Search

Your search keyword '"Chen, Hsiao-Hwa"' showing total 101 results

Search Constraints

Start Over You searched for: Author "Chen, Hsiao-Hwa" Remove constraint Author: "Chen, Hsiao-Hwa" Publication Type eBooks Remove constraint Publication Type: eBooks
101 results on '"Chen, Hsiao-Hwa"'

Search Results

1. Heterogeneous Small Cell Networks

10. Antenna Selection in Large-Scale Multiple Antenna Systems

13. On the Homonymous Role in Role-Based Discretionary Access Control

16. AF or DF, and How to Configure an Optimal Mixed AF-DF Relay System?

17. A New Approach to Malware Detection

18. ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION

19. A Deployment Value Model for Intrusion Detection Sensors

20. On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)

21. Securing Mobile Phone Calls with Identity-Based Cryptography

22. A Kademlia-Based Node Lookup System for Anonymization Networks

23. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN

24. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network

25. Clustering-Based Frequency l-Diversity Anonymization

26. Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery

27. Efficient Secure Multiparty Computation Protocol in Asynchronous Network

28. A New Strongly Secure Authenticated Key Exchange Protocol

29. Improved Implementations of Cryptosystems Based on Tate Pairing

30. What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?

31. Tagging the Turtle: Local Attestation for Kiosk Computing

32. Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator

33. Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person

34. Adaptive Iris Segmentation

35. Formal Verification for Access Control in Web Information Sharing System

36. Selective Regression Test for Access Control System Employing RBAC

37. Grouping Provenance Information to Improve Efficiency of Access Control

38. Certificateless Signature Scheme without Random Oracles

39. Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker

40. The Dark Side of Timed Opacity

41. Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate

42. A Study on Mosaic Based CCTV System Using Localization

43. A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment

44. Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea

45. A Forward-Secrecy WTLS Handshake Protocol Based on XTR

46. CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme

47. Free-Form Deformation Axis Aligned Bounding Box

48. Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting

49. Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method

50. A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC

Catalog

Books, media, physical & digital resources