English  |  正體中文  |  简体中文  |  Total items :0  
Visitors :  52826970    Online Users :  748
Project Commissioned by the Ministry of Education
Project Executed by National Taiwan University Library
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
About TAIR

Browse By

News

Copyright

Related Links

"hsu chun hsiao"

Return to Browse by Author
Sorting by Title Sort by Date

Showing items 6-55 of 57  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page

Institution Date Title Author
臺大學術典藏 2020-05-04T07:56:35Z Efficient and secure threshold-based event validation for VANETs. Shi, Elaine; Perrig, Adrian; HSU-CHUN HSIAO; Hsiao, Hsu-Chun; Studer, Ahren; Dubey, Rituik; Hsiao, Hsu-Chun;Studer, Ahren;Dubey, Rituik;Shi, Elaine;Perrig, Adrian
臺大學術典藏 2020-05-04T07:56:35Z A Study of User-Friendly Hash Comparison Schemes. Hsiao, Hsu-Chun; Lin, Yue-Hsun; Studer, Ahren; Studer, Cassandra; Wang, King-Hang; Kikuchi, Hiroaki; Perrig, Adrian; Sun, Hung-Min; Yang, Bo-Yin; HSU-CHUN HSIAO; Hsiao, Hsu-Chun;Lin, Yue-Hsun;Studer, Ahren;Studer, Cassandra;Wang, King-Hang;Kikuchi, Hiroaki;Perrig, Adrian;Sun, Hung-Min;Yang, Bo-Yin
臺大學術典藏 2020-05-04T07:56:35Z SPATE: small-group PKI-less authenticated trust establishment. Lin, Yue-Hsun; Studer, Ahren; Hsiao, Hsu-Chun; McCune, Jonathan M.; Wang, King-Hang; Krohn, Maxwell N.; Lin, Phen-Lan; Perrig, Adrian; Sun, Hung-Min; Yang, Bo-Yin; HSU-CHUN HSIAO; Lin, Yue-Hsun;Studer, Ahren;Hsiao, Hsu-Chun;McCune, Jonathan M.;Wang, King-Hang;Krohn, Maxwell N.;Lin, Phen-Lan;Perrig, Adrian;Sun, Hung-Min;Yang, Bo-Yin
臺大學術典藏 2020-05-04T07:56:34Z YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. Kim, Tiffany Hyun-Jin;Stuart, H. Colleen;Hsiao, Hsu-Chun;Lin, Yue-Hsun;Zhang, Leon;Dabbish, Laura;Kiesler, Sara B.; Kim, Tiffany Hyun-Jin; Stuart, H. Colleen; Hsiao, Hsu-Chun; Lin, Yue-Hsun; Zhang, Leon; Dabbish, Laura; Kiesler, Sara B.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:34Z Policy-based secure deletion. HSU-CHUN HSIAO; Sorniotti, Alessandro; Cachin, Christian;Haralambiev, Kristiyan;Hsiao, Hsu-Chun;Sorniotti, Alessandro; Cachin, Christian; Haralambiev, Kristiyan; Hsiao, Hsu-Chun
臺大學術典藏 2020-05-04T07:56:34Z Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region. Wu, Hao;Hsiao, Hsu-Chun;Hu, Yih-Chun; Wu, Hao; Hsiao, Hsu-Chun; Hu, Yih-Chun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:34Z STRIDE: sanctuary trail - refuge from internet DDoS entrapment. Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Yoo, Sangjae;Zhang, Xin;Lee, Soo Bum;Gligor, Virgil D.;Perrig, Adrian; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Yoo, Sangjae; Zhang, Xin; Lee, Soo Bum; Gligor, Virgil D.; Perrig, Adrian; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:34Z LAP: Lightweight Anonymity and Privacy. Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Perrig, Adrian; Yamada, Akira; Nelson, Samuel C.; Gruteser, Marco; Meng, Wei; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:33Z SandUSB: An installation-free sandbox for USB peripherals. Cheng, Shin-Ming; HSU-CHUN HSIAO; Loe, Edwin Lupito;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Lee, Shao-Chuan;Cheng, Shin-Ming; Loe, Edwin Lupito; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Lee, Shao-Chuan
臺大學術典藏 2020-05-04T07:56:33Z A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. Kung, Yi-Hsuan;Lee, Taeho;Tseng, Po-Ning;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Lee, Soo Bum;Lin, Yue-Hsun;Perrig, Adrian; Kung, Yi-Hsuan; Lee, Taeho; Tseng, Po-Ning; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; Lee, Soo Bum; Lin, Yue-Hsun; Perrig, Adrian; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:33Z Securing data planes in software-defined networks. Lee, Shao-Chuan; Hsiao, Hsu-Chun; HSU-CHUN HSIAO; Hsieh, Chen Jung; Chen, Jhu-Lin; Chao, Tzu-Wei; Ke, Yu-Ming; Chen, Bo-Han
臺大學術典藏 2020-05-04T07:56:33Z XIA: architecting a more trustworthy and evolvable internet. Naylor, David;Mukerjee, Matthew K.;Agyapong, Patrick;Grandl, Robert;Kang, Ruogu;Machado, Michel;Brown, Stephanie;Doucette, Cody;Hsiao, Hsu-Chun;Han, Dongsu;Kim, Tiffany Hyun-Jin;Lim, Hyeontaek;Ovon, Carol;Zhou, Dong;Lee, Soo Bum;Lin, Yue-Hsun;Stuart, H. Colleen;Barrett, Daniel Paul;Akella, Aditya;Andersen, David G.;Byers, John W.;Dabbish, Laura;Kaminsky, Michael;Kiesler, Sara B.;Peha, Jon M.;Perrig, Adrian;Seshan, Srinivasan;Sirbu, Marvin A.;Steenkiste, Peter; Naylor, David; Mukerjee, Matthew K.; Agyapong, Patrick; Grandl, Robert; Kang, Ruogu; Machado, Michel; Brown, Stephanie; Doucette, Cody; Hsiao, Hsu-Chun; Han, Dongsu; Kim, Tiffany Hyun-Jin; Lim, Hyeontaek; Ovon, Carol; Zhou, Dong; Lee, Soo Bum; Lin, Yue-Hsun; Stuart, H. Colleen; Barrett, Daniel Paul; Akella, Aditya; Andersen, David G.; Byers, John W.; Dabbish, Laura; Kaminsky, Michael; Kiesler, Sara B.; Peha, Jon M.; Perrig, Adrian; Seshan, Srinivasan; Sirbu, Marvin A.; Steenkiste, Peter; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:32Z CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks. Ke, Yu-Ming;Chen, Chih-Wei;Hsiao, Hsu-Chun;Perrig, Adrian;Sekar, Vyas; Ke, Yu-Ming; Chen, Chih-Wei; Hsiao, Hsu-Chun; Perrig, Adrian; Sekar, Vyas; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:32Z Security Implications of Redirection Trail in Popular Websites Worldwide. HSU-CHUN HSIAO; Lin, Wei-Hsi; Kim, Tiffany Hyun-Jin; Jeng, Wei; Hsiao, Hsu-Chun; Chang, Li; Chang, Li;Hsiao, Hsu-Chun;Jeng, Wei;Kim, Tiffany Hyun-Jin;Lin, Wei-Hsi
臺大學術典藏 2020-05-04T07:56:32Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes. Yeh, Jia-Rung; Hsiao, Hsu-Chun; Pang, Ai-Chun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:32Z SIBRA: Scalable Internet Bandwidth Reservation Architecture. Basescu, Cristina;Reischuk, Raphael M.;Szalachowski, Pawel;Perrig, Adrian;Zhang, Yao;Hsiao, Hsu-Chun;Kubota, Ayumu;Urakawa, Jumpei; Basescu, Cristina; Reischuk, Raphael M.; Szalachowski, Pawel; Perrig, Adrian; Zhang, Yao; Hsiao, Hsu-Chun; Kubota, Ayumu; Urakawa, Jumpei; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:31Z DAMUP: Practical and privacy-aware cloud-based DDoS mitigation. Hsiao, Hsu-Chun; Wang, Hsin-Yi; Lin, Su-Chin;Huang, Po-Wei;Wang, Hsin-Yi;Hsiao, Hsu-Chun; Lin, Su-Chin; Huang, Po-Wei; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:31Z Dynamic Path Pruning in Symbolic Execution. Chen, Ying-Shen; Chen, Wei-Ning; Wu, Che-Yu; Hsiao, Hsu-Chun; Huang, Shih-Kun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:31Z SDNProbe: Lightweight Fault Localization in the Error-Prone Environment. Ke, Yu-Ming;Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin; Ke, Yu-Ming; Hsiao, Hsu-Chun; Kim, Tiffany Hyun-Jin; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:30Z On the Feasibility of Rerouting-Based DDoS Defenses. HSU-CHUN HSIAO; Wang, Yu-Su; Tung, Shu-Po; Chiang, Wei-Hsuan; Hsiao, Hsu-Chun; Tran, Muoi;Kang, Min Suk;Hsiao, Hsu-Chun;Chiang, Wei-Hsuan;Tung, Shu-Po;Wang, Yu-Su; Tran, Muoi; Kang, Min Suk
臺大學術典藏 2020-05-04T07:56:30Z An Investigation of Cyber Autonomy on Government Websites. HSU-CHUN HSIAO; Jeng, Wei; Kim, Tiffany Hyun-Jin; Ku, Yu-Ming; Chang, Chun-Ming; Chen, Hung-Fang; Chen, Yu-Jen; Wang, Chun-Wen; Hsiao, Hsu-Chun; Hsiao, Hsu-Chun;Kim, Tiffany Hyun-Jin;Ku, Yu-Ming;Chang, Chun-Ming;Chen, Hung-Fang;Chen, Yu-Jen;Wang, Chun-Wen;Jeng, Wei
臺大學術典藏 2020-05-04T07:56:30Z Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems Wang, P.S.;Lai, F.;Hsiao, H.-C.;Wu, J.-L.; Wang, P.S.; Lai, F.; Hsiao, H.-C.; Wu, J.-L.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:30Z CLEF: Limiting the Damage Caused by Large Flows in the Internet Core. Wu, Hao; Hsiao, Hsu-Chun; Asoni, Daniele Enrico; Scherrer, Simon; Perrig, Adrian; Hu, Yih-Chun; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z Securing data planes in software-defined networks Chao, T.-W.;Ke, Y.-M.;Chen, B.-H.;Chen, J.-L.;Hsieh, C.J.;Lee, S.-C.;Hsiao, H.-C.; Chao, T.-W.; Ke, Y.-M.; Chen, B.-H.; Chen, J.-L.; Hsieh, C.J.; Lee, S.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z Decapitation via digital epidemics: A bio-inspired transmissive attack Chen, P.-Y.; Lin, C.-C.; Cheng, S.-M.; Hsiao, H.-C.; Huang, C.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks Ke, Y.-M.;Chen, C.-W.;Hsiao, H.-C.;Perrig, A.;Sekar, V.; Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; Sekar, V.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z A secure authorization system in PHR based on CP-ABE Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; Lai, F.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z CLEF: Limiting the damage caused by large flows in the internet core Wu, H.; Hsiao, H.-C.; Asoni, D.E.; Scherrer, S.; Perrig, A.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Traffic-aware patching for cyber security in mobile IoT Cheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z SandUSB: An installation-free sandbox for USB peripherals Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; Cheng, S.-M.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes Yeh, J.-R.;Hsiao, H.-C.;Pang, A.-C.; Yeh, J.-R.; Hsiao, H.-C.; Pang, A.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z GroupIt: Lightweight Group Key Management for Dynamic IoT Environments Kung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z SDNProbe: Lightweight fault localization in the error-prone environment Ke, Y.-M.; Hsiao, H.-C.; Kim, T.H.-J.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z DAMUP: Practical and privacy-aware cloud-based DDoS mitigation Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z A generic web application testing and attack data generation method Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z SafeChain: Securing Trigger-Action Programming from Attack Chains Hsu, K.-H.;Chiang, Y.-H.;Hsiao, H.-C.; Hsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z An investigation of cyber autonomy on government websites Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; HSU-CHUN HSIAO; Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F.
臺大學術典藏 2020-05-04T07:56:26Z On the Feasibility of Rerouting-Based DDoS Defenses Tran, M.;Kang, M.S.;Hsiao, H.-C.;Chiang, W.-H.;Tung, S.-P.;Wang, Y.-S.; Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; Wang, Y.-S.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z Dynamic Path Pruning in Symbolic Execution Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO; Wu, C.-Y.; Chen, W.-N.; Chen, Y.-S.; Chen, Y.-S.;Chen, W.-N.;Wu, C.-Y.;Hsiao, H.-C.;Huang, S.-K.
臺大學術典藏 2018-09-10T14:53:25Z Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region Wu, H.;Hsiao, H.-C.;Hu, Y.-C.; Wu, H.; Hsiao, H.-C.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z STRIDE: Sanctuary trail - Refuge from internet DDoS entrapment Hsiao, H.-C.;Kim, T.H.-J.;Yoo, S.;Zhang, X.;Lee, S.B.;Gligor, V.;Perrig, A.; Hsiao, H.-C.; Kim, T.H.-J.; Yoo, S.; Zhang, X.; Lee, S.B.; Gligor, V.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z Policy-based secure deletion Cachin, C.;Haralambiev, K.;Hsiao, H.-C.;Sorniotti, A.; Cachin, C.; Haralambiev, K.; Hsiao, H.-C.; Sorniotti, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:17:17Z LAP: Lightweight anonymity and privacy Hsiao, H.-C.; Kim, T.H.-J.; Perrig, A.; Yamada, A.; Nelson, S.C.; Gruteser, M.; Meng, W.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:51Z Efficient and secure threshold-based event validation for VANETs Hsiao, H.-C.;Studer, A.;Dubey, R.;Shi, E.;Perrig, A.; Hsiao, H.-C.; Studer, A.; Dubey, R.; Shi, E.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:50Z SCION: Scalability, control, and isolation on next-generation networks Zhang, X.;Hsiao, H.-C.;Hasker, G.;Chan, H.;Perrig, A.;ersen, D.G.; Zhang, X.; Hsiao, H.-C.; Hasker, G.; Chan, H.; Perrig, A.; ersen, D.G.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:50Z Flooding-resilient broadcast authentication for VANETs Hsiao, H.-C.;Studer, A.;Chen, C.;Perrig, A.;Bai, F.;Bellur, B.;Iyer, A.; Hsiao, H.-C.; Studer, A.; Chen, C.; Perrig, A.; Bai, F.; Bellur, B.; Iyer, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:08:26Z Secure distributed data aggregation Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T07:27:22Z A study of user-friendly hash comparison schemes Hsiao, H.-C.;Lin, Y.-H.;Studer, A.;Studer, C.;Wang, K.-H.;Kikuchi, H.;Perrig, A.;Sun, H.-M.;Yang, B.-Y.; Hsiao, H.-C.; Lin, Y.-H.; Studer, A.; Studer, C.; Wang, K.-H.; Kikuchi, H.; Perrig, A.; Sun, H.-M.; Yang, B.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T07:27:21Z SPATE: Small-group PKI-less authenticated trust establishment Lin, Y.-H.;Studer, A.;Hsiao, H.-C.;McCune, J.M.;Wang, K.-H.;Krohn, M.;Lin, P.-L.;Perrig, A.;Sun, H.-M.;Yang, B.-Y.; Lin, Y.-H.; Studer, A.; Hsiao, H.-C.; McCune, J.M.; Wang, K.-H.; Krohn, M.; Lin, P.-L.; Perrig, A.; Sun, H.-M.; Yang, B.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T06:35:01Z A Survey of Secure Data Aggregation on Sensor Networks Yu-Shian Chen; Hsu-Chun Hsiao; Chin-Laung Lei; CHIN-LAUNG LEI

Showing items 6-55 of 57  (2 Page(s) Totally)
1 2 > >>
View [10|25|50] records per page