Search results for: Wen-Shenq Juang
Lecture Notes in Computer Science > Concurrency and Parallelism, Programming, Networking, and Security > 172-181
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications/Virus Protection > 15-29
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Ubiquitous Application and Security Service (UASS 2006) > 396-405
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 728-744
Journal of Shanghai Jiaotong University (Science) > 2014 > 19 > 4 > 443-447
Journal of Computer and System Sciences > 2011 > 77 > 4 > 790-798
Computer Communications > 2011 > 34 > 3 > 274-280
2010 International Computer Symposium (ICS2010) > 279 - 283
2010 International Computer Symposium (ICS2010) > 294 - 299
2010 International Computer Symposium (ICS2010) > 288 - 293
The Journal of Systems & Software > 2010 > 83 > 4 > 638-645
IEEE Communications Letters > 2009 > 13 > 2 > 157 - 159
Computers and Electrical Engineering > 2009 > 35 > 1 > 33-40
Mathematical and Computer Modelling > 2008 > 47 > 11-12 > 1238-1245