English  |  正體中文  |  简体中文  |  總筆數 :0  
造訪人次 :  52643190    線上人數 :  899
教育部委託研究計畫      計畫執行:國立臺灣大學圖書館
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
關於TAIR

瀏覽

消息

著作權

相關連結

"hsu chun hsiao"的相關文件

回到依作者瀏覽
依題名排序 依日期排序

顯示項目 31-55 / 57 (共3頁)
<< < 1 2 3 > >>
每頁顯示[10|25|50]項目

機構 日期 題名 作者
臺大學術典藏 2020-05-04T07:56:29Z CICADAS: Congesting the internet with coordinated and decentralized pulsating attacks Ke, Y.-M.;Chen, C.-W.;Hsiao, H.-C.;Perrig, A.;Sekar, V.; Ke, Y.-M.; Chen, C.-W.; Hsiao, H.-C.; Perrig, A.; Sekar, V.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:29Z A secure authorization system in PHR based on CP-ABE Chung, H.H.; Wang, P.S.; Ho, T.-W.; Hsiao, H.-C.; Lai, F.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z CLEF: Limiting the damage caused by large flows in the internet core Wu, H.; Hsiao, H.-C.; Asoni, D.E.; Scherrer, S.; Perrig, A.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Traffic-aware patching for cyber security in mobile IoT Cheng, S.-M.; Chen, P.-Y.; Lin, C.-C.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z SandUSB: An installation-free sandbox for USB peripherals Loe, E.L.; Hsiao, H.-C.; Kim, T.H.-J.; Lee, S.-C.; Cheng, S.-M.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:28Z Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes Yeh, J.-R.;Hsiao, H.-C.;Pang, A.-C.; Yeh, J.-R.; Hsiao, H.-C.; Pang, A.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z GroupIt: Lightweight Group Key Management for Dynamic IoT Environments Kung, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z SDNProbe: Lightweight fault localization in the error-prone environment Ke, Y.-M.; Hsiao, H.-C.; Kim, T.H.-J.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z DAMUP: Practical and privacy-aware cloud-based DDoS mitigation Lin, S.-C.; Huang, P.-W.; Wang, H.-Y.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:27Z A generic web application testing and attack data generation method Shih, H.-Y.; Lu, H.-L.; Yeh, C.-C.; Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z SafeChain: Securing Trigger-Action Programming from Attack Chains Hsu, K.-H.;Chiang, Y.-H.;Hsiao, H.-C.; Hsu, K.-H.; Chiang, Y.-H.; Hsiao, H.-C.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z An investigation of cyber autonomy on government websites Ku, Y.-M.; Chen, Y.-J.; Wang, C.-W.; Jeng, W.; HSU-CHUN HSIAO; Hsiao, H.-C.;Chang, C.-M.;Kim, T.H.-J.;Chen, H.-F.;Ku, Y.-M.;Chen, Y.-J.;Wang, C.-W.;Jeng, W.; Hsiao, H.-C.; Chang, C.-M.; Kim, T.H.-J.; Chen, H.-F.
臺大學術典藏 2020-05-04T07:56:26Z On the Feasibility of Rerouting-Based DDoS Defenses Tran, M.;Kang, M.S.;Hsiao, H.-C.;Chiang, W.-H.;Tung, S.-P.;Wang, Y.-S.; Tran, M.; Kang, M.S.; Hsiao, H.-C.; Chiang, W.-H.; Tung, S.-P.; Wang, Y.-S.; HSU-CHUN HSIAO
臺大學術典藏 2020-05-04T07:56:26Z Dynamic Path Pruning in Symbolic Execution Hsiao, H.-C.; Huang, S.-K.; HSU-CHUN HSIAO; Wu, C.-Y.; Chen, W.-N.; Chen, Y.-S.; Chen, Y.-S.;Chen, W.-N.;Wu, C.-Y.;Hsiao, H.-C.;Huang, S.-K.
臺大學術典藏 2018-09-10T14:53:25Z Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region Wu, H.;Hsiao, H.-C.;Hu, Y.-C.; Wu, H.; Hsiao, H.-C.; Hu, Y.-C.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z STRIDE: Sanctuary trail - Refuge from internet DDoS entrapment Hsiao, H.-C.;Kim, T.H.-J.;Yoo, S.;Zhang, X.;Lee, S.B.;Gligor, V.;Perrig, A.; Hsiao, H.-C.; Kim, T.H.-J.; Yoo, S.; Zhang, X.; Lee, S.B.; Gligor, V.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:43:21Z Policy-based secure deletion Cachin, C.;Haralambiev, K.;Hsiao, H.-C.;Sorniotti, A.; Cachin, C.; Haralambiev, K.; Hsiao, H.-C.; Sorniotti, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T09:17:17Z LAP: Lightweight anonymity and privacy Hsiao, H.-C.; Kim, T.H.-J.; Perrig, A.; Yamada, A.; Nelson, S.C.; Gruteser, M.; Meng, W.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:51Z Efficient and secure threshold-based event validation for VANETs Hsiao, H.-C.;Studer, A.;Dubey, R.;Shi, E.;Perrig, A.; Hsiao, H.-C.; Studer, A.; Dubey, R.; Shi, E.; Perrig, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:50Z SCION: Scalability, control, and isolation on next-generation networks Zhang, X.;Hsiao, H.-C.;Hasker, G.;Chan, H.;Perrig, A.;ersen, D.G.; Zhang, X.; Hsiao, H.-C.; Hasker, G.; Chan, H.; Perrig, A.; ersen, D.G.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:34:50Z Flooding-resilient broadcast authentication for VANETs Hsiao, H.-C.;Studer, A.;Chen, C.;Perrig, A.;Bai, F.;Bellur, B.;Iyer, A.; Hsiao, H.-C.; Studer, A.; Chen, C.; Perrig, A.; Bai, F.; Bellur, B.; Iyer, A.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T08:08:26Z Secure distributed data aggregation Chan, H.;Hsiao, H.-C.;Perrig, A.;Song, D.; Chan, H.; Hsiao, H.-C.; Perrig, A.; Song, D.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T07:27:22Z A study of user-friendly hash comparison schemes Hsiao, H.-C.;Lin, Y.-H.;Studer, A.;Studer, C.;Wang, K.-H.;Kikuchi, H.;Perrig, A.;Sun, H.-M.;Yang, B.-Y.; Hsiao, H.-C.; Lin, Y.-H.; Studer, A.; Studer, C.; Wang, K.-H.; Kikuchi, H.; Perrig, A.; Sun, H.-M.; Yang, B.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T07:27:21Z SPATE: Small-group PKI-less authenticated trust establishment Lin, Y.-H.;Studer, A.;Hsiao, H.-C.;McCune, J.M.;Wang, K.-H.;Krohn, M.;Lin, P.-L.;Perrig, A.;Sun, H.-M.;Yang, B.-Y.; Lin, Y.-H.; Studer, A.; Hsiao, H.-C.; McCune, J.M.; Wang, K.-H.; Krohn, M.; Lin, P.-L.; Perrig, A.; Sun, H.-M.; Yang, B.-Y.; HSU-CHUN HSIAO
臺大學術典藏 2018-09-10T06:35:01Z A Survey of Secure Data Aggregation on Sensor Networks Yu-Shian Chen; Hsu-Chun Hsiao; Chin-Laung Lei; CHIN-LAUNG LEI

顯示項目 31-55 / 57 (共3頁)
<< < 1 2 3 > >>
每頁顯示[10|25|50]項目