The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for TSER with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2003 (17) 2004-2007 (22) 2008-2009 (17) 2010-2013 (16) 2014-2017 (18) 2018-2021 (19) 2022-2023 (14)
Publication types (Num. hits)
article(42) book(1) inproceedings(79) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 44 occurrences of 38 keywords

Results
Found 134 publication records. Showing 123 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
66Cheng Hsu, M'hamed Bouziane, Laurie Rattner, Lester Yee Information Resources Management in Heterogeneous, Distributed Environments: A Metadatabase Approach. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF core structure, metadatabase system, global information resources dictionary, unified metadata representation, two-stage entity relationship, TSER, metadatabase model, GIRD elements, manufacturing information management examples, information resources dictionary system, IRDS, software engineering, distributed processing, database management systems, database theory, information integration, distributed environments, CAD/CAM, manufacturing data processing, information resource management
42Jinyingming Zhang, Jin Liu 0009, Xiongwei Xu, Peizhu Gong, Mingyang Duan TSER: A Two-Stage Character Segmentation Network With Two-Stream Attention and Edge Refinement. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
42Cheng Hsu, Alvaro Perry, M'hamed Bouziane, Waiman Cheung TSER: A Data Modeling System Using the Two-Stage Entity-Relationship Approach. Search on Bibsonomy ER The full citation details ... 1987 DBLP  BibTeX  RDF
30Cheng Hsu, Gilbert Babin, Lester Yee, M'hamed Bouziane, Waiman Cheung, Laurie Rattner Metadatabase modeling for enterprise information integration. Search on Bibsonomy J. Syst. Integr. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Metadatabase, data and knowledge management, information modeling, heterogeneous databases
28Nawras Alkassab, Chin-Tser Huang, Tania Lorido-Botran DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Jian Liu 0031, Chin-Tser Huang Evaluation of Different Time Series Forecasting Models for 5G V2V Networks. Search on Bibsonomy ICNC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Venkat Venkateswaran, Chin-Tser Huang, Kaliappa Ravindran Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement. Search on Bibsonomy COMSNETS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Yiming Qiu, Patrick Tser Jern Kon, Jiarong Xing, Yibo Huang 0005, Hongyi Liu, Xinyu Wang 0006, Peng Huang 0005, Mosharaf Chowdhury, Ang Chen 0001 Simplifying Cloud Management with Cloudless Computing. Search on Bibsonomy HotNets The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Yibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma, Bo Meng SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC. Search on Bibsonomy ProvSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Laurent Njilla, Matthew Sharp, Tieming Geng SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. Search on Bibsonomy UbiSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Tieming Geng, Chin-Tser Huang, Csilla Farkas SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. Search on Bibsonomy UbiSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Tieming Geng, Laurent Njilla, Chin-Tser Huang Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. Search on Bibsonomy Network The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Patrick Tser Jern Kon, Diogo Barradas, Ang Chen 0001 Stargaze: A LEO Constellation Emulator for Security Experimentation. Search on Bibsonomy CPSIOTSEC@CCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Yuh-Tser Wu, He-Hsuan Liu, Kuang-Hsun Lin, Hung-Yu Wei A Latency-Aware Scheduling Strategy for NR DCP DRX Mechanism. Search on Bibsonomy APWCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Tieming Geng, Laurent Njilla, Chin-Tser Huang A Survey of Blockchain-Based Electronic Voting Mechanisms in Sensor Networks. Search on Bibsonomy SenSys The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Jian Liu 0031, Amirhossein Nazeri, Chunheng Zhao, Esmail M. M. Abuhdima, Gurcan Comert, Chin-Tser Huang, Pierluigi Pisu Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather. Search on Bibsonomy WiSEE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Esmail M. M. Abuhdima, Gurcan Comert, Nabeyou Tadessa, Fred Chambers, Kibonke Niyomugabo, Pierluigi Pisu, Amirhossein Nazeri, Chin-Tser Huang, Jian Liu 0031, Chunheng Zhao The Effect of Dust and Sand on the Propagating EM Millimeter Plane Wave. Search on Bibsonomy WiSEE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Laurent Njilla, Tieming Geng Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers. Search on Bibsonomy TrustCom The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
28Esmail M. M. Abuhdima, Ahmed El Qaouaq, Shakendra Alston, Kirk Ambrose, Gurcan Comert, Jian Liu 0031, Chunheng Zhao, Chin-Tser Huang, Pierluigi Pisu Impact of Weather Conditions on 5G Communication Channel under Connected Vehicles Framework. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
28Esmail M. M. Abuhdima, Gurcan Comert, Pierluigi Pisu, Chin-Tser Huang, Ahmed El Qaouaq, Chunheng Zhao, Shakendra Alston, Kirk Ambrose, Jian Liu 0031 The Effect of Dust and Sand on the 5G Terrestrial Links. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
28Qiang Zeng 0001, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li 0001, Chin-Tser Huang, Csilla Farkas Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Esmail M. M. Abuhdima, Gurcan Comert, Pierluigi Pisu, Chin-Tser Huang, Ahmed Elqaouaq, Chunheng Zhao, Shakendra Alston, Kirk Ambrose, Jian Liu 0031 The effect of Dust and Sand on the 5G Millimeter-Wave links. Search on Bibsonomy WiSEE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Jian Liu 0031, Chin-Tser Huang Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain. Search on Bibsonomy ICCCN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Tieming Geng, Laurent Njilla, Chin-Tser Huang Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification. Search on Bibsonomy DSC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Muhammad N. Sakib, Chin-Tser Huang, Ying-Dar Lin Maximizing accuracy in multi-scanner malware detection systems. Search on Bibsonomy Comput. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Xudong He, Qin Liu, Shuang Chen, Chin-Tser Huang, Dejun Wang, Bo Meng Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Laurent Njilla, Tieming Geng Detecting Counterfeit ICs with Blockchain-based Verification Framework. Search on Bibsonomy ISC2 The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Xudong He, Jiabing Liu, Chin-Tser Huang, Dejun Wang, Bo Meng A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. Search on Bibsonomy ICNC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Laurent Njilla, Tieming Geng Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions. Search on Bibsonomy ISC2 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, Csilla Farkas Data Dependencies Preserving Shuffle in Relational Database. Search on Bibsonomy ICDIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Tieming Geng, Hatim Alsuwat, Chin-Tser Huang, Csilla Farkas Securing Relational Database Storage with Attribute Association Aware Shuffling. Search on Bibsonomy DSC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
28Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network. Search on Bibsonomy Opt. Switch. Netw. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28S. Mo Jang, Tieming Geng, Jo-Yun Queenie Li, Ruofan Xia, Chin-Tser Huang, Hwalbin Kim, Jijun Tang A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Tieming Geng, Chin-Tser Huang Blockchain-inspired Framework for Runtime Verification of IoT Ecosystem Task Fulfillment. Search on Bibsonomy ISC2 The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28John H. Gerdes Jr., Chin-Tser Huang, Mohamed A. Sharaf Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2017 DBLP  BibTeX  RDF
28Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla A game theoretic approach for inspecting web-based malvertising. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Nawras Alkassab, Chin-Tser Huang, Yu Chen 0002, Baek-Young Choi, Sejun Song Benefits and schemes of prefetching from cloud to fog networks. Search on Bibsonomy CloudNet The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Kaliappa Ravindran, Chin-Tser Huang Probabilistic treatment of service assurance in distributed information systems. Search on Bibsonomy DSC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Haymanot Gebre-Amlak, Seoungjin Lee, Abdoh M. A. Jabbari, Yu Chen 0002, Baek-Young Choi, Chin-Tser Huang, Sejun Song MIST: Mobility-inspired software-defined fog system. Search on Bibsonomy ICCE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Peter Mueller, Chin-Tser Huang, Shui Yu 0001, Zahir Tari, Ying-Dar Lin Cloud Security. Search on Bibsonomy IEEE Cloud Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Jie Huang, Chin-Tser Huang Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations. Search on Bibsonomy J. Electr. Comput. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Muhammad N. Sakib, Chin-Tser Huang Privacy preserving proximity testing using elliptic curves. Search on Bibsonomy ITNAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Muhammad N. Sakib, Chin-Tser Huang Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic. Search on Bibsonomy ICC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Sharaf J. Malebary, Wenyuan Xu, Chin-Tser Huang Jamming mobility in 802.11p networks: Modeling, evaluation, and detection. Search on Bibsonomy IPCCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Ning Chen, Yu Chen 0002, Sejun Song, Chin-Tser Huang, Xinyue Ye Poster Abstract: Smart Urban Surveillance Using Fog Computing. Search on Bibsonomy SEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Fang-Ming Hsu, Tser-Yieth Chen, Chiu-Tsu Fan, Chun-Min Lin, Chu-Mei Chiu Factors affecting the satisfaction of an online community for archive management in Taiwan. Search on Bibsonomy Program The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Jinn-Tser Lin, Wen-Ling Chen, Yu-Chieh Wu, Jie-Chi Yang A Boosting Algorithm for Auto-Generating Quiz for Traffic Education. Search on Bibsonomy ICALT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Muhammad N. Sakib, Chin-Tser Huang Automated Collection and Analysis of Malware Disseminated via Online Advertising. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Wei Peng 0007, Feng Li 0001, Chin-Tser Huang, Xukai Zou A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces. Search on Bibsonomy ICC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Feng Li 0001, Chin-Tser Huang, Jie Huang, Wei Peng 0007 Feedback-based smartphone strategic sampling for BYOD security. Search on Bibsonomy ICCCN The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Feng Li 0001, Wei Peng 0007, Chin-Tser Huang, Xukai Zou Smartphone strategic sampling in defending enterprise network security. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Hyungbae Park, Sejun Song, Baek-Young Choi, Chin-Tser Huang PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers. Search on Bibsonomy INFOCOM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Mohamed A. Sharaf, Jie Huang, Chin-Tser Huang Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications. Search on Bibsonomy ICDCS Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Will Goss, Chin-Tser Huang A practical implementation of veiled certificate for user-centric privacy protection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Yi Xian, Chin-Tser Huang Traffic-aware geographic forwarding in vehicular ad hoc networks. Search on Bibsonomy VANET@MOBICOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Muhammad N. Sakib, Chin-Tser Huang Textact: A text-action based web authentication scheme. Search on Bibsonomy GLOBECOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Jie Huang, Mohamed A. Sharaf, Chin-Tser Huang A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud. Search on Bibsonomy ICPP Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Jie Huang, Chin-Tser Huang A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks. Search on Bibsonomy ICCCN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Vipul Gupta Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance. Search on Bibsonomy ICDCS Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
28Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks. Search on Bibsonomy Comput. Commun. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jie Huang, Chin-Tser Huang Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations. Search on Bibsonomy ICC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Keesook J. Han, James Perretta Automatic Selection of Routers for Placing Early Filters of Malicious Traffic. Search on Bibsonomy GLOBECOM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Young-ri Choi, Chin-Tser Huang, Mohamed G. Gouda Stabilization of Flood Sequencing Protocols in Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF flood sequencing protocol, sensor networks, Self-stabilization, sequence numbers
28Chin-Tser Huang, Chang-Ling Huang, J. Morris Chang Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks. Search on Bibsonomy ICC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb Look-ahead routing and Message Scheduling in delay-tolerant networks. Search on Bibsonomy LCN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Tser L. Y. Moh Semi-Supervised Online Learning for Acoustic Data Mining. Search on Bibsonomy 2010   RDF
28Pei-Wei Chen, Tser-Yu Lin, Ling-Wei Ke, Rickey Yu, Ming-Da Tsai, Stanley Yeh, Yi-Bin Lee, Bosen Tzeng, Yen-Horng Chen, Sheng-Jui Huang, Yu-Hsin Lin, Guang-Kaai Dehng A 0.13 µm CMOS Quad-Band GSM/GPRS/EDGE RF Transceiver Using a Low-Noise Fractional-N Frequency Synthesizer and Direct-Conversion Architecture. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Haw-Long Lee, Yu-Ching Yang, Win-Jin Chang, Tser-Son Wu Estimation of heat flux and thermal stresses in multilayer gun barrel with thermal contact resistance. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Tser-Yieth Chen Scenario analysis using embedded technology roadmap for a digital video system platform for family use development. Search on Bibsonomy Int. J. Serv. Technol. Manag. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Fang-Ming Hsu, Tser-Yieth Chen, Shuwen Wang Efficiency and satisfaction of electronic records management systems in e-government in Taiwan. Search on Bibsonomy Electron. Libr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. Search on Bibsonomy Comput. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Jeff Janies An Adaptive Approach to Granular Real-Time Anomaly Detection. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Rocky K. C. Chang, Polly Huang Signal Processing Applications in Network Intrusion Detection Systems. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas P2F: A User-Centric Privacy Protection Framework. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Prasanth Kalakota, Chin-Tser Huang On the Benefits of Early Filtering of Botnet Unwanted Traffic. Search on Bibsonomy ICCCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, John Gerdes Jr. Privacy-preserving multi-dimensional credentialing using veiled certificates. Search on Bibsonomy CSIIRW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jorge Arturo Cobb, Chin-Tser Huang Stabilization of Maximal-Metric Routing without Knowledge of Network Size. Search on Bibsonomy PDCAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Sachin Thareja, Yong-June Shin Wavelet-based Real Time Detection of Network Traffic Anomalies. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2008 DBLP  BibTeX  RDF
28Chin-Tser Huang, J. Morris Chang Responding to Security Issues in WiMAX Networks. Search on Bibsonomy IT Prof. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Yuliya Kopylova, Duncan A. Buell, Chin-Tser Huang, Jeff Janies Mutual information applied to anomaly detection. Search on Bibsonomy J. Commun. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Sen Xu, Chin-Tser Huang, Manton M. Matthews Secure Multicast in WiMAX. Search on Bibsonomy J. Networks The full citation details ... 2008 DBLP  BibTeX  RDF
28Chin-Tser Huang LOFT: Low-Overhead Freshness Transmission in Sensor Networks. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF message loss, sensor network, replay attack, freshness, sequence number
28Sen Xu, Chin-Tser Huang, Manton M. Matthews Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR. Search on Bibsonomy ISWCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, Theodor Richardson SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks. Search on Bibsonomy Int. J. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Fang-Ming Hsu, Tser-Yieth Chen Understanding Information Systems Usage Behavior in E-Government: The Role of Context and Perceived Value. Search on Bibsonomy PACIS The full citation details ... 2007 DBLP  BibTeX  RDF
28Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews Chinese remainder theorem based group key management. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management
28Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks. Search on Bibsonomy GLOBECOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Chung-Kuo Chang, Chin-Tser Huang Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. Search on Bibsonomy ICPP Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Jeff Janies, Chin-Tser Huang Fates: A Granular Approach to Real-Time Anomaly Detection. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Theodor Richardson, Chin-Tser Huang Containing Hitlist-Based Worms with Polymorphic Signatures. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Ravi Katpelly, Tiecheng Liu, Chin-Tser Huang Summarization of Wearable Videos Based on User Activity Analysis. Search on Bibsonomy ISM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Yi Xian, Chin-Tser Huang Securing VoIP Services in Multi-Hop Wireless Mesh Networks. Search on Bibsonomy ISWCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy Convergence of IPsec in presence of resets. Search on Bibsonomy J. High Speed Networks The full citation details ... 2006 DBLP  BibTeX  RDF
28Chin-Tser Huang, Mohamed G. Gouda Hop Integrity in the Internet Search on Bibsonomy 2006   DOI  RDF
28Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang Fault Masking in Tri-redundant Systems. Search on Bibsonomy SSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Jeff Janies, Chin-Tser Huang, Nathan L. Johnson SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 123 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license