Citation: Hm. Sun et Sp. Shieh, SECRET SHARING SCHEMES FOR GRAPH-BASED PROHIBITED STRUCTURES, Computers & mathematics with applications (1987), 36(7), 1998, pp. 131-140
Citation: Sp. Shieh et Jn. Chen, SPECIFICATION, VALIDATION, AND VERIFICATION OF TIME-CRITICAL SYSTEMS, Computer communications, 21(5), 1998, pp. 460-469
Citation: Sp. Shieh et Fs. Ho, A TOTAL ORDERING MULTICAST PROTOCOL USING PROPAGATION TREES - COMMENT, IEEE transactions on parallel and distributed systems, 8(10), 1997, pp. 1084-1084
Citation: Sp. Shieh et Vd. Gligor, ON A PATTERN-ORIENTED MODEL FOR INTRUSION DETECTION, IEEE transactions on knowledge and data engineering, 9(4), 1997, pp. 661-667
Citation: Hm. Sun et Sp. Shieh, OPTIMAL INFORMATION-DISPERSAL FOR INCREASING THE RELIABILITY OF A DISTRIBUTED SERVICE, IEEE transactions on reliability, 46(4), 1997, pp. 462-472
Citation: Hm. Sun et Sp. Shieh, AN EFFICIENT CONSTRUCTION OF PERFECT SECRET SHARING SCHEMES FOR GRAPH-BASED STRUCTURES, Computers & mathematics with applications, 31(7), 1996, pp. 129-135