BibTeX records: Shiuh-Pyng Shieh

download as .bib file

@article{DBLP:journals/tr/RupeLS24,
  author       = {Jason Rupe and
                  Phil Laplante and
                  Shiuhpyng Winston Shieh},
  title        = {Guest Editorial Celebrating 75 Years of Excellence: The Enduring Legacy
                  and Future Outlook of the {IEEE} Reliability Society},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {73},
  number       = {1},
  pages        = {3--6},
  year         = {2024},
  url          = {https://doi.org/10.1109/TR.2024.3366027},
  doi          = {10.1109/TR.2024.3366027},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/RupeLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/ShiehVLRHWCLW24,
  author       = {Shiuhpyng Winston Shieh and
                  Jeffrey M. Voas and
                  Phil Laplante and
                  Jason Rupe and
                  Christian K. Hansen and
                  Yu{-}Sung Wu and
                  Yi{-}Ting Chen and
                  Chi{-}Yu Li and
                  Kai{-}Chiang Wu},
  title        = {Reliability Engineering in a Time of Rapidly Converging Technologies},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {73},
  number       = {1},
  pages        = {73--82},
  year         = {2024},
  url          = {https://doi.org/10.1109/TR.2024.3355905},
  doi          = {10.1109/TR.2024.3355905},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/ShiehVLRHWCLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/LeeTS24,
  author       = {Shanhsin Lee and
                  Mengru Tsai and
                  Shiuhpyng Winston Shieh},
  title        = {The Game of Spear and Shield in Next Era of Cybersecurity},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {73},
  number       = {1},
  pages        = {85--92},
  year         = {2024},
  url          = {https://doi.org/10.1109/TR.2023.3342874},
  doi          = {10.1109/TR.2023.3342874},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/LeeTS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/TsaiLS24,
  author       = {Mengru Tsai and
                  Shanhsin Lee and
                  Shiuhpyng Winston Shieh},
  title        = {Strategy for Implementing of Zero Trust Architecture},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {73},
  number       = {1},
  pages        = {93--100},
  year         = {2024},
  url          = {https://doi.org/10.1109/TR.2023.3345665},
  doi          = {10.1109/TR.2023.3345665},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/TsaiLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/LeeCS23,
  author       = {Shanhsin Lee and
                  Yung{-}Shiu Chen and
                  Shiuhpyng Winston Shieh},
  title        = {CoDex: Cross-Tactic Correlation System for Data Exfiltration Detection},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023,
                  Tampa, FL, USA, November 7-9, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC61021.2023.10354203},
  doi          = {10.1109/DSC61021.2023.10354203},
  timestamp    = {Tue, 23 Jan 2024 20:30:56 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/LeeCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ShiehLT22,
  author       = {Shiuhpyng Shieh and
                  Shanhsin Lee and
                  Mengru Tsai},
  title        = {Strategy and Tactics Against Ransomware},
  journal      = {Computer},
  volume       = {55},
  number       = {5},
  pages        = {85--92},
  year         = {2022},
  url          = {https://doi.org/10.1109/MC.2022.3146733},
  doi          = {10.1109/MC.2022.3146733},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ShiehLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HuangZCHJS22,
  author       = {Hsiu{-}Chuan Huang and
                  Zhi{-}Kai Zhang and
                  Chung{-}Kuan Chen and
                  Wei{-}da Hong and
                  Jui{-}Chien Jao and
                  Shiuhpyng Shieh},
  title        = {Adaptive Entry Point Discovery for Web Vulnerability Scanning},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {38},
  number       = {1},
  pages        = {185--205},
  year         = {2022},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=184\_2495},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/HuangZCHJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/LeeLHHCS21,
  author       = {Shan{-}Hsin Lee and
                  Shen{-}Chieh Lan and
                  Hsiu{-}Chuan Huang and
                  Chia{-}Wei Hsu and
                  Yung{-}Shiu Chen and
                  Shiuhpyng Shieh},
  title        = {EC-Model: An Evolvable Malware Classification Model},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021,
                  Aizuwakamatsu, Japan, January 30 - February 2, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC49826.2021.9346248},
  doi          = {10.1109/DSC49826.2021.9346248},
  timestamp    = {Wed, 17 Feb 2021 11:46:28 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/LeeLHHCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenQCYLPZS20,
  author       = {Chi{-}Yuan Chen and
                  Wei Quan and
                  Nan Cheng and
                  Shui Yu and
                  Jong{-}Hyouk Lee and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Hongke Zhang and
                  Shiuhpyng Shieh},
  title        = {{IEEE} Access Special Section Editorial: Artificial Intelligence in
                  Cybersecurity},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {163329--163333},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3021604},
  doi          = {10.1109/ACCESS.2020.3021604},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChenQCYLPZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020asia,
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269},
  doi          = {10.1145/3320269},
  isbn         = {978-1-4503-6750-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/LinLHWHS19,
  author       = {Chun{-}Han Lin and
                  Shan{-}Hsin Lee and
                  Hsiu{-}Chuan Huang and
                  Chi{-}Wei Wang and
                  Chia{-}Wei Hsu and
                  Shiuh{-}Pyng Shieh},
  title        = {DT-Track: Using DNS-Timing Side Channel for Mobile User Tracking},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937592},
  doi          = {10.1109/DSC47296.2019.8937592},
  timestamp    = {Mon, 16 Mar 2020 18:03:41 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/LinLHWHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChenZLS18,
  author       = {Chung{-}Kuan Chen and
                  Zhi{-}Kai Zhang and
                  Shan{-}Hsin Lee and
                  Shiuhpyng Shieh},
  title        = {Penetration Testing in the IoT Age},
  journal      = {Computer},
  volume       = {51},
  number       = {4},
  pages        = {82--85},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2141033},
  doi          = {10.1109/MC.2018.2141033},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChenZLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/ChenCS18,
  author       = {Chung{-}Kuan Chen and
                  Shang{-}Kuei Chen and
                  Shiuhpyng Winston Shieh},
  title        = {Mitigating Over-Permissible Transfer for Control Flow Integrity},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625104},
  doi          = {10.1109/DESEC.2018.8625104},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/ChenCS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/ChenHS18,
  author       = {Chung{-}Kuan Chen and
                  E.{-}Lin Ho and
                  Shiuhpyng Winston Shieh},
  title        = {DeepMemIntrospect: Recognizing Data Structures in Memory with Neural
                  Networks},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625160},
  doi          = {10.1109/DESEC.2018.8625160},
  timestamp    = {Sat, 26 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/ChenHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/HsuWS18,
  author       = {Chia{-}Wei Hsu and
                  Sheng{-}Ru Wei and
                  Shiuhpyng Shieh},
  title        = {Finder: Automatic {ICC} Data Reconstruction for Long-Term Runtime
                  Semantics},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/DESEC.2018.8625155},
  doi          = {10.1109/DESEC.2018.8625155},
  timestamp    = {Sat, 26 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/HsuWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/HuangZCS17,
  author       = {Hsiu{-}Chuan Huang and
                  Zhi{-}Kai Zhang and
                  Hao{-}Wen Cheng and
                  Shiuhpyng Winston Shieh},
  title        = {Web Application Security: Threats, Countermeasures, and Pitfalls},
  journal      = {Computer},
  volume       = {50},
  number       = {6},
  pages        = {81--85},
  year         = {2017},
  url          = {https://doi.org/10.1109/MC.2017.183},
  doi          = {10.1109/MC.2017.183},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/HuangZCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HsuCWS17,
  author       = {Chia{-}Wei Hsu and
                  Chia{-}Huei Chang and
                  Chi{-}Wei Wang and
                  Shiuhpyng Shieh},
  title        = {{DROIT+:} Taint Tracking for Storage Access on Android},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {5},
  pages        = {1237--1254},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=158\_2069},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/HsuCWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/HsuLS17,
  author       = {Chia{-}Wei Hsu and
                  Shan{-}Hsin Lee and
                  Shiuhpyng Winston Shieh},
  title        = {Adaptive Virtual Gestures for {GUI} Testing on Smartphones},
  journal      = {{IEEE} Softw.},
  volume       = {34},
  number       = {5},
  pages        = {22--29},
  year         = {2017},
  url          = {https://doi.org/10.1109/MS.2017.3641115},
  doi          = {10.1109/MS.2017.3641115},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/HsuLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ShenHS17,
  author       = {Zong{-}Xian Shen and
                  Chia{-}Wei Hsu and
                  Shiuhpyng Winston Shieh},
  title        = {Security Semantics Modeling with Progressive Distillation},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {16},
  number       = {11},
  pages        = {3196--3208},
  year         = {2017},
  url          = {https://doi.org/10.1109/TMC.2017.2690425},
  doi          = {10.1109/TMC.2017.2690425},
  timestamp    = {Mon, 16 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ShenHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/WangS17,
  author       = {Chia{-}Wei Wang and
                  Shiuhpyng Shieh},
  title        = {VMCloak: Toward a stealthy in-VM agent execution},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017,
                  Taipei, Taiwan, August 7-10, 2017},
  pages        = {115--122},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DESEC.2017.8073802},
  doi          = {10.1109/DESEC.2017.8073802},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/WangS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/ChenLS17,
  author       = {Chong Kuan Chen and
                  Shen{-}Chieh Lan and
                  Shiuhpyng Winston Shieh},
  title        = {Shellcode detector for malicious document hunting},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017,
                  Taipei, Taiwan, August 7-10, 2017},
  pages        = {527--528},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DESEC.2017.8073875},
  doi          = {10.1109/DESEC.2017.8073875},
  timestamp    = {Sat, 06 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/ChenLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangWS16,
  author       = {Chi{-}Wei Wang and
                  Chia{-}Wei Wang and
                  Shiuhpyng Shieh},
  title        = {ProbeBuilder: Uncovering Opaque Kernel Data Structures for Automatic
                  Probe Construction},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {5},
  pages        = {568--581},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2416728},
  doi          = {10.1109/TDSC.2015.2416728},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangWS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ZhangCWS15,
  author       = {Zhi{-}Kai Zhang and
                  Michael Cheng Yi Cho and
                  Zong{-}Yu Wu and
                  Shiuhpyng Winston Shieh},
  title        = {Identifying and Authenticating IoT Objects in a Natural Context},
  journal      = {Computer},
  volume       = {48},
  number       = {8},
  pages        = {81--83},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.213},
  doi          = {10.1109/MC.2015.213},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ZhangCWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangCWS15,
  author       = {Chia{-}Wei Wang and
                  Michael Cheng Yi Cho and
                  Chi{-}Wei Wang and
                  Shiuhpyng Winston Shieh},
  title        = {Combating Software Piracy in Public Clouds},
  journal      = {Computer},
  volume       = {48},
  number       = {10},
  pages        = {88--91},
  year         = {2015},
  url          = {https://doi.org/10.1109/MC.2015.317},
  doi          = {10.1109/MC.2015.317},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangCWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WangS15,
  author       = {Chi{-}Wei Wang and
                  Shiuhpyng Winston Shieh},
  title        = {{DROIT:} Dynamic Alternation of Dual-Level Tainting for Malware Analysis},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {31},
  number       = {1},
  pages        = {111--129},
  year         = {2015},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2014/2015/201501\_06.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WangS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WangCWS15,
  author       = {Chi{-}Wei Wang and
                  Chong Kuan Chen and
                  Chia{-}Wei Wang and
                  Shiuhpyng Winston Shieh},
  title        = {MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {31},
  number       = {2},
  pages        = {455--473},
  year         = {2015},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2014/2015/201503\_06.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WangCWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WangS15b,
  author       = {Chi{-}Wei Wang and
                  Shiuhpyng Winston Shieh},
  title        = {{SWIFT:} Decoupled System-Wide Information Flow Tracking and its Optimizations},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {31},
  number       = {4},
  pages        = {1413--1429},
  year         = {2015},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2015/201507\_15.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WangS15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCS15,
  author       = {Zhi{-}Kai Zhang and
                  Michael Cheng Yi Cho and
                  Shiuhpyng Shieh},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Emerging Security Threats and Countermeasures in IoT},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2737091},
  doi          = {10.1145/2714576.2737091},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChoCS14,
  author       = {Michael Cheng Yi Cho and
                  Pokai Chen and
                  Shiuhpyng Winston Shieh},
  title        = {Dmail: {A} Globally Authenticated Email Service},
  journal      = {Computer},
  volume       = {47},
  number       = {5},
  pages        = {88--91},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.119},
  doi          = {10.1109/MC.2014.119},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChoCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/WangWHS14,
  author       = {Chi{-}Wei Wang and
                  Chia{-}Wei Wang and
                  Chu{-}An Hsieh and
                  Shiuhpyng Winston Shieh},
  title        = {Cloudebug: {A} Programmable Online Malware Testbed},
  journal      = {Computer},
  volume       = {47},
  number       = {7},
  pages        = {90--92},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.179},
  doi          = {10.1109/MC.2014.179},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/WangWHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/ChoHSW14,
  author       = {Michael Cheng Yi Cho and
                  Chia{-}Wei Hsu and
                  Shiuh{-}Pyng Shieh and
                  Chi{-}Wei Wang},
  title        = {Can Malware Be Exterminated by Better Understanding Its Roots?},
  journal      = {{IT} Prof.},
  volume       = {16},
  number       = {6},
  pages        = {47--53},
  year         = {2014},
  url          = {https://doi.org/10.1109/MITP.2014.86},
  doi          = {10.1109/MITP.2014.86},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itpro/ChoHSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LinSH14,
  author       = {Jia{-}Chun Lin and
                  Shiuhpyng Shieh and
                  Chia{-}Wei Hsu},
  title        = {Proactive Distributed Digital Evidence Preservation with Tamper Resistance,
                  Perfect Secrecy and High Survivability},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {30},
  number       = {6},
  pages        = {1847--1864},
  year         = {2014},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2014/201411\_10.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LinSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soca/ZhangCWHCS14,
  author       = {Zhi{-}Kai Zhang and
                  Michael Cheng Yi Cho and
                  Chia{-}Wei Wang and
                  Chia{-}Wei Hsu and
                  Chong Kuan Chen and
                  Shiuhpyng Shieh},
  title        = {IoT Security: Ongoing Challenges and Research Opportunities},
  booktitle    = {7th {IEEE} International Conference on Service-Oriented Computing
                  and Applications, {SOCA} 2014, Matsue, Japan, November 17-19, 2014},
  pages        = {230--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SOCA.2014.58},
  doi          = {10.1109/SOCA.2014.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/soca/ZhangCWHCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiuCCS14,
  author       = {Yen Ju Liu and
                  Chong Kuan Chen and
                  Michael Cheng Yi Cho and
                  Shiuhpyng Shieh},
  title        = {Fast Discovery of VM-Sensitive Divergence Points with Basic Block
                  Comparison},
  booktitle    = {Eighth International Conference on Software Security and Reliability,
                  {SERE} 2014, San Francisco, California, USA, June 30 - July 2, 2014},
  pages        = {196--205},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/SERE.2014.33},
  doi          = {10.1109/SERE.2014.33},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiuCCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/SungCWHS13,
  author       = {Yin{-}Chang Sung and
                  Michael Cheng Yi Cho and
                  Chi{-}Wei Wang and
                  Chia{-}Wei Hsu and
                  Shiuhpyng Winston Shieh},
  title        = {Light-Weight {CSRF} Protection by Labeling User-Created Contents},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {60--69},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.22},
  doi          = {10.1109/SERE.2013.22},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/SungCWHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HsuFCS13,
  author       = {Chia{-}Wei Hsu and
                  Fan{-}Syun Shih and
                  Chi{-}Wei Wang and
                  Shiuhpyng Winston Shieh},
  title        = {Divergence Detector: {A} Fine-Grained Approach to Detecting VM-Awareness
                  Malware},
  booktitle    = {{IEEE} 7th International Conference on Software Security and Reliability,
                  {SERE} 2013, Gaithersburg, MD, USA, June 18-20, 2013},
  pages        = {80--89},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SERE.2013.23},
  doi          = {10.1109/SERE.2013.23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/HsuFCS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/YehHJST12,
  author       = {Lo{-}Yao Yeh and
                  Yu{-}Lun Huang and
                  Anthony D. Joseph and
                  Shiuhpyng Winston Shieh and
                  Woei{-}Jiunn Tsaur},
  title        = {A Batch-Authenticated and Key Agreement Framework for P2P-Based Online
                  Social Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {61},
  number       = {4},
  pages        = {1907--1924},
  year         = {2012},
  url          = {https://doi.org/10.1109/TVT.2012.2188821},
  doi          = {10.1109/TVT.2012.2188821},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/YehHJST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/ChengLS12,
  author       = {Yun{-}Min Cheng and
                  Bing{-}Han Li and
                  Shiuhpyng Winston Shieh},
  title        = {Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint},
  booktitle    = {Sixth International Conference on Software Security and Reliability,
                  {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012},
  pages        = {187--196},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SERE.2012.31},
  doi          = {10.1109/SERE.2012.31},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/ssiri/ChengLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/HuangSS11,
  author       = {Yu{-}Lun Huang and
                  Chih{-}Ya Shen and
                  Shiuh{-}Pyng Winston Shieh},
  title        = {{S-AKA:} {A} Provable and Secure Authentication Key Agreement Protocol
                  for {UMTS} Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {60},
  number       = {9},
  pages        = {4509--4519},
  year         = {2011},
  url          = {https://doi.org/10.1109/TVT.2011.2168247},
  doi          = {10.1109/TVT.2011.2168247},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/HuangSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/FanSL11,
  author       = {Chia{-}Ming Fan and
                  Shiuhpyng Shieh and
                  Bing{-}Han Li},
  title        = {On the security of password-based pairing protocol in Bluetooth},
  booktitle    = {13th Asia-Pacific Network Operations and Management Symposium, {APNOMS}
                  2011, Taipei, Taiwan, September 21-23, 2011},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/APNOMS.2011.6076998},
  doi          = {10.1109/APNOMS.2011.6076998},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/apnoms/FanSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LiS11,
  author       = {Bing{-}Han Li and
                  Shiuhpyng Shieh},
  title        = {{RELEASE:} Generating Exploits Using Loop-Aware Concolic Execution},
  booktitle    = {Fifth International Conference on Secure Software Integration and
                  Reliability Improvement, {SSIRI} 2011, 27-29 June, 2011, Jeju Island,
                  Korea},
  pages        = {165--173},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SSIRI.2011.31},
  doi          = {10.1109/SSIRI.2011.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/HuangS10,
  author       = {Shih{-}I Huang and
                  Shiuhpyng Shieh},
  title        = {Authentication and secret search mechanisms for RFID-aware wireless
                  sensor networks},
  journal      = {Int. J. Secur. Networks},
  volume       = {5},
  number       = {1},
  pages        = {15--25},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJSN.2010.030719},
  doi          = {10.1504/IJSN.2010.030719},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/HuangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdcta/YangS10,
  author       = {Ming{-}Hour Yang and
                  Shiuhpyng Shieh},
  title        = {Tracing Anonymous Mobile Attackers in Wireless Network},
  journal      = {J. Digit. Content Technol. its Appl.},
  volume       = {4},
  number       = {4},
  pages        = {161--173},
  year         = {2010},
  url          = {http://www.aicit.org/jdcta/ppl/16.\%20JDCTA1-342127.pdf},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdcta/YangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/SchneidewindMFGMHLSZLWSC10,
  author       = {Norman F. Schneidewind and
                  Mark Montrose and
                  Alec Feinberg and
                  Arbi Ghazarian and
                  Jim McLinn and
                  Christian K. Hansen and
                  Phillip A. Laplante and
                  Nihal Sinnadurai and
                  Enrico Zio and
                  Richard C. Linger and
                  W. Eric Wong and
                  Shiuh{-}Pyng Shieh and
                  Joseph Childs},
  title        = {{IEEE} Reliability Society Technical Operations Annual Technical Report
                  for 2010},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {59},
  number       = {3},
  pages        = {449--482},
  year         = {2010},
  url          = {https://doi.org/10.1109/TR.2010.2052190},
  doi          = {10.1109/TR.2010.2052190},
  timestamp    = {Mon, 25 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tr/SchneidewindMFGMHLSZLWSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/HuangST10,
  author       = {Shih{-}I Huang and
                  Shiuhpyng Shieh and
                  J. D. Tygar},
  title        = {Secure encrypted-data aggregation for wireless sensor networks},
  journal      = {Wirel. Networks},
  volume       = {16},
  number       = {4},
  pages        = {915--927},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11276-009-0177-y},
  doi          = {10.1007/S11276-009-0177-Y},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/HuangST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/HuangSSWL09,
  author       = {Yu{-}Lun Huang and
                  Chih{-}Ya Shen and
                  Shiuhpyng Shieh and
                  Hung{-}Jui Wang and
                  Cheng{-}Chun Lin},
  title        = {Provable Secure {AKA} Scheme with Reliable Key Delegation in {UMTS}},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {243--252},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.62},
  doi          = {10.1109/SSIRI.2009.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/HuangSSWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciw/YangCS08,
  author       = {Ming{-}Hour Yang and
                  Chien{-}Si Chiu and
                  Shiuhpyng Shieh},
  editor       = {Abdelhamid Mellouk and
                  Jun Bi and
                  Guadalupe Ortiz and
                  Dickson K. W. Chiu and
                  Manuela Popescu},
  title        = {Tracing Mobile Attackers in Wireless Ad-Hoc Network},
  booktitle    = {Third International Conference on Internet and Web Applications and
                  Services, {ICIW} 2008, 8-13 June 2008, Athens, Greece},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICIW.2008.50},
  doi          = {10.1109/ICIW.2008.50},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iciw/YangCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinSL08,
  author       = {Warren W. Lin and
                  Shiuhpyng Shieh and
                  Jia{-}Chun Lin},
  title        = {A Pollution Attack Resistant Multicast Authentication Scheme Tolerant
                  to Packet Loss},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {8--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.29},
  doi          = {10.1109/SSIRI.2008.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/LinSL08a,
  author       = {Che{-}Cheng Lin and
                  Shiuhpyng Shieh and
                  Jia{-}Chun Lin},
  title        = {Lightweight, Distributed Key Agreement Protocol for Wireless Sensor
                  Networks},
  booktitle    = {Second International Conference on Secure System Integration and Reliability
                  Improvement, {SSIRI} 2008, July 14-17, 2008, Yokohama, Japan},
  pages        = {96--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SSIRI.2008.30},
  doi          = {10.1109/SSIRI.2008.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/LinSL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/HuangTLYTSSWLCLHHHWL08,
  author       = {Yu{-}Lun Huang and
                  J. Doug Tygar and
                  Hsiao{-}Ying Lin and
                  L. Y. Yeh and
                  Hsin{-}Yi Tsai and
                  Keith Sklower and
                  Shiuh{-}Pyng Shieh and
                  C. C. Wu and
                  P. H. Lu and
                  S. Y. Chien and
                  Z. S. Lin and
                  L. W. Hsu and
                  Chia{-}Wei Hsu and
                  C. T. Hsu and
                  Y. C. Wu and
                  M. S. Leong},
  editor       = {Terry Benzel},
  title        = {{SWOON:} {A} Testbed for Secure Wireless Overlay Networks},
  booktitle    = {Workshop on Cyber Security and Test, CSET'08, San Jose, CA, USA, July
                  28, 2008, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/cset08/tech/full\_papers/huang/huang.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/HuangTLYTSSWLCLHHHWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JiangSL07,
  author       = {Cheng{-}Huang Jiang and
                  Shiuhpyng Shieh and
                  Jen{-}Chien Liu},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Keystroke statistical learning model for web authentication},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {359--361},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229327},
  doi          = {10.1145/1229285.1229327},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/JiangSL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/HuangS07,
  author       = {Shih{-}I Huang and
                  Shiuhpyng Shieh},
  title        = {{SEA:} Secure Encrypted-Data Aggregation in Mobile Wireless Sensor
                  Networks},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007},
  pages        = {848--852},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CIS.2007.207},
  doi          = {10.1109/CIS.2007.207},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/HuangS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LeeS06,
  author       = {Fu{-}Yuan Lee and
                  Shiuh{-}Pyng Shieh},
  title        = {Packet classification using diagonal-based tuple space search},
  journal      = {Comput. Networks},
  volume       = {50},
  number       = {9},
  pages        = {1406--1423},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comnet.2005.06.012},
  doi          = {10.1016/J.COMNET.2005.06.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LeeS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LuoSS06,
  author       = {Jia{-}Ning Luo and
                  Shiuh{-}Pyng Shieh and
                  Ji{-}Chiang Shen},
  title        = {Secure Authentication Protocols Resistant to Guessing Attacks},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {22},
  number       = {5},
  pages        = {1125--1143},
  year         = {2006},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2006/200609\_09.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LuoSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LinSL06,
  author       = {Ya{-}Jeng Lin and
                  Shiuhpyng Shieh and
                  Warren W. Lin},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Lightweight, pollution-attack resistant multicast authentication scheme},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {148--156},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128840},
  doi          = {10.1145/1128817.1128840},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LinSL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChangSLH06,
  author       = {Shang{-}Ming Chang and
                  Shiuhpyng Shieh and
                  Warren W. Lin and
                  Chih{-}Ming Hsieh},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {An efficient broadcast authentication scheme in wireless sensor networks},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {311--320},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128864},
  doi          = {10.1145/1128817.1128864},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChangSLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/LinSYL06,
  author       = {Li{-}Joe Lin and
                  Shiuhpyng Shieh and
                  Tzu{-}I Yang and
                  Warren W. Lin},
  title        = {A Path Authentication Scheme for Routing Disruption Attack Prevention
                  in Ad Hoc Network},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  and Cybernetics, Taipei, Taiwan, October 8-11, 2006},
  pages        = {1262--1268},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICSMC.2006.384888},
  doi          = {10.1109/ICSMC.2006.384888},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/LinSYL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006,
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-272-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeS05,
  author       = {Fu{-}Yuan Lee and
                  Shiuh{-}Pyng Shieh},
  title        = {Defending against spoofed DDoS attacks with path fingerprint},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {7},
  pages        = {571--586},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2005.03.005},
  doi          = {10.1016/J.COSE.2005.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ShiehW05,
  author       = {Shiuhpyng Shieh and
                  Dan S. Wallach},
  title        = {Guest Editors' Introduction: Ad Hoc and {P2P} Security},
  journal      = {{IEEE} Internet Comput.},
  volume       = {9},
  number       = {6},
  pages        = {14--15},
  year         = {2005},
  url          = {https://doi.org/10.1109/MIC.2005.128},
  doi          = {10.1109/MIC.2005.128},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ShiehW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ChengSYLL05,
  author       = {Shu{-}Min Cheng and
                  Shiuh{-}Pyng Shieh and
                  Wen{-}Her Yang and
                  Fu{-}Yuan Lee and
                  Jia{-}Ning Luo},
  title        = {Designing Authentication Protocols for Third Generation Mobile Communication
                  Systems},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {21},
  number       = {2},
  pages        = {361--378},
  year         = {2005},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2005/200503\_07.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ChengSYLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ShiehLL04,
  author       = {Shiuh{-}Pyng Shieh and
                  Fu{-}Yuan Lee and
                  Ya{-}Wen Lin},
  title        = {Accelerating network security services with fast packet classification},
  journal      = {Comput. Commun.},
  volume       = {27},
  number       = {16},
  pages        = {1637--1646},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comcom.2004.05.003},
  doi          = {10.1016/J.COMCOM.2004.05.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ShiehLL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LeeS04,
  author       = {Fu{-}Yuan Lee and
                  Shiuh{-}Pyng Shieh},
  title        = {Scalable and lightweight key distribution for secure group communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {14},
  number       = {3},
  pages        = {167--176},
  year         = {2004},
  url          = {http://doi.acm.org/10.1145/992919.992922},
  doi          = {10.1145/992919.992922},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/LeeS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LuS04a,
  author       = {Cheng{-}Fen Lu and
                  Shiuhpyng Shieh},
  title        = {Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete
                  Logarithm Problem},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {20},
  number       = {2},
  pages        = {391--400},
  year         = {2004},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2004/200403\_10.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LuS04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LuS04,
  author       = {Cheng{-}Fen Lu and
                  Shiuhpyng Shieh},
  title        = {Efficient Key-Evolving Protocol for the {GQ} Signature},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {20},
  number       = {4},
  pages        = {763--769},
  year         = {2004},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2004/200407\_10.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LuS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/ShiehY04,
  author       = {Shiuh{-}Pyng Shieh and
                  Wen{-}Her Yang},
  title        = {Protecting network users in mobile code systems},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {64},
  number       = {2},
  pages        = {191--200},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jpdc.2003.09.008},
  doi          = {10.1016/J.JPDC.2003.09.008},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/ShiehY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/HuangSHW04,
  author       = {Yu{-}Lun Huang and
                  Shiuh{-}Pyng Shieh and
                  Fu{-}Shen Ho and
                  Jian{-}Chyuan Wang},
  title        = {Efficient key distribution schemes for secure media delivery in pay-TV
                  systems},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {6},
  number       = {5},
  pages        = {760--769},
  year         = {2004},
  url          = {https://doi.org/10.1109/TMM.2004.834861},
  doi          = {10.1109/TMM.2004.834861},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/HuangSHW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/ShiehTH03,
  author       = {Shiuh{-}Pyng Shieh and
                  Yea{-}Ching Tsai and
                  Yu{-}Lun Huang},
  title        = {Optimal information-dispersal for fault-tolerant communication over
                  a burst-error channel},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {52},
  number       = {3},
  pages        = {354--366},
  year         = {2003},
  url          = {https://doi.org/10.1109/TR.2003.820498},
  doi          = {10.1109/TR.2003.820498},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/ShiehTH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LuS02,
  author       = {Cheng{-}Fen Lu and
                  Shiuh{-}Pyng Winston Shieh},
  editor       = {Bart Preneel},
  title        = {Secure Key-Evolving Protocols for Discrete Logarithm Schemes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {300--310},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_21},
  doi          = {10.1007/3-540-45760-7\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LuS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangFS01,
  author       = {Wen{-}Her Yang and
                  Kai{-}Wei Fan and
                  Shiuh{-}Pyng Shieh},
  title        = {A secure multicast protocol for the internet's multicast backbone},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {2},
  pages        = {129--136},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.392},
  doi          = {10.1002/NEM.392},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangFS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YangS01,
  author       = {Wen{-}Her Yang and
                  Shiuh{-}Pyng Shieh},
  title        = {Secure key agreement for group communications},
  journal      = {Int. J. Netw. Manag.},
  volume       = {11},
  number       = {6},
  pages        = {365--374},
  year         = {2001},
  url          = {https://doi.org/10.1002/nem.412},
  doi          = {10.1002/NEM.412},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YangS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/LuoS01,
  author       = {Jia{-}Ning Luo and
                  Shiuh{-}Pyng Shieh},
  title        = {The multi-layer {RSIP} framework},
  booktitle    = {Proceedings 9th {IEEE} International Conference on Networks, {ICON}
                  2001, Bangkok, Thailand, October 10-11, 2001},
  pages        = {166--171},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICON.2001.962335},
  doi          = {10.1109/ICON.2001.962335},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/LuoS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangSH00,
  author       = {Yu{-}Lun Huang and
                  Shiuh{-}Pyng Shieh and
                  Fu{-}Shen Ho},
  title        = {A Generic Electronic Payment Model Supporting Multiple Merchant Transactions},
  journal      = {Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {453--465},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0167-4048(00)05031-8},
  doi          = {10.1016/S0167-4048(00)05031-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangSH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ShiehHHL00,
  author       = {Shiuh{-}Pyng Shieh and
                  Fu{-}Shen Ho and
                  Yu{-}Lun Huang and
                  Jia{-}Ning Luo},
  title        = {Network Address Translators: Effects on Security Protocols and Applications
                  in the {TCP/IP} Stack},
  journal      = {{IEEE} Internet Comput.},
  volume       = {4},
  number       = {6},
  pages        = {42--49},
  year         = {2000},
  url          = {https://doi.org/10.1109/4236.895015},
  doi          = {10.1109/4236.895015},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ShiehHHL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/LinS00,
  author       = {Chern{-}Tang Lin and
                  Shiuh{-}Pyng Shieh},
  title        = {Chain authentication in mobile communication systems},
  journal      = {Telecommun. Syst.},
  volume       = {13},
  number       = {2-4},
  pages        = {213--240},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1019144106761},
  doi          = {10.1023/A:1019144106761},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/LinS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ShiehLYS00,
  author       = {Shiuh{-}Pyng Shieh and
                  Chern{-}Tang Lin and
                  Wei{-}Bon Yang and
                  Hung{-}Min Sun},
  title        = {Digital multisignature schemes for authenticating delegates in mobile
                  code systems},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {49},
  number       = {4},
  pages        = {1464--1473},
  year         = {2000},
  url          = {https://doi.org/10.1109/25.875284},
  doi          = {10.1109/25.875284},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ShiehLYS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/HuangSW00,
  author       = {Yu{-}Lun Huang and
                  Shiuh{-}Pyng Winston Shieh and
                  Jian{-}Chyuan Wang},
  title        = {Practical Key Distribution Schemes for Channel Protection},
  booktitle    = {24th International Computer Software and Applications Conference {(COMPSAC}
                  2000), 25-28 October 2000, Taipei, Taiwan},
  pages        = {569--574},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CMPSAC.2000.884782},
  doi          = {10.1109/CMPSAC.2000.884782},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/HuangSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ShiehLW99,
  author       = {Shiuh{-}Pyng Shieh and
                  Chern{-}Tang Lin and
                  Shianyow Wu},
  title        = {Optimal Assignment of Mobile Agents for Software Authorization and
                  Protection},
  journal      = {Comput. Commun.},
  volume       = {22},
  number       = {1},
  pages        = {46--55},
  year         = {1999},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ShiehLW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SunSS99,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Hsin{-}Min Sun},
  title        = {A Note on Breaking and Repairing a Secure Broadcasting in Large Networks},
  journal      = {Comput. Commun.},
  volume       = {22},
  number       = {2},
  pages        = {193--194},
  year         = {1999},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SunSS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangS99,
  author       = {Wen{-}Her Yang and
                  Shiuh{-}Pyng Shieh},
  title        = {Password authentication schemes with smart cards},
  journal      = {Comput. Secur.},
  volume       = {18},
  number       = {8},
  pages        = {727--733},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0167-4048(99)80136-9},
  doi          = {10.1016/S0167-4048(99)80136-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShiehL99,
  author       = {Shiuh{-}Pyng Shieh and
                  Chern{-}Tang Lin},
  title        = {Auditing User Queries in Dynamic Statistical Databases},
  journal      = {Inf. Sci.},
  volume       = {113},
  number       = {1-2},
  pages        = {131--146},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0020-0255(98)10044-0},
  doi          = {10.1016/S0020-0255(98)10044-0},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShiehL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/Shieh99,
  author       = {Shiuh{-}Pyng Shieh},
  title        = {Estimating and Measuring Covert Channel Bandwidth in Multilevel Secure
                  Operating Systems},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {15},
  number       = {1},
  pages        = {91--106},
  year         = {1999},
  url          = {http://www.iis.sinica.edu.tw/page/jise/1999/199901\_07.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/Shieh99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ShiehHH99,
  author       = {Shiuh{-}Pyng Shieh and
                  Fu{-}Shen Ho and
                  Yu{-}Lun Huang},
  title        = {An Efficient Authentication Protocol for Mobile Networks},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {15},
  number       = {4},
  pages        = {505--520},
  year         = {1999},
  url          = {http://www.iis.sinica.edu.tw/page/jise/1999/199907\_03.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ShiehHH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/SunS99,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  title        = {Constructing Perfect Secret Sharing Schemes for General and Uniform
                  Access Structures},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {15},
  number       = {5},
  pages        = {679--689},
  year         = {1999},
  url          = {http://www.iis.sinica.edu.tw/page/jise/1999/199909\_04.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/SunS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShyuS99,
  author       = {Ing{-}Jye Shyu and
                  Shiuh{-}Pyng Shieh},
  title        = {A Distributed Fault-Tolerant Design for Multiple-Server {VOD} Systems},
  journal      = {Multim. Tools Appl.},
  volume       = {8},
  number       = {2},
  pages        = {219--247},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1009685918587},
  doi          = {10.1023/A:1009685918587},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShyuS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ShyuS99a,
  author       = {Ing{-}Jye Shyu and
                  Shiuh{-}Pyng Shieh},
  title        = {Playback Dispatch and Fault Recovery for a Clustered Video System
                  with Multiple Servers},
  journal      = {Multim. Tools Appl.},
  volume       = {9},
  number       = {3},
  pages        = {277--294},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1009647211968},
  doi          = {10.1023/A:1009647211968},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ShyuS99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SunS98,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  title        = {Secure broadcasting in large networks},
  journal      = {Comput. Commun.},
  volume       = {21},
  number       = {3},
  pages        = {279--283},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0140-3664(97)00187-4},
  doi          = {10.1016/S0140-3664(97)00187-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/SunS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ShiehC98,
  author       = {Shiuh{-}Pyng Shieh and
                  Jun{-}Nan Chen},
  title        = {Specification, validation, and verification of time-critical systems},
  journal      = {Comput. Commun.},
  volume       = {21},
  number       = {5},
  pages        = {460--469},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0140-3664(97)00145-X},
  doi          = {10.1016/S0140-3664(97)00145-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ShiehC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/ShyuS98,
  author       = {Ing{-}Jye Shyu and
                  Shiuh{-}Pyng Shieh},
  title        = {Balancing workload and recovery load on distributed fault-tolerant
                  {VOD} systems},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {2},
  number       = {10},
  pages        = {288--290},
  year         = {1998},
  url          = {https://doi.org/10.1109/4234.725226},
  doi          = {10.1109/4234.725226},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/ShyuS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunS98,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {On Private-Key Cryptosystems Based on Product Codes},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053722},
  doi          = {10.1007/BFB0053722},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/ShiehYS97,
  author       = {Shiuh{-}Pyng Shieh and
                  Wen{-}Her Yang and
                  Hung{-}Min Sun},
  title        = {An authentication protocol without trusted third party},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {1},
  number       = {3},
  pages        = {87--89},
  year         = {1997},
  url          = {https://doi.org/10.1109/4234.585805},
  doi          = {10.1109/4234.585805},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/ShiehYS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ShiehG97,
  author       = {Shiuh{-}Pyng Shieh and
                  Virgil D. Gligor},
  title        = {On a Pattern-Oriented Model for Intrusion Detection},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {9},
  number       = {4},
  pages        = {661--667},
  year         = {1997},
  url          = {https://doi.org/10.1109/69.617059},
  doi          = {10.1109/69.617059},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ShiehG97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/Ho97,
  author       = {Shiuh{-}Pyng Shieh and
                  Fu{-}Shen Ho},
  title        = {A Comment on "A Total Ordering Multicast Protocol Using Propagation
                  Trees"},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {8},
  number       = {10},
  pages        = {1084},
  year         = {1997},
  url          = {https://doi.org/10.1109/71.629490},
  doi          = {10.1109/71.629490},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/Ho97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SunS97,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  title        = {Secret Sharing in Graph-Based Prohibited Structures},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '97, The Conference on Computer Communications,
                  Sixteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Driving the Information Revolution, Kobe, Japan, April
                  7-12, 1997},
  pages        = {718--724},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/INFCOM.1997.644525},
  doi          = {10.1109/INFCOM.1997.644525},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SunS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ShiehG96,
  author       = {Shiuh{-}Pyng Shieh and
                  Virgil D. Gligor},
  title        = {Detecting Illicit Leakage of Information in Operating Systems},
  journal      = {J. Comput. Secur.},
  volume       = {4},
  number       = {2/3},
  pages        = {123--148},
  year         = {1996},
  url          = {https://doi.org/10.3233/JCS-1996-42-302},
  doi          = {10.3233/JCS-1996-42-302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ShiehG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ShiehY96,
  author       = {Shiuh{-}Pyng Shieh and
                  Wen{-}Her Yang},
  title        = {An Authentication and Key Distribution System for Open Network Systems},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {30},
  number       = {2},
  pages        = {32--41},
  year         = {1996},
  url          = {https://doi.org/10.1145/232302.232305},
  doi          = {10.1145/232302.232305},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/ShiehY96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SunS96,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting
                  Codes},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {153--156},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238208},
  doi          = {10.1145/238168.238208},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SunS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/ShyuS95,
  author       = {Ing{-}Jye Shyu and
                  Shiuh{-}Pyng Shieh},
  title        = {Virtual Address Translation for Wide-Address Architectures},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {29},
  number       = {4},
  pages        = {37--46},
  year         = {1995},
  url          = {https://doi.org/10.1145/219282.219290},
  doi          = {10.1145/219282.219290},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/ShyuS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/SunS94,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  title        = {On Dynamic Threshold Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {52},
  number       = {4},
  pages        = {201--206},
  year         = {1994},
  url          = {https://doi.org/10.1016/0020-0190(94)90127-9},
  doi          = {10.1016/0020-0190(94)90127-9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/SunS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/JiangSL94,
  author       = {Ming{-}Ru Jiang and
                  Shiuh{-}Pyng Shieh and
                  Chang{-}Long Liu},
  editor       = {Lionel M. Ni},
  title        = {Dynamic Load Balancing in Parallel Simulation Using Time Warp Mechanism},
  booktitle    = {Proceedings 1994 International Conference on Parallel and Distributed
                  Systems, December 19-21, 1994, Hsinchu, Taiwan, Republic of China},
  pages        = {222--229},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/ICPADS.1994.590286},
  doi          = {10.1109/ICPADS.1994.590286},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/JiangSL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/SunS94,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  editor       = {Lionel M. Ni},
  title        = {Optimal Information Dispersal for Reliable Communication in Computer
                  Networks},
  booktitle    = {Proceedings 1994 International Conference on Parallel and Distributed
                  Systems, December 19-21, 1994, Hsinchu, Taiwan, Republic of China},
  pages        = {460--465},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/ICPADS.1994.590356},
  doi          = {10.1109/ICPADS.1994.590356},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/SunS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShiehS94,
  author       = {Shiuh{-}Pyng Shieh and
                  Hung{-}Min Sun},
  title        = {On Constructing Secret Sharing Schemes},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '94, The Conference on Computer Communications,
                  Thirteenth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Networking for Global Communications, Toronto, Ontario,
                  Canada, June 12-16, 1994},
  pages        = {1288--1292},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/INFCOM.1994.337565},
  doi          = {10.1109/INFCOM.1994.337565},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ShiehS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShiehG91,
  author       = {Shiuh{-}Pyng Shieh and
                  Virgil D. Gligor},
  title        = {A Pattern-Oriented Intrusion-Detection Model and Its Applications},
  booktitle    = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 20-22, 1991},
  pages        = {327--342},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/RISP.1991.130800},
  doi          = {10.1109/RISP.1991.130800},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ShiehG91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShiehG90,
  author       = {Shiuh{-}Pyng Shieh and
                  Virgil D. Gligor},
  title        = {Auditing the Use of Covert Storage Channels in Secure Systems},
  booktitle    = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 7-9, 1990},
  pages        = {285--295},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/RISP.1990.63858},
  doi          = {10.1109/RISP.1990.63858},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ShiehG90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics