Search

Your search keyword '"Chen, Hsiao-Hwa"' showing total 91 results

Search Constraints

Start Over You searched for: Author "Chen, Hsiao-Hwa" Remove constraint Author: "Chen, Hsiao-Hwa" Publisher springer berlin heidelberg Remove constraint Publisher: springer berlin heidelberg
91 results on '"Chen, Hsiao-Hwa"'

Search Results

2. On the Homonymous Role in Role-Based Discretionary Access Control

3. AF or DF, and How to Configure an Optimal Mixed AF-DF Relay System?

6. A New Approach to Malware Detection

7. ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION

8. A Deployment Value Model for Intrusion Detection Sensors

9. On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS)

10. Securing Mobile Phone Calls with Identity-Based Cryptography

11. A Kademlia-Based Node Lookup System for Anonymization Networks

12. Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN

13. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network

14. Clustering-Based Frequency l-Diversity Anonymization

15. Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery

16. Efficient Secure Multiparty Computation Protocol in Asynchronous Network

17. A New Strongly Secure Authenticated Key Exchange Protocol

18. Improved Implementations of Cryptosystems Based on Tate Pairing

19. What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?

20. Tagging the Turtle: Local Attestation for Kiosk Computing

21. Methodology and Tools of IS Audit and Computer Forensics – The Common Denominator

22. Recognizing Partially Occluded Faces from a Single Exemplar Image Per Person

23. Adaptive Iris Segmentation

24. Formal Verification for Access Control in Web Information Sharing System

25. Selective Regression Test for Access Control System Employing RBAC

26. Grouping Provenance Information to Improve Efficiency of Access Control

27. Certificateless Signature Scheme without Random Oracles

28. Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker

29. The Dark Side of Timed Opacity

30. Safety High Accuracy Context-Aware Matrix (CAM) Making Based on X.509 Proxy Certificate

31. A Study on Mosaic Based CCTV System Using Localization

32. A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment

33. Selecting the Wireless Communication Methods for Establishing Ubiquitous City-Gas Facilities in Korea

34. A Forward-Secrecy WTLS Handshake Protocol Based on XTR

35. CRYPTEX Model for E-Commercial Contract of Software Source Code Using Secrete Sharing Scheme

36. Free-Form Deformation Axis Aligned Bounding Box

37. Cryptanalysis of Secure Key Exchange Protocol between STB and Smart Card in IPTV Broadcasting

38. Domain Specific Intended Use Evaluation Method: Intrusion Detection Specific Intended Use Evaluation Method

39. A Study of International Trend Analysis on Web Service Vulnerabilities in OWASP and WASC

40. A Study on Feasibility and Establishment of a Security Grade Certification Scheme for the New IT Services

41. Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks

42. Device Authentication/Authorization Protocol for Home Network in Next Generation Security

43. Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles

44. Authenticated Encryption in WSN Using eSTREAM Ciphers

45. Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs)

46. A Secure Group Rekeying Scheme with Compromised Node Revocation in Wireless Sensor Networks

47. A Mathematical Approach towards Trust Based Security in Pervasive Computing Environment

48. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks

49. HOTP-Based User Authentication Scheme in Home Networks

50. Protecting Global SOA from DoS and Other Security Threats

Catalog

Books, media, physical & digital resources