Search

Your search keyword '"Chin-Tser Huang"' showing total 250 results

Search Constraints

Start Over You searched for: Author "Chin-Tser Huang" Remove constraint Author: "Chin-Tser Huang"
250 results on '"Chin-Tser Huang"'

Search Results

1. A SYN fl ooding attack detection approach with hierarchical policies based on self-information

2. Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment

3. Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus

4. A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology

5. Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations

6. Efficient and Secure Multicast in WirelessMAN: A Cross-layer Design

10. Improving transmission efficiency of large sequence alignment/map (SAM) files.

Catalog

Books, media, physical & digital resources