| 2008 |
8 | | Ming-Hour Yang,
Chien-Si Chiu,
Shiuhpyng Shieh:
Tracing Mobile Attackers in Wireless Ad-Hoc Network.
ICIW 2008: 7-12 |
| 2007 |
7 | | Cheng-Huang Jiang,
Shiuhpyng Shieh,
Jen-Chien Liu:
Keystroke statistical learning model for web authentication.
ASIACCS 2007: 359-361 |
6 | | Shih-I Huang,
Shiuhpyng Shieh:
SEA: Secure Encrypted-Data Aggregation in Mobile Wireless Sensor Networks.
CIS 2007: 848-852 |
| 2006 |
5 | | Ferng-Ching Lin,
Der-Tsai Lee,
Bao-Shuh Paul Lin,
Shiuhpyng Shieh,
Sushil Jajodia:
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006
ACM 2006 |
4 | | Ya-Jeng Lin,
Shiuhpyng Shieh,
Warren W. Lin:
Lightweight, pollution-attack resistant multicast authentication scheme.
ASIACCS 2006: 148-156 |
3 | | Shang-Ming Chang,
Shiuhpyng Shieh,
Warren W. Lin,
Chih-Ming Hsieh:
An efficient broadcast authentication scheme in wireless sensor networks.
ASIACCS 2006: 311-320 |
| 2004 |
2 | | Cheng-Fen Lu,
Shiuhpyng Shieh:
Secure Key-Evolving for Public Key Cryptosystems Based on the Discrete Logarithm Problem.
J. Inf. Sci. Eng. 20(2): 391-400 (2004) |
1 | | Cheng-Fen Lu,
Shiuhpyng Shieh:
Efficient Key-Evolving Protocol for the GQ Signature.
J. Inf. Sci. Eng. 20(4): 763-769 (2004) |