AAAAAA

   
Results: 1-10 |
Results: 10

Authors: Shieh, SP Ho, FS Huang, YL Luo, JN
Citation: Sp. Shieh et al., Network address translators: Effects on security protocols and applications in the TCP/IP stack, IEEE INTN C, 4(6), 2000, pp. 42-49

Authors: Lin, CT Shieh, SP
Citation: Ct. Lin et Sp. Shieh, Chain authentication in mobile communication systems, TELECOM SYS, 13(2-4), 2000, pp. 213-240

Authors: Huang, YL Shieh, SP Ho, FS
Citation: Yl. Huang et al., A generic electronic payment model supporting multiple merchant transactions, COMPUT SEC, 19(5), 2000, pp. 453-465

Authors: Shieh, SP Lin, CT Yang, WB Sun, HM
Citation: Sp. Shieh et al., Digital multisignature schemes for authenticating delegates in mobile codesystems, IEEE VEH T, 49(4), 2000, pp. 1464-1473

Authors: Shyu, IJ Shieh, SP
Citation: Ij. Shyu et Sp. Shieh, Playback dispatch and fault recovery for a clustered video system with multiple servers, MULTIMED T, 9(3), 1999, pp. 277-294

Authors: Shyu, IJ Shieh, SP
Citation: Ij. Shyu et Sp. Shieh, A distributed fault-tolerant design for multiple-server VOD systems, MULTIMED T, 8(2), 1999, pp. 219-247

Authors: Sun, HM Shieh, SP
Citation: Hm. Sun et Sp. Shieh, Recursive constructions for perfect secret sharing schemes, COMPUT MATH, 37(3), 1999, pp. 87-96

Authors: Yang, WH Shieh, SP
Citation: Wh. Yang et Sp. Shieh, Password authentication schemes with smart cards, COMPUT SEC, 18(8), 1999, pp. 727-733

Authors: Sun, HM Shieh, SP Sun, HM
Citation: Hm. Sun et al., A note on breaking and repairing a secure broadcasting in large networks, COMPUT COMM, 22(2), 1999, pp. 193-194

Authors: Shieh, SP Lin, CT Wu, SY
Citation: Sp. Shieh et al., Optimal assignment of mobile agents for software authorization and protection, COMPUT COMM, 22(1), 1999, pp. 46-55
Risultati: 1-10 |