Search

Your search keyword '"Chin-Tser Huang"' showing total 43 results

Search Constraints

Start Over You searched for: Author "Chin-Tser Huang" Remove constraint Author: "Chin-Tser Huang" Language english Remove constraint Language: english
43 results on '"Chin-Tser Huang"'

Search Results

1. A SYN fl ooding attack detection approach with hierarchical policies based on self-information

2. Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment

3. Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

4. A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology

5. Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations

6. Efficient and Secure Multicast in WirelessMAN: A Cross-layer Design

7. Improving transmission efficiency of large sequence alignment/map (SAM) files.

9. Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

10. Stabilization of flood sequencing protocols in sensor networks

11. A Security Analysis Method for Security Protocol Implementations Based on Message Construction

12. Efficient and Secure Multicast in WirelessMAN: A Cross-layer Design

13. Hop Integrity in the Internet

14. Textact: A text-action based web authentication scheme.

35. Improving Transmission Efficiency of Large Sequence Alignment/Map (SAM) Files.

36. An Adaptive Approach to Granular Real-Time Anomaly Detection.

37. Responding to Security Issues in WiMAX Networks.

38. Hop Integrity on Computer Networks.

39. Signal Processing Applications in Network Intrusion Detection Systems

41. An Adaptive Approach to Granular Real-Time Anomaly Detection

Catalog

Books, media, physical & digital resources