


Остановите войну!
for scientists:


default search action
Shiuh-Jeng Wang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j66]Hung-Jui Ko, Cheng-Ta Huang
, Hsueh-Wen Tseng
, Shiuh-Jeng Wang
:
Efficient Cost-Reduced With High-Quality Image of Imperceptible Steganography Using Modulo and Magic Cube. IEEE Access 10: 67686-67693 (2022) - [j65]Chang-Po Chiang
, Shiuh-Jeng Wang, Yu-Shu Chen:
Manipulating cyber army in pilot case forensics on social media. J. Supercomput. 78(6): 7749-7767 (2022) - 2021
- [j64]Hung-Jui Ko, Cheng-Ta Huang, Zhi-Wei Zhuang, Gwoboa Horng, Shiuh-Jeng Wang:
Cloud evidence tracks of storage service linking with iOS systems. J. Supercomput. 77(1): 77-94 (2021) - 2020
- [j63]Hung-Jui Ko, Cheng-Ta Huang, Gwoboa Horng, Shiuh-Jeng Wang:
Robust and blind image watermarking in DCT domain using inter-block coefficient correlation. Inf. Sci. 517: 128-147 (2020) - [c48]Chang-Po Chiang
, Hung-Yuan Chen, Tyan-Muh Tsai, Shih-Hao Chang, Ying-Chin Chen, Shiuh-Jeng Wang:
Profiling Operations of Cyber Army in Manipulating Public Opinions. ICFET 2020: 222-225
2010 – 2019
- 2019
- [j62]Cheng-Ta Huang, Li-Chiun Lin, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Dynamic embedding strategy of VQ-based information hiding approach. J. Vis. Commun. Image Represent. 59: 14-32 (2019) - [j61]Cheng-Ta Huang, Li-Chiun Lin, De-En Sun, Shiuh-Jeng Wang:
A security-based steganographic scheme in vector quantization coding between correlated neighboring blocks. Multim. Tools Appl. 78(3): 3131-3151 (2019) - [c47]Cheng-Ta Huang, Cheng-Yu Yang, Chi-Yao Weng, Yen-Wen Chen, Shiuh-Jeng Wang:
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage. ICCCS 2019: 327-331 - [c46]Szu-Chin Hsu, Cheng-Ta Huang, Chi-Yao Weng, Shiuh-Jeng Wang:
A Logging-in Scheme in Virtual Keyboard Protection from Shoulder Surfing and Screenshot Capturing. ICCCS 2019: 440-444 - 2018
- [j60]Cheng-Yu Yang, Cheng-Ta Huang, Ya-Ping Wang, Yen-Wen Chen, Shiuh-Jeng Wang:
File changes with security proof stored in cloud service systems. Pers. Ubiquitous Comput. 22(1): 45-53 (2018) - [j59]Cheng-Ta Huang, Cheng-Hsing Yang, Wei-Jen Wang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Raw reversibility of information hiding on the basis of VQ systems. J. Supercomput. 74(8): 3748-3777 (2018) - [j58]Cheng-Ta Huang, Min-Yi Tsai, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J. Supercomput. 74(9): 4295-4314 (2018) - [c45]Cheng-Ta Huang, Hung-Jui Ko, Zhi-Wei Zhuang, Ping-Cheng Shih, Shiuh-Jeng Wang:
Mobile Forensics for Cloud Storage Service on iOS Systems. ISITA 2018: 178-182 - [c44]Ming-Jung Chiu Huang, Yu-Lun Wan, Chang-Po Chiang
, Shiuh-Jeng Wang:
Tor Browser Forensics in Exploring Invisible Evidence. SMC 2018: 3909-3914 - 2017
- [j57]Cheng-Ta Huang, Yu Hong Zhang, Li-Chiun Lin, Wei-Jen Wang, Shiuh-Jeng Wang:
Mutual authentications to parties with QR-code applications in mobile systems. Int. J. Inf. Sec. 16(5): 525-540 (2017) - [c43]Cheng-Ta Huang, De-En Sun, Yen-Lin Chen, Shiuh-Jeng Wang:
VQ Coding in Data Hiding Using Correlated Neighboring Blocks in Security Performance. PAISI 2017: 111-128 - 2016
- [j56]Nele Mentens
, Damien Sauveron, José M. Sierra, Shiuh-Jeng Wang, Isaac Woungang:
Guest Editorial. IET Inf. Secur. 10(5): 223-224 (2016) - [j55]Jaeik Cho, Shiuh-Jeng Wang:
Guest Editorial: Information and Communication Security in Multimedia Applications. Multim. Tools Appl. 75(22): 14503-14506 (2016) - [j54]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
A greedy steganographic SMVQ approach of greedy-USBIRDS using secret bits for image-block repairing based on differences. Multim. Tools Appl. 75(22): 14895-14916 (2016) - [j53]Fu-Hau Hsu, Min-Hao Wu, Syun-Cheng Ou, Shiuh-Jeng Wang:
Data concealments with high privacy in new technology file system. J. Supercomput. 72(1): 120-140 (2016) - [c42]Cheng-Ta Huang, Chia-Ling Wu, Jen-Chun Chang, Yu-Lun Wan, Shiuh-Jeng Wang:
Reversible SMVQ Image Hiding Using Adaptive Search Order Coding. DICTA 2016: 1-6 - 2015
- [j52]Shiuh-Jeng Wang, Jigang Liu, Taeshik Shon, Binod Vaidya, Yeong-Sheng Chen:
Security and privacy information technologies and applications for wireless pervasive computing environments. Inf. Sci. 321: 147-149 (2015) - [j51]Ya-Ting Chang, Cheng-Ta Huang, Chia-Ling Huang, Shiuh-Jeng Wang:
Data hiding of high compression ratio in VQ indices with neighboring correlations. Multim. Tools Appl. 74(5): 1645-1666 (2015) - [j50]Fu-Hau Hsu, Min-Hao Wu, Yi-Wen Chang, Shiuh-Jeng Wang:
Web security in a windows system as PrivacyDefender in private browsing mode. Multim. Tools Appl. 74(5): 1667-1688 (2015) - [c41]Chi-Yao Weng, Sheng-Jie Wang, Shiuh-Jeng Wang:
A Lossless Data Hiding Strategy Based on Two-Dimensional Side-Match Predictions. ICT-EurAsia/CONFENIS 2015: 235-242 - 2014
- [j49]Wei-Jen Wang, Cheng-Ta Huang, Cheng-Hsing Yang, Shiuh-Jeng Wang:
VQ-based algorithms extended to non-embedded watermarking for multimedia ownership prevention systems. Peer-to-Peer Netw. Appl. 7(4): 676-686 (2014) - [j48]Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Image reversibility in data embedding on the basis of blocking-predictions. Peer-to-Peer Netw. Appl. 7(4): 723-736 (2014) - [j47]Sang-Soo Yeo
, Shiuh-Jeng Wang:
Editorial of special section on Hybrid Information Security Technologies: part II. J. Supercomput. 70(1): 1-2 (2014) - [j46]Fu-Hau Hsu, Min-Hao Wu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Visible watermarking with reversibility of multimedia images for ownership declarations. J. Supercomput. 70(1): 247-268 (2014) - [c40]Ya-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang:
Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy. ICT-EurAsia 2014: 633-642 - [c39]Da-Yu Kao, Min-Jung Chung, Shiuh-Jeng Wang:
Frameworks in Evidence Collection in Forensics by Analyzing Temporal Cloud Storage Forensics. ICS 2014: 904-913 - [c38]Wei-Jen Wang, Cheng-Ta Huang, Shiau-Rung Tsui, Shiuh-Jeng Wang:
Steganographic Greedy Algorithms for Data Hiding Based on Differences Under SMVQ. IWDW 2014: 599-612 - 2013
- [j45]Sang Soo Yeo
, Shiuh-Jeng Wang, Rodrigo Roman Castro:
Advanced processing technologies and applications for mobile communication systems. Int. J. Commun. Syst. 26(6): 687-689 (2013) - [j44]Wei-Jen Wang, Cheng-Ta Huang, Chung-Min Liu, Po-Chyi Su
, Shiuh-Jeng Wang:
Data embedding for vector quantization image processing on the basis of adjoining state-codebook mapping. Inf. Sci. 246: 69-82 (2013) - [j43]Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang:
Reversible data hiding using side-match predictions on steganographic images. Multim. Tools Appl. 67(3): 571-591 (2013) - [j42]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang, Cheng-Hsing Yang:
Data embedding in image-media using weight-function on modulo operations. ACM Trans. Embed. Comput. Syst. 12(2): 21:1-21:12 (2013) - [j41]Binod Vaidya, Shiuh-Jeng Wang, Jongsung Kim, Ivan Lee
:
Special issue on wireless multimedia networks and security services. Telecommun. Syst. 52(4): 2219-2220 (2013) - [j40]Taeshik Shon, Shiuh-Jeng Wang, Lei Shu, Liudong Xing:
Editorial of special section on advanced in high performance, algorithm, and framework for future computing. J. Supercomput. 65(2): 483 (2013) - [j39]Sang-Soo Yeo
, Shiuh-Jeng Wang:
Editorial of special section on hybrid information security technologies - part I. J. Supercomput. 66(2): 781-782 (2013) - [j38]Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang, Chia-Ling Huang:
Reversibility of image with balanced fidelity and capacity upon pixels differencing expansion. J. Supercomput. 66(2): 812-828 (2013) - [j37]Chi-Yao Weng, Yu Hong Zhang, Li Chun Lin, Shiuh-Jeng Wang:
Visible watermarking images in high quality of data hiding. J. Supercomput. 66(2): 1033-1048 (2013) - [j36]Ya-Ting Chang, Cheng-Ta Huang, Chin-Feng Lee, Shiuh-Jeng Wang:
Image interpolating based data hiding in conjunction with pixel-shifting of histogram. J. Supercomput. 66(2): 1093-1110 (2013) - [c37]Ya-Ting Chang, Min-Ju Chung, Chin-Feng Lee, Cheng-Ta Huang, Shiuh-Jeng Wang:
Memory Forensics for Key Evidence Investigations in Case Illustrations. AsiaJCIS 2013: 96-101 - [c36]Wei-Jen Wang, Yu Hong Zhang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Steganography of Data Embedding in Multimedia Images Using Interpolation and Histogram Shifting. IIH-MSP 2013: 387-390 - 2012
- [j35]Chi-Yao Weng, Shiuh-Jeng Wang, Jonathan C. L. Liu, Dushyant Goyal:
Prediction-based Reversible Data Hiding Using Empirical Histograms in Images. KSII Trans. Internet Inf. Syst. 6(4): 1248-1266 (2012) - [j34]Jong Hyuk Park, Shiuh-Jeng Wang, Damien Sauveron:
Security technologies and applications for convergence environments. Secur. Commun. Networks 5(3): 249-251 (2012) - [c35]Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai
, Hsing-Chung Chen:
Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks. AsiaJCIS 2012: 51-58 - [c34]Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. ICUIMC 2012: 17:1-17:7 - [c33]Yu-Cheng Tso, Shiuh-Jeng Wang, Cheng-Ta Huang, Wei-Jen Wang:
iPhone social networking for evidence investigations using iTunes forensics. ICUIMC 2012: 62:1-62:7 - [c32]Hai-Cheng Chu, Szu-Wei Yang, Shiuh-Jeng Wang, Jong Hyuk Park:
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone. ITCS 2012: 171-178 - [c31]Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang:
Dual-Watermarking by QR-code Applications in Image Processing. UIC/ATC 2012: 638-643 - 2011
- [j33]Cheng-Hsing Yang, Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible steganography based on side match and hit pattern for VQ-compressed images. Inf. Sci. 181(11): 2218-2230 (2011) - [j32]Cheng-Hsing Yang, Chi-Yao Weng, Hao-Kuan Tso, Shiuh-Jeng Wang:
A data hiding scheme using the varieties of pixel-value differencing in multimedia images. J. Syst. Softw. 84(4): 669-678 (2011) - [j31]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
VQ Applications in Steganographic Data Hiding Upon Multimedia Images. IEEE Syst. J. 5(4): 528-537 (2011) - [j30]Shiuh-Jeng Wang, Yuh-Ren Tsai
, Chien-Chih Shen:
Verifiable Threshold Scheme in Multi-Secret Sharing Distributions upon Extensions of ECC. Wirel. Pers. Commun. 56(1): 173-182 (2011) - [c30]Hung-Jui Ke, Jonathan C. L. Liu, Shiuh-Jeng Wang, Dushyant Goyal:
Hash-Algorithms Output for Digital Evidence in Computer Forensics. BWCCA 2011: 399-404 - [c29]Min-Hao Wu, Fu-Hau Hsu, Cheng-Hsing Yang, Shiuh-Jeng Wang:
Reversible Watermarking Scheme with Visibility Using Randomize Distance. ICGEC 2011: 204-207 - [c28]Da-Yu Kao, Shiuh-Jeng Wang, Dushyant Goyal, Jonathan C. L. Liu:
A Trustworthy Computing of ADAPT Principle Guaranteeing Genuine Medical Image. ICPADS 2011: 618-623 - 2010
- [j29]Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
SoTE: Strategy of Triple-E on solving Trojan defense in Cyber-crime cases. Comput. Law Secur. Rev. 26(1): 52-60 (2010) - [j28]Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Capacity-Raising Steganography Using Multi-Pixel Differencing and Pixel-Value Shifting Operations. Fundam. Informaticae 98(2-3): 321-336 (2010) - [j27]Shiuh-Jeng Wang, Yuh-Ren Tsai, Chien-Chih Shen, Pin-You Chen:
Hierarchical key derivation scheme for group-oriented communication systems. Int. J. Inf. Technol. Commun. Convergence 1(1): 66-76 (2010) - [j26]Cheng-Hsing Yang, Shiuh-Jeng Wang:
Transforming LSB Substitution for Image-based Steganography in Matching Algorithms. J. Inf. Sci. Eng. 26(4): 1199-1212 (2010) - [j25]Hsing-Chung Chen, Franz I. S. Ko, Yung-Chen Chou, Shyan-Ming Yuan
, Yaw-Chung Chen, Chin-Chen Chang, Jyh-Horng Wen, Shiuh-Jeng Wang, Yuh-Ren Tsai
, Keh-Ming Lu:
Guest Editorial. J. Networks 5(8): 875-879 (2010) - [j24]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Yung-Fa Huang
, Chung-Wei Chen:
A Generalized Temporal and Spatial Role-Based Access Control Model. J. Networks 5(8): 912-920 (2010) - [j23]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Varied PVD + LSB evading detection programs to spatial domain in data embedding systems. J. Syst. Softw. 83(10): 1635-1643 (2010) - [j22]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Grouping strategies for promoting image quality of watermarking on the basis of vector quantization. J. Vis. Commun. Image Represent. 21(1): 49-55 (2010) - [c27]Shiuh-Jeng Wang, Yuh-Ren Tsai
, Chien-Chih Shen:
Varied Oblivious Transfer Protocols Enabling Multi-receiver and Applications. BWCCA 2010: 395-400 - [c26]Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible data hiding using neighboring block in VQ-compressed images. ICUIMC 2010: 47
2000 – 2009
- 2009
- [j21]Da-Yu Kao, Frank Fu-Yuan Huang, Shiuh-Jeng Wang:
Persistence and desistance: Examining the impact of re-integrative shaming to ethics in Taiwan juvenile hackers. Comput. Law Secur. Rev. 25(5): 464-476 (2009) - [j20]Shiuh-Jeng Wang, Da-Yu Kao, Frank Fu-Yuan Huang:
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models. Comput. Stand. Interfaces 31(4): 795-800 (2009) - [j19]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Codebook-linked Watermarking Scheme for Digital Images. Fundam. Informaticae 92(4): 397-409 (2009) - [j18]Shiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Shu-Wen Lin:
Visual-based embedding systems with targeted secret disclosures and applications. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 44-53 (2009) - [c25]Shiuh-Jeng Wang, Yuh-Ren Tsai
, Chien-Chih Shen, Pin-You Chen:
Hierarchical Key Agreement Protocols in Group-User Systems. IAS 2009: 259-262 - [c24]Cheng-Hsing Yang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible Steganography Based on Side Match and Hit Pattern for VQ-Compressed Images. IAS 2009: 607-610 - [c23]Wen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang:
Robustness-set in watermarking embedding systems using codebook classifications. ICUIMC 2009: 207-215 - [c22]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
A Scheme of Modulo-Based Capacity-improvement upon EMD Systems. IIH-MSP 2009: 365-368 - [c21]Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai
, Hsing-Chung Chen:
A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN. NCM 2009: 2062-2068 - [c20]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen:
Temporal and Location-Based RBAC Model. NCM 2009: 2111-2116 - 2008
- [j17]Shiuh-Jeng Wang, Yuh-Ren Tsai
, Chung-Wei Chen:
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks. J. Commun. 3(1): 20-26 (2008) - [j16]Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng Wang, Hung-Min Sun:
Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems. IEEE Trans. Inf. Forensics Secur. 3(3): 488-497 (2008) - [c19]Da-Yu Kao, Shiuh-Jeng Wang, Kush Mathur, Saransh Jain, Frank Fu-Yuan Huang:
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. APSCC 2008: 1364-1368 - [c18]Shiuh-Jeng Wang, Yuh-Ren Tsai
, Jian-Jhih Shen:
Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps. FGCN (2) 2008: 405-410 - [c17]Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang:
Histogram-based undetectable fidelity image in steganography as MSB controller. ICUIMC 2008: 566-569 - [c16]Shiuh-Jeng Wang, I-Shuan Lin, Ye-Lin Hsieh, Chi-Yao Weng:
Secret Sharing Systems with Authentication-Based Steganography. IIH-MSP 2008: 1146-1149 - [c15]Shiuh-Jeng Wang, Yuh-Ren Tsai
, Pin-You Chen:
An Authentication Scheme in Peer-to-Peer Based Live Stream Sharing Management Systems. ISDA (1) 2008: 507-512 - [c14]Cheng-Hsing Yang, Shu-Chien Huang
, Cheng-Ta Huang, Shiuh-Jeng Wang:
Non-embedded Image Protection Approaches Based on Vector Quantization. ISDA (3) 2008: 620-625 - [c13]Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang, Sajal Bhatia
, Saurabh Gupta:
Dataset Analysis of Proxy Logs Detecting to Curb Propagations in Network Attacks. ISI Workshops 2008: 245-250 - [c12]Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai
:
Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems. MUE 2008: 499-504 - [c11]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen:
Flexible Key Assignment for a Time-Token Constraint in a Hierarchy. MUE 2008: 521-526 - 2007
- [j15]Yuh-Ren Tsai
, Shiuh-Jeng Wang:
Two-tier authentication for cluster and individual sets in mobile ad hoc networks. Comput. Networks 51(3): 883-900 (2007) - [j14]Shiuh-Jeng Wang:
Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Comput. Stand. Interfaces 29(2): 216-223 (2007) - [j13]Shiuh-Jeng Wang, Da-Yu Kao:
Internet forensics on the basis of evidence gathering with Peep attacks. Comput. Stand. Interfaces 29(4): 423-429 (2007) - [j12]Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen:
Packet construction for secure conference call request in ad hoc network systems. Inf. Sci. 177(24): 5598-5610 (2007) - [c10]Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang:
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. FGCN (2) 2007: 125-129 - [c9]Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai
:
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. FGCN (1) 2007: 328-331 - [c8]Cheng-Hsing Yang, Shiuh-Jeng Wang, Chi-Yao Weng:
Analyses of Pixel-Value-Differencing Schemes with LSB Replacement in Stegonagraphy. IIH-MSP 2007: 445-448 - [c7]Shiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Yao-Han Chang:
Targeted Secret Disclosures in Visual-based Watermarking Concealment Systems. MUE 2007: 1136-1142 - 2006
- [c6]Da-Yu Kao, Shiuh-Jeng Wang, Frank Fu-Yuan Huang:
Digitized Forensic Investigation at P2P Copyright Controversy, Infringement. ISI 2006: 644-646 - 2005
- [j11]Shiuh-Jeng Wang, Cheng-Hsing Yang:
Hierarchy-oriented searching algorithms using alternative duplicate codewords for vector quantization mechanism. Appl. Math. Comput. 162(2): 559-576 (2005) - [j10]Shiuh-Jeng Wang:
Steganography of capacity required using modulo operator for embedding secret image. Appl. Math. Comput. 164(1): 99-116 (2005) - [j9]Cheng-Hsing Yang, Shiuh-Jeng Wang:
Accelerating VQ-based codeword search on the basis of partial search strategy. Comput. Stand. Interfaces 28(2): 231-240 (2005) - [c5]Shiuh-Jeng Wang, Cheng-Hsing Yang:
Gathering Digital Evidence in Response to Information Security Incidents. ISI 2005: 644-645 - 2004
- [j8]Shiuh-Jeng Wang:
Threshold verification scheme to a valid-signature using identity only on specialized approval. Appl. Math. Comput. 152(2): 373-383 (2004) - [j7]Shiuh-Jeng Wang, Chen-Ming Chuang:
Anonymous message communications with user hierarchy in a multicast system. Appl. Math. Comput. 159(1): 95-112 (2004) - [j6]Shiuh-Jeng Wang:
Remote table-based log-in authentication upon geometric triangle. Comput. Stand. Interfaces 26(2): 85-92 (2004) - [j5]Shiuh-Jeng Wang:
Direct construction of a secret in generalized group-oriented cryptography. Comput. Stand. Interfaces 26(5): 455-460 (2004) - [j4]Shiuh-Jeng Wang:
Anonymous Wireless Authentication on a Portable Cellular Mobile System. IEEE Trans. Computers 53(10): 1317-1329 (2004) - [c4]Shiuh-Jeng Wang:
Multicasting Secret Images using a Knapsack-like Cipher System. CAINE 2004: 67-72 - 2003
- [j3]Shiuh-Jeng Wang:
Yet another log-in authentication using n-dimensional construction based on circle property. IEEE Trans. Consumer Electron. 49(2): 337-341 (2003) - 2002
- [c3]Shiuh-Jeng Wang, Kai-Sheng Yang:
Watermark Embedding Mechanism Using Modulus-Based for Intellectual Property Protection on Image Data. EC-Web 2002: 333-342
1990 – 1999
- 1999
- [j2]Shiuh-Jeng Wang, Jinn-ke Jan:
A displacement addressing method for letter-oriented keys. J. Syst. Softw. 46(1): 77-88 (1999) - [c2]Shiuh-Jeng Wang, Jin-Fu Chang:
A Conference Key Multicasting Scheme Using Knapsack and Secret Sharing. DEXA 1999: 372-381 - 1996
- [j1]Shiuh-Jeng Wang, Jin-Fu Chang:
Smart card based secure password authentication scheme. Comput. Secur. 15(3): 231-237 (1996) - [c1]Shiuh-Jeng Wang, Le-Pond Chin, Jin-Fu Chang, Yuh-Ren Tsai:
ID-based authentication for mobile conference call. SEC 1996: 49-58