Search

Your search keyword '"Chen, Hsing-Chung"' showing total 44 results

Search Constraints

Start Over You searched for: Author "Chen, Hsing-Chung" Remove constraint Author: "Chen, Hsing-Chung" Publisher springer singapore Remove constraint Publisher: springer singapore
44 results on '"Chen, Hsing-Chung"'

Search Results

1. A Frame-Based Approach to Generating Insider Threat Test Suite on Cloud File-Sharing

2. Performance of Sub-optimal Searching Algorithms on PTS Phase Selections for PAPR Reduction

3. A Secure Color-Code Key Exchange Protocol for Mobile Chat Application

4. Performance on Clustering Routing for Naturally Deployed Wireless Sensor Networks

5. A Generalized Data Inconsistency Detection Model for Wireless Sensor Networks

11. Reduction of Data Leakage Using Software Streaming

16. Adaptive Touch Interface: Application for Mobile Internet Security

17. Role Mining: Survey and Suggestion on Role Mining in Access Control

19. Aggregate Authentication for Massive Internet of Things in 5G Networks

21. Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies

22. Voronoi Maps for Planar Sensor Networks Visualization

23. Using iBeacon Technology with Nearest Neighbor Algorithm to Area Positioning Systems

24. Steganalysis Method for Detecting Embedded Coefficients of Discrete-Wavelet Image Transformation into High-Frequency Domains

25. Method for Predicting Pixel Values in Background Areas in the Problem of Weighted Steganalysis in the Spatial Domain of Natural Images Under Small Payloads

26. FAIR-Based Cyber Influence Damage Assessment for Exploit in Mobile Device

27. SAAS: A Secure Anonymous Authentication Scheme for PMIPv6

28. Generating Dynamic Box by Using an Input String

29. Attack Detection in Mobile Internet and Networks Using the Graph-Based Schemes for Combining the Support Vector Machines

30. An SDN-Based Secure Mobility Model for UAV-Ground Communications

31. User Keystroke Authentication Based on Convolutional Neural Network

32. An Efficient Facebook Place Information Extraction Strategy

33. A Policy Management System Based on Multi-dimensional Attribution Label

34. An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components

35. A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication

36. Personal Identification Using Time and Frequency Domain Features of ECG Lead-I

37. Design and Implementation of SPEEX Speech Technology on ARM Processor

38. Building a Frame-Based Cyber Security Learning Game

39. Mobile Security Assurance for Automotive Software Through ArchiMate

40. Security Analysis Oriented Physical Components Modeling in Quantum Key Distribution

41. A Novel Hybrid Architecture for High Speed Regular Expression Matching

42. Access Control for Cross-Border Transfer of Sensor Data

43. The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs

44. Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion

Catalog

Books, media, physical & digital resources