Search

Your search keyword '"Chin-Tser Huang"' showing total 55 results

Search Constraints

Start Over You searched for: Author "Chin-Tser Huang" Remove constraint Author: "Chin-Tser Huang" Topic computer Remove constraint Topic: computer
55 results on '"Chin-Tser Huang"'

Search Results

1. A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising

2. Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification

3. Detecting Counterfeit ICs with Blockchain-based Verification Framework

4. A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology

5. Securing Relational Database Storage with Attribute Association Aware Shuffling

6. A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak

7. Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates

8. Maximizing accuracy in multi-scanner malware detection systems

9. A Security Analysis Method for Security Protocol Implementations Based on Message Construction

10. Cloud Security

11. A game theoretic approach for inspecting web-based malvertising

12. Privacy preserving proximity testing using elliptic curves

13. Smart City Surveillance in Fog Computing

14. Poster Abstract: Smart Urban Surveillance Using Fog Computing

15. Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements

16. Mutual information applied to anomaly detection

17. Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations

18. Automated Collection and Analysis of Malware Disseminated via Online Advertising

19. A secure address resolution protocol

21. A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces

22. Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications

23. Smartphone strategic sampling in defending enterprise network security

24. PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers

25. Textact: A text-action based web authentication scheme

26. A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud

27. A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks

28. Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance

29. A practical implementation of veiled certificate for user-centric privacy protection

30. Improving transmission efficiency of large sequence alignment/map (SAM) files

31. Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations

33. Privacy-preserving multi-dimensional credentialing using veiled certificates

34. P2F: A User-Centric Privacy Protection Framework

35. Secure Multicast in WiMAX

36. Securing VoIP Services in Multi-Hop Wireless Mesh Networks

37. Containing Hitlist-Based Worms with Polymorphic Signatures

38. Fates: A Granular Approach to Real-Time Anomaly Detection

39. Secure multicast in various scenarios of WirelessMAN

40. Efficient and Secure Multicast in WirelessMAN

41. A secure cookie protocol

42. Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions

43. Wavelet-based Real Time Detection of Network Traffic Anomalies

44. On Capturing and Containing E-mail Worms

45. Security issues in privacy and key management protocols of IEEE 802.16

46. SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks

47. Message from the WSNet Workshop Co-chairs

48. Convergence of IPsec in presence of resets

49. Key trees and the security of interval multicast

50. An anti-replay window protocol with controlled shift

Catalog

Books, media, physical & digital resources