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuangZCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/HsuCWS17, author = {Chia{-}Wei Hsu and Chia{-}Huei Chang and Chi{-}Wei Wang and Shiuhpyng Shieh}, title = {{DROIT+:} Taint Tracking for Storage Access on Android}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {5}, pages = {1237--1254}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=158\_2069}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/HsuCWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/HsuLS17, author = {Chia{-}Wei Hsu and Shan{-}Hsin Lee and Shiuhpyng Winston Shieh}, title = {Adaptive Virtual Gestures for {GUI} Testing on Smartphones}, journal = {{IEEE} Softw.}, volume = {34}, number = {5}, pages = {22--29}, year = {2017}, url = {https://doi.org/10.1109/MS.2017.3641115}, doi = {10.1109/MS.2017.3641115}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/HsuLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ShenHS17, author = {Zong{-}Xian Shen and Chia{-}Wei Hsu and Shiuhpyng Winston Shieh}, title = {Security Semantics Modeling with Progressive Distillation}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {16}, number = {11}, pages = {3196--3208}, year = {2017}, url = {https://doi.org/10.1109/TMC.2017.2690425}, doi = {10.1109/TMC.2017.2690425}, timestamp = {Mon, 16 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/ShenHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WangS17, author = {Chia{-}Wei Wang and Shiuhpyng Shieh}, title = {VMCloak: Toward a stealthy in-VM agent execution}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {115--122}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073802}, doi = {10.1109/DESEC.2017.8073802}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/desec/WangS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/ChenLS17, author = {Chong Kuan Chen and Shen{-}Chieh Lan and Shiuhpyng Winston Shieh}, title = {Shellcode detector for malicious document hunting}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {527--528}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073875}, doi = {10.1109/DESEC.2017.8073875}, timestamp = {Sat, 06 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/ChenLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangWS16, author = {Chi{-}Wei Wang and Chia{-}Wei Wang and Shiuhpyng Shieh}, title = {ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic Probe Construction}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {568--581}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2416728}, doi = {10.1109/TDSC.2015.2416728}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ZhangCWS15, author = {Zhi{-}Kai Zhang and Michael Cheng Yi Cho and Zong{-}Yu Wu and Shiuhpyng Winston Shieh}, title = {Identifying and Authenticating IoT Objects in a Natural Context}, journal = {Computer}, volume = {48}, number = {8}, pages = {81--83}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.213}, doi = {10.1109/MC.2015.213}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ZhangCWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangCWS15, author = {Chia{-}Wei Wang and Michael Cheng Yi Cho and Chi{-}Wei Wang and Shiuhpyng Winston Shieh}, title = {Combating Software Piracy in Public Clouds}, journal = {Computer}, volume = {48}, number = {10}, pages = {88--91}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.317}, doi = {10.1109/MC.2015.317}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangCWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WangS15, author = {Chi{-}Wei Wang and Shiuhpyng Winston Shieh}, title = {{DROIT:} Dynamic Alternation of Dual-Level Tainting for Malware Analysis}, journal = {J. Inf. Sci. Eng.}, volume = {31}, number = {1}, pages = {111--129}, year = {2015}, url = {http://www.iis.sinica.edu.tw/page/jise/2014/2015/201501\_06.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WangS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WangCWS15, author = {Chi{-}Wei Wang and Chong Kuan Chen and Chia{-}Wei Wang and Shiuhpyng Winston Shieh}, title = {MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern}, journal = {J. Inf. Sci. Eng.}, volume = {31}, number = {2}, pages = {455--473}, year = {2015}, url = {http://www.iis.sinica.edu.tw/page/jise/2014/2015/201503\_06.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WangCWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WangS15b, author = {Chi{-}Wei Wang and Shiuhpyng Winston Shieh}, title = {{SWIFT:} Decoupled System-Wide Information Flow Tracking and its Optimizations}, journal = {J. Inf. Sci. Eng.}, volume = {31}, number = {4}, pages = {1413--1429}, year = {2015}, url = {http://www.iis.sinica.edu.tw/page/jise/2015/201507\_15.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WangS15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCS15, author = {Zhi{-}Kai Zhang and Michael Cheng Yi Cho and Shiuhpyng Shieh}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Emerging Security Threats and Countermeasures in IoT}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {1--6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2737091}, doi = {10.1145/2714576.2737091}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChoCS14, author = {Michael Cheng Yi Cho and Pokai Chen and Shiuhpyng Winston Shieh}, title = {Dmail: {A} Globally Authenticated Email Service}, journal = {Computer}, volume = {47}, number = {5}, pages = {88--91}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.119}, doi = {10.1109/MC.2014.119}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChoCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/WangWHS14, author = {Chi{-}Wei Wang and Chia{-}Wei Wang and Chu{-}An Hsieh and Shiuhpyng Winston Shieh}, title = {Cloudebug: {A} Programmable Online Malware Testbed}, journal = {Computer}, volume = {47}, number = {7}, pages = {90--92}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.179}, doi = {10.1109/MC.2014.179}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/WangWHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/ChoHSW14, author = {Michael Cheng Yi Cho and Chia{-}Wei Hsu and Shiuh{-}Pyng Shieh and Chi{-}Wei Wang}, title = {Can Malware Be Exterminated by Better Understanding Its Roots?}, journal = {{IT} Prof.}, volume = {16}, number = {6}, pages = {47--53}, year = {2014}, url = {https://doi.org/10.1109/MITP.2014.86}, doi = {10.1109/MITP.2014.86}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/ChoHSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LinSH14, author = {Jia{-}Chun Lin and Shiuhpyng Shieh and Chia{-}Wei Hsu}, title = {Proactive Distributed Digital Evidence Preservation with Tamper Resistance, Perfect Secrecy and High Survivability}, journal = {J. Inf. Sci. Eng.}, volume = {30}, number = {6}, pages = {1847--1864}, year = {2014}, url = {http://www.iis.sinica.edu.tw/page/jise/2014/201411\_10.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LinSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soca/ZhangCWHCS14, author = {Zhi{-}Kai Zhang and Michael Cheng Yi Cho and Chia{-}Wei Wang and Chia{-}Wei Hsu and Chong Kuan Chen and Shiuhpyng Shieh}, title = {IoT Security: Ongoing Challenges and Research Opportunities}, booktitle = {7th {IEEE} International Conference on Service-Oriented Computing and Applications, {SOCA} 2014, Matsue, Japan, November 17-19, 2014}, pages = {230--234}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SOCA.2014.58}, doi = {10.1109/SOCA.2014.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/soca/ZhangCWHCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiuCCS14, author = {Yen Ju Liu and Chong Kuan Chen and Michael Cheng Yi Cho and Shiuhpyng Shieh}, title = {Fast Discovery of VM-Sensitive Divergence Points with Basic Block Comparison}, booktitle = {Eighth International Conference on Software Security and Reliability, {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014}, pages = {196--205}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SERE.2014.33}, doi = {10.1109/SERE.2014.33}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LiuCCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/SungCWHS13, author = {Yin{-}Chang Sung and Michael Cheng Yi Cho and Chi{-}Wei Wang and Chia{-}Wei Hsu and Shiuhpyng Winston Shieh}, title = {Light-Weight {CSRF} Protection by Labeling User-Created Contents}, booktitle = {{IEEE} 7th International Conference on Software Security and Reliability, {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013}, pages = {60--69}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE.2013.22}, doi = {10.1109/SERE.2013.22}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/SungCWHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/HsuFCS13, author = {Chia{-}Wei Hsu and Fan{-}Syun Shih and Chi{-}Wei Wang and Shiuhpyng Winston Shieh}, title = {Divergence Detector: {A} Fine-Grained Approach to Detecting VM-Awareness Malware}, booktitle = {{IEEE} 7th International Conference on Software Security and Reliability, {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013}, pages = {80--89}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE.2013.23}, doi = {10.1109/SERE.2013.23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/HsuFCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/YehHJST12, author = {Lo{-}Yao Yeh and Yu{-}Lun Huang and Anthony D. Joseph and Shiuhpyng Winston Shieh and Woei{-}Jiunn Tsaur}, title = {A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {61}, number = {4}, pages = {1907--1924}, year = {2012}, url = {https://doi.org/10.1109/TVT.2012.2188821}, doi = {10.1109/TVT.2012.2188821}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/YehHJST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChengLS12, author = {Yun{-}Min Cheng and Bing{-}Han Li and Shiuhpyng Winston Shieh}, title = {Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {187--196}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.31}, doi = {10.1109/SERE.2012.31}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChengLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/HuangSS11, author = {Yu{-}Lun Huang and Chih{-}Ya Shen and Shiuh{-}Pyng Winston Shieh}, title = {{S-AKA:} {A} Provable and Secure Authentication Key Agreement Protocol for {UMTS} Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {60}, number = {9}, pages = {4509--4519}, year = {2011}, url = {https://doi.org/10.1109/TVT.2011.2168247}, doi = {10.1109/TVT.2011.2168247}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/HuangSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apnoms/FanSL11, author = {Chia{-}Ming Fan and Shiuhpyng Shieh and Bing{-}Han Li}, title = {On the security of password-based pairing protocol in Bluetooth}, booktitle = {13th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2011, Taipei, Taiwan, September 21-23, 2011}, pages = {1--4}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/APNOMS.2011.6076998}, doi = {10.1109/APNOMS.2011.6076998}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/FanSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LiS11, author = {Bing{-}Han Li and Shiuhpyng Shieh}, title = {{RELEASE:} Generating Exploits Using Loop-Aware Concolic Execution}, booktitle = {Fifth International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island, Korea}, pages = {165--173}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SSIRI.2011.31}, doi = {10.1109/SSIRI.2011.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/LiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/HuangS10, author = {Shih{-}I Huang and Shiuhpyng Shieh}, title = {Authentication and secret search mechanisms for RFID-aware wireless sensor networks}, journal = {Int. J. Secur. Networks}, volume = {5}, number = {1}, pages = {15--25}, year = {2010}, url = {https://doi.org/10.1504/IJSN.2010.030719}, doi = {10.1504/IJSN.2010.030719}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/HuangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdcta/YangS10, author = {Ming{-}Hour Yang and Shiuhpyng Shieh}, title = {Tracing Anonymous Mobile Attackers in Wireless Network}, journal = {J. Digit. Content Technol. its Appl.}, volume = {4}, number = {4}, pages = {161--173}, year = {2010}, url = {http://www.aicit.org/jdcta/ppl/16.\%20JDCTA1-342127.pdf}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdcta/YangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/SchneidewindMFGMHLSZLWSC10, author = {Norman F. Schneidewind and Mark Montrose and Alec Feinberg and Arbi Ghazarian and Jim McLinn and Christian K. Hansen and Phillip A. Laplante and Nihal Sinnadurai and Enrico Zio and Richard C. Linger and W. Eric Wong and Shiuh{-}Pyng Shieh and Joseph Childs}, title = {{IEEE} Reliability Society Technical Operations Annual Technical Report for 2010}, journal = {{IEEE} Trans. Reliab.}, volume = {59}, number = {3}, pages = {449--482}, year = {2010}, url = {https://doi.org/10.1109/TR.2010.2052190}, doi = {10.1109/TR.2010.2052190}, timestamp = {Mon, 25 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tr/SchneidewindMFGMHLSZLWSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/HuangST10, author = {Shih{-}I Huang and Shiuhpyng Shieh and J. D. Tygar}, title = {Secure encrypted-data aggregation for wireless sensor networks}, journal = {Wirel. Networks}, volume = {16}, number = {4}, pages = {915--927}, year = {2010}, url = {https://doi.org/10.1007/s11276-009-0177-y}, doi = {10.1007/S11276-009-0177-Y}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/HuangST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/HuangSSWL09, author = {Yu{-}Lun Huang and Chih{-}Ya Shen and Shiuhpyng Shieh and Hung{-}Jui Wang and Cheng{-}Chun Lin}, title = {Provable Secure {AKA} Scheme with Reliable Key Delegation in {UMTS}}, booktitle = {Third {IEEE} International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10, 2009}, pages = {243--252}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SSIRI.2009.62}, doi = {10.1109/SSIRI.2009.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/HuangSSWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciw/YangCS08, author = {Ming{-}Hour Yang and Chien{-}Si Chiu and Shiuhpyng Shieh}, editor = {Abdelhamid Mellouk and Jun Bi and Guadalupe Ortiz and Dickson K. W. Chiu and Manuela Popescu}, title = {Tracing Mobile Attackers in Wireless Ad-Hoc Network}, booktitle = {Third International Conference on Internet and Web Applications and Services, {ICIW} 2008, 8-13 June 2008, Athens, Greece}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICIW.2008.50}, doi = {10.1109/ICIW.2008.50}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iciw/YangCS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LinSL08, author = {Warren W. Lin and Shiuhpyng Shieh and Jia{-}Chun Lin}, title = {A Pollution Attack Resistant Multicast Authentication Scheme Tolerant to Packet Loss}, booktitle = {Second International Conference on Secure System Integration and Reliability Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan}, pages = {8--15}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SSIRI.2008.29}, doi = {10.1109/SSIRI.2008.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/LinSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LinSL08a, author = {Che{-}Cheng Lin and Shiuhpyng Shieh and Jia{-}Chun Lin}, title = {Lightweight, Distributed Key Agreement Protocol for Wireless Sensor Networks}, booktitle = {Second International Conference on Secure System Integration and Reliability Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan}, pages = {96--102}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SSIRI.2008.30}, doi = {10.1109/SSIRI.2008.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/LinSL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/HuangTLYTSSWLCLHHHWL08, author = {Yu{-}Lun Huang and J. Doug Tygar and Hsiao{-}Ying Lin and L. Y. Yeh and Hsin{-}Yi Tsai and Keith Sklower and Shiuh{-}Pyng Shieh and C. C. Wu and P. H. Lu and S. Y. Chien and Z. S. Lin and L. W. Hsu and Chia{-}Wei Hsu and C. T. Hsu and Y. C. Wu and M. S. Leong}, editor = {Terry Benzel}, title = {{SWOON:} {A} Testbed for Secure Wireless Overlay Networks}, booktitle = {Workshop on Cyber Security and Test, CSET'08, San Jose, CA, USA, July 28, 2008, Proceedings}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/cset08/tech/full\_papers/huang/huang.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/HuangTLYTSSWLCLHHHWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JiangSL07, author = {Cheng{-}Huang Jiang and Shiuhpyng Shieh and Jen{-}Chien Liu}, editor = {Feng Bao and Steven Miller}, title = {Keystroke statistical learning model for web authentication}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {359--361}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229327}, doi = {10.1145/1229285.1229327}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/JiangSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/HuangS07, author = {Shih{-}I Huang and Shiuhpyng Shieh}, title = {{SEA:} Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {848--852}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.207}, doi = {10.1109/CIS.2007.207}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/HuangS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LeeS06, author = {Fu{-}Yuan Lee and Shiuh{-}Pyng Shieh}, title = {Packet classification using diagonal-based tuple space search}, journal = {Comput. Networks}, volume = {50}, number = {9}, pages = {1406--1423}, year = {2006}, url = {https://doi.org/10.1016/j.comnet.2005.06.012}, doi = {10.1016/J.COMNET.2005.06.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LeeS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LuoSS06, author = {Jia{-}Ning Luo and Shiuh{-}Pyng Shieh and Ji{-}Chiang Shen}, title = {Secure Authentication Protocols Resistant to Guessing Attacks}, journal = {J. Inf. Sci. Eng.}, volume = {22}, number = {5}, pages = {1125--1143}, year = {2006}, url = {http://www.iis.sinica.edu.tw/page/jise/2006/200609\_09.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LuoSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LinSL06, author = {Ya{-}Jeng Lin and Shiuhpyng Shieh and Warren W. Lin}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Lightweight, pollution-attack resistant multicast authentication scheme}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {148--156}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128840}, doi = {10.1145/1128817.1128840}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LinSL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChangSLH06, author = {Shang{-}Ming Chang and Shiuhpyng Shieh and Warren W. Lin and Chih{-}Ming Hsieh}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {An efficient broadcast authentication scheme in wireless sensor networks}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {311--320}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128864}, doi = {10.1145/1128817.1128864}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChangSLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/LinSYL06, author = {Li{-}Joe Lin and Shiuhpyng Shieh and Tzu{-}I Yang and Warren W. Lin}, title = {A Path Authentication Scheme for Routing Disruption Attack Prevention in Ad Hoc Network}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man and Cybernetics, Taipei, Taiwan, October 8-11, 2006}, pages = {1262--1268}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICSMC.2006.384888}, doi = {10.1109/ICSMC.2006.384888}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/LinSYL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2006, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-272-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeS05, author = {Fu{-}Yuan Lee and Shiuh{-}Pyng Shieh}, title = {Defending against spoofed DDoS attacks with path fingerprint}, journal = {Comput. Secur.}, volume = {24}, number = {7}, pages = {571--586}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2005.03.005}, doi = {10.1016/J.COSE.2005.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ShiehW05, author = {Shiuhpyng Shieh and Dan S. Wallach}, title = {Guest Editors' Introduction: Ad Hoc and {P2P} Security}, journal = {{IEEE} Internet Comput.}, volume = {9}, number = {6}, pages = {14--15}, year = {2005}, url = {https://doi.org/10.1109/MIC.2005.128}, doi = {10.1109/MIC.2005.128}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ShiehW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ChengSYLL05, author = {Shu{-}Min Cheng and Shiuh{-}Pyng Shieh and Wen{-}Her Yang and Fu{-}Yuan Lee and Jia{-}Ning Luo}, title = {Designing Authentication Protocols for Third Generation Mobile Communication Systems}, journal = {J. Inf. Sci. Eng.}, volume = {21}, number = {2}, pages = {361--378}, year = {2005}, url = {http://www.iis.sinica.edu.tw/page/jise/2005/200503\_07.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ChengSYLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ShiehLL04, author = {Shiuh{-}Pyng Shieh and Fu{-}Yuan Lee and Ya{-}Wen Lin}, title = {Accelerating network security services with fast packet classification}, journal = {Comput. Commun.}, volume = {27}, number = {16}, pages = {1637--1646}, year = {2004}, url = {https://doi.org/10.1016/j.comcom.2004.05.003}, doi = {10.1016/J.COMCOM.2004.05.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ShiehLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/LeeS04, author = {Fu{-}Yuan Lee and Shiuh{-}Pyng Shieh}, title = {Scalable and lightweight key distribution for secure group communications}, journal = {Int. J. Netw. Manag.}, volume = {14}, number = {3}, pages = {167--176}, year = {2004}, url = {http://doi.acm.org/10.1145/992919.992922}, doi = {10.1145/992919.992922}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/LeeS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LuS04a, author = {Cheng{-}Fen Lu and Shiuhpyng Shieh}, title = {Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem}, journal = {J. Inf. Sci. Eng.}, volume = {20}, number = {2}, pages = {391--400}, year = {2004}, url = {http://www.iis.sinica.edu.tw/page/jise/2004/200403\_10.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LuS04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LuS04, author = {Cheng{-}Fen Lu and Shiuhpyng Shieh}, title = {Efficient Key-Evolving Protocol for the {GQ} Signature}, journal = {J. Inf. Sci. Eng.}, volume = {20}, number = {4}, pages = {763--769}, year = {2004}, url = {http://www.iis.sinica.edu.tw/page/jise/2004/200407\_10.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LuS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/ShiehY04, author = {Shiuh{-}Pyng Shieh and Wen{-}Her Yang}, title = {Protecting network users in mobile code systems}, journal = {J. Parallel Distributed Comput.}, volume = {64}, number = {2}, pages = {191--200}, year = {2004}, url = {https://doi.org/10.1016/j.jpdc.2003.09.008}, doi = {10.1016/J.JPDC.2003.09.008}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/ShiehY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/HuangSHW04, author = {Yu{-}Lun Huang and Shiuh{-}Pyng Shieh and Fu{-}Shen Ho and Jian{-}Chyuan Wang}, title = {Efficient key distribution schemes for secure media delivery in pay-TV systems}, journal = {{IEEE} Trans. Multim.}, volume = {6}, number = {5}, pages = {760--769}, year = {2004}, url = {https://doi.org/10.1109/TMM.2004.834861}, doi = {10.1109/TMM.2004.834861}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/HuangSHW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/ShiehTH03, author = {Shiuh{-}Pyng Shieh and Yea{-}Ching Tsai and Yu{-}Lun Huang}, title = {Optimal information-dispersal for fault-tolerant communication over a burst-error channel}, journal = {{IEEE} Trans. Reliab.}, volume = {52}, number = {3}, pages = {354--366}, year = {2003}, url = {https://doi.org/10.1109/TR.2003.820498}, doi = {10.1109/TR.2003.820498}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/ShiehTH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LuS02, author = {Cheng{-}Fen Lu and Shiuh{-}Pyng Winston Shieh}, editor = {Bart Preneel}, title = {Secure Key-Evolving Protocols for Discrete Logarithm Schemes}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {300--310}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_21}, doi = {10.1007/3-540-45760-7\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/LuS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/YangFS01, author = {Wen{-}Her Yang and Kai{-}Wei Fan and Shiuh{-}Pyng Shieh}, title = {A secure multicast protocol for the internet's multicast backbone}, journal = {Int. J. Netw. Manag.}, volume = {11}, number = {2}, pages = {129--136}, year = {2001}, url = {https://doi.org/10.1002/nem.392}, doi = {10.1002/NEM.392}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/YangFS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/YangS01, author = {Wen{-}Her Yang and Shiuh{-}Pyng Shieh}, title = {Secure key agreement for group communications}, journal = {Int. J. Netw. Manag.}, volume = {11}, number = {6}, pages = {365--374}, year = {2001}, url = {https://doi.org/10.1002/nem.412}, doi = {10.1002/NEM.412}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/YangS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/LuoS01, author = {Jia{-}Ning Luo and Shiuh{-}Pyng Shieh}, title = {The multi-layer {RSIP} framework}, booktitle = {Proceedings 9th {IEEE} International Conference on Networks, {ICON} 2001, Bangkok, Thailand, October 10-11, 2001}, pages = {166--171}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ICON.2001.962335}, doi = {10.1109/ICON.2001.962335}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/LuoS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangSH00, author = {Yu{-}Lun Huang and Shiuh{-}Pyng Shieh and Fu{-}Shen Ho}, title = {A Generic Electronic Payment Model Supporting Multiple Merchant Transactions}, journal = {Comput. Secur.}, volume = {19}, number = {5}, pages = {453--465}, year = {2000}, url = {https://doi.org/10.1016/S0167-4048(00)05031-8}, doi = {10.1016/S0167-4048(00)05031-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangSH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ShiehHHL00, author = {Shiuh{-}Pyng Shieh and Fu{-}Shen Ho and Yu{-}Lun Huang and Jia{-}Ning Luo}, title = {Network Address Translators: Effects on Security Protocols and Applications in the {TCP/IP} Stack}, journal = {{IEEE} Internet Comput.}, volume = {4}, number = {6}, pages = {42--49}, year = {2000}, url = {https://doi.org/10.1109/4236.895015}, doi = {10.1109/4236.895015}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ShiehHHL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/LinS00, author = {Chern{-}Tang Lin and Shiuh{-}Pyng Shieh}, title = {Chain authentication in mobile communication systems}, journal = {Telecommun. Syst.}, volume = {13}, number = {2-4}, pages = {213--240}, year = {2000}, url = {https://doi.org/10.1023/A:1019144106761}, doi = {10.1023/A:1019144106761}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/LinS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ShiehLYS00, author = {Shiuh{-}Pyng Shieh and Chern{-}Tang Lin and Wei{-}Bon Yang and Hung{-}Min Sun}, title = {Digital multisignature schemes for authenticating delegates in mobile code systems}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {49}, number = {4}, pages = {1464--1473}, year = {2000}, url = {https://doi.org/10.1109/25.875284}, doi = {10.1109/25.875284}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ShiehLYS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HuangSW00, author = {Yu{-}Lun Huang and Shiuh{-}Pyng Winston Shieh and Jian{-}Chyuan Wang}, title = {Practical Key Distribution Schemes for Channel Protection}, booktitle = {24th International Computer Software and Applications Conference {(COMPSAC} 2000), 25-28 October 2000, Taipei, Taiwan}, pages = {569--574}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CMPSAC.2000.884782}, doi = {10.1109/CMPSAC.2000.884782}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HuangSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ShiehLW99, author = {Shiuh{-}Pyng Shieh and Chern{-}Tang Lin and Shianyow Wu}, title = {Optimal Assignment of Mobile Agents for Software Authorization and Protection}, journal = {Comput. Commun.}, volume = {22}, number = {1}, pages = {46--55}, year = {1999}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ShiehLW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SunSS99, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Hsin{-}Min Sun}, title = {A Note on Breaking and Repairing a Secure Broadcasting in Large Networks}, journal = {Comput. Commun.}, volume = {22}, number = {2}, pages = {193--194}, year = {1999}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SunSS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangS99, author = {Wen{-}Her Yang and Shiuh{-}Pyng Shieh}, title = {Password authentication schemes with smart cards}, journal = {Comput. Secur.}, volume = {18}, number = {8}, pages = {727--733}, year = {1999}, url = {https://doi.org/10.1016/S0167-4048(99)80136-9}, doi = {10.1016/S0167-4048(99)80136-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShiehL99, author = {Shiuh{-}Pyng Shieh and Chern{-}Tang Lin}, title = {Auditing User Queries in Dynamic Statistical Databases}, journal = {Inf. Sci.}, volume = {113}, number = {1-2}, pages = {131--146}, year = {1999}, url = {https://doi.org/10.1016/S0020-0255(98)10044-0}, doi = {10.1016/S0020-0255(98)10044-0}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShiehL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/Shieh99, author = {Shiuh{-}Pyng Shieh}, title = {Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure Operating Systems}, journal = {J. Inf. Sci. Eng.}, volume = {15}, number = {1}, pages = {91--106}, year = {1999}, url = {http://www.iis.sinica.edu.tw/page/jise/1999/199901\_07.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/Shieh99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ShiehHH99, author = {Shiuh{-}Pyng Shieh and Fu{-}Shen Ho and Yu{-}Lun Huang}, title = {An Efficient Authentication Protocol for Mobile Networks}, journal = {J. Inf. Sci. Eng.}, volume = {15}, number = {4}, pages = {505--520}, year = {1999}, url = {http://www.iis.sinica.edu.tw/page/jise/1999/199907\_03.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ShiehHH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/SunS99, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, title = {Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures}, journal = {J. Inf. Sci. Eng.}, volume = {15}, number = {5}, pages = {679--689}, year = {1999}, url = {http://www.iis.sinica.edu.tw/page/jise/1999/199909\_04.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/SunS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShyuS99, author = {Ing{-}Jye Shyu and Shiuh{-}Pyng Shieh}, title = {A Distributed Fault-Tolerant Design for Multiple-Server {VOD} Systems}, journal = {Multim. Tools Appl.}, volume = {8}, number = {2}, pages = {219--247}, year = {1999}, url = {https://doi.org/10.1023/A:1009685918587}, doi = {10.1023/A:1009685918587}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShyuS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ShyuS99a, author = {Ing{-}Jye Shyu and Shiuh{-}Pyng Shieh}, title = {Playback Dispatch and Fault Recovery for a Clustered Video System with Multiple Servers}, journal = {Multim. Tools Appl.}, volume = {9}, number = {3}, pages = {277--294}, year = {1999}, url = {https://doi.org/10.1023/A:1009647211968}, doi = {10.1023/A:1009647211968}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ShyuS99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/SunS98, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, title = {Secure broadcasting in large networks}, journal = {Comput. Commun.}, volume = {21}, number = {3}, pages = {279--283}, year = {1998}, url = {https://doi.org/10.1016/S0140-3664(97)00187-4}, doi = {10.1016/S0140-3664(97)00187-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/SunS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ShiehC98, author = {Shiuh{-}Pyng Shieh and Jun{-}Nan Chen}, title = {Specification, validation, and verification of time-critical systems}, journal = {Comput. Commun.}, volume = {21}, number = {5}, pages = {460--469}, year = {1998}, url = {https://doi.org/10.1016/S0140-3664(97)00145-X}, doi = {10.1016/S0140-3664(97)00145-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ShiehC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/ShyuS98, author = {Ing{-}Jye Shyu and Shiuh{-}Pyng Shieh}, title = {Balancing workload and recovery load on distributed fault-tolerant {VOD} systems}, journal = {{IEEE} Commun. Lett.}, volume = {2}, number = {10}, pages = {288--290}, year = {1998}, url = {https://doi.org/10.1109/4234.725226}, doi = {10.1109/4234.725226}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/ShyuS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SunS98, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, editor = {Colin Boyd and Ed Dawson}, title = {On Private-Key Cryptosystems Based on Product Codes}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {68--79}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053722}, doi = {10.1007/BFB0053722}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SunS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/ShiehYS97, author = {Shiuh{-}Pyng Shieh and Wen{-}Her Yang and Hung{-}Min Sun}, title = {An authentication protocol without trusted third party}, journal = {{IEEE} Commun. Lett.}, volume = {1}, number = {3}, pages = {87--89}, year = {1997}, url = {https://doi.org/10.1109/4234.585805}, doi = {10.1109/4234.585805}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/ShiehYS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ShiehG97, author = {Shiuh{-}Pyng Shieh and Virgil D. Gligor}, title = {On a Pattern-Oriented Model for Intrusion Detection}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {9}, number = {4}, pages = {661--667}, year = {1997}, url = {https://doi.org/10.1109/69.617059}, doi = {10.1109/69.617059}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ShiehG97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/Ho97, author = {Shiuh{-}Pyng Shieh and Fu{-}Shen Ho}, title = {A Comment on "A Total Ordering Multicast Protocol Using Propagation Trees"}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {8}, number = {10}, pages = {1084}, year = {1997}, url = {https://doi.org/10.1109/71.629490}, doi = {10.1109/71.629490}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/Ho97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SunS97, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, title = {Secret Sharing in Graph-Based Prohibited Structures}, booktitle = {Proceedings {IEEE} {INFOCOM} '97, The Conference on Computer Communications, Sixteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Driving the Information Revolution, Kobe, Japan, April 7-12, 1997}, pages = {718--724}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/INFCOM.1997.644525}, doi = {10.1109/INFCOM.1997.644525}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SunS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ShiehG96, author = {Shiuh{-}Pyng Shieh and Virgil D. Gligor}, title = {Detecting Illicit Leakage of Information in Operating Systems}, journal = {J. Comput. Secur.}, volume = {4}, number = {2/3}, pages = {123--148}, year = {1996}, url = {https://doi.org/10.3233/JCS-1996-42-302}, doi = {10.3233/JCS-1996-42-302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ShiehG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/ShiehY96, author = {Shiuh{-}Pyng Shieh and Wen{-}Her Yang}, title = {An Authentication and Key Distribution System for Open Network Systems}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {30}, number = {2}, pages = {32--41}, year = {1996}, url = {https://doi.org/10.1145/232302.232305}, doi = {10.1145/232302.232305}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/ShiehY96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunS96, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, editor = {Li Gong and Jacques Stearn}, title = {Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {153--156}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238208}, doi = {10.1145/238168.238208}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/ShyuS95, author = {Ing{-}Jye Shyu and Shiuh{-}Pyng Shieh}, title = {Virtual Address Translation for Wide-Address Architectures}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {29}, number = {4}, pages = {37--46}, year = {1995}, url = {https://doi.org/10.1145/219282.219290}, doi = {10.1145/219282.219290}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/ShyuS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SunS94, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, title = {On Dynamic Threshold Schemes}, journal = {Inf. Process. Lett.}, volume = {52}, number = {4}, pages = {201--206}, year = {1994}, url = {https://doi.org/10.1016/0020-0190(94)90127-9}, doi = {10.1016/0020-0190(94)90127-9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SunS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/JiangSL94, author = {Ming{-}Ru Jiang and Shiuh{-}Pyng Shieh and Chang{-}Long Liu}, editor = {Lionel M. Ni}, title = {Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism}, booktitle = {Proceedings 1994 International Conference on Parallel and Distributed Systems, December 19-21, 1994, Hsinchu, Taiwan, Republic of China}, pages = {222--229}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/ICPADS.1994.590286}, doi = {10.1109/ICPADS.1994.590286}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpads/JiangSL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/SunS94, author = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh}, editor = {Lionel M. Ni}, title = {Optimal Information Dispersal for Reliable Communication in Computer Networks}, booktitle = {Proceedings 1994 International Conference on Parallel and Distributed Systems, December 19-21, 1994, Hsinchu, Taiwan, Republic of China}, pages = {460--465}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/ICPADS.1994.590356}, doi = {10.1109/ICPADS.1994.590356}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icpads/SunS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShiehS94, author = {Shiuh{-}Pyng Shieh and Hung{-}Min Sun}, title = {On Constructing Secret Sharing Schemes}, booktitle = {Proceedings {IEEE} {INFOCOM} '94, The Conference on Computer Communications, Thirteenth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Networking for Global Communications, Toronto, Ontario, Canada, June 12-16, 1994}, pages = {1288--1292}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/INFCOM.1994.337565}, doi = {10.1109/INFCOM.1994.337565}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/ShiehS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShiehG91, author = {Shiuh{-}Pyng Shieh and Virgil D. Gligor}, title = {A Pattern-Oriented Intrusion-Detection Model and Its Applications}, booktitle = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 20-22, 1991}, pages = {327--342}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/RISP.1991.130800}, doi = {10.1109/RISP.1991.130800}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShiehG91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShiehG90, author = {Shiuh{-}Pyng Shieh and Virgil D. Gligor}, title = {Auditing the Use of Covert Storage Channels in Secure Systems}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {285--295}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63858}, doi = {10.1109/RISP.1990.63858}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShiehG90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.