BibTeX records: Song-Kong Chong

download as .bib file

@article{DBLP:journals/informaticaLT/HwangCO16,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {The Moderately Hard DoS-Resistant Authentication Protocol on Client
               Puzzles},
  journal   = {Informatica},
  volume    = {27},
  number    = {1},
  pages     = {31--48},
  year      = {2016},
  url       = {http://content.iospress.com/articles/informatica/inf1088},
  timestamp = {Tue, 26 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/informaticaLT/HwangCO16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WuLLC15,
  author    = {Jain{-}Shing Wu and
               Chih{-}Ta Lin and
               Yuh{-}Jye Lee and
               Song{-}Kong Chong},
  title     = {Keystroke and Mouse Movement Profiling for Data Loss Prevention},
  journal   = {J. Inf. Sci. Eng.},
  volume    = {31},
  number    = {1},
  pages     = {23--42},
  year      = {2015},
  url       = {http://www.iis.sinica.edu.tw/page/jise/2014/2015/201501\_02.html},
  timestamp = {Fri, 16 Jan 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jise/WuLLC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppl/ChongLH13,
  author    = {Song{-}Kong Chong and
               Cheng{-}Chi Lee and
               Min{-}Shiang Hwang},
  title     = {An Authentication Scheme for the Global Mobility Network},
  journal   = {Parallel Process. Lett.},
  volume    = {23},
  number    = {3},
  year      = {2013},
  url       = {https://doi.org/10.1142/S0129626413500096},
  doi       = {10.1142/S0129626413500096},
  timestamp = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ppl/ChongLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HsuCHT13,
  author    = {Jung{-}Lun Hsu and
               Song{-}Kong Chong and
               Tzonelih Hwang and
               Chia{-}Wei Tsai},
  title     = {Dynamic quantum secret sharing},
  journal   = {Quantum Inf. Process.},
  volume    = {12},
  number    = {1},
  pages     = {331--344},
  year      = {2013},
  url       = {https://doi.org/10.1007/s11128-012-0380-0},
  doi       = {10.1007/s11128-012-0380-0},
  timestamp = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/qip/HsuCHT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/taai/WuLCLH13,
  author    = {Jain{-}Shing Wu and
               Yuh{-}Jye Lee and
               Song{-}Kong Chong and
               Chih{-}Ta Lin and
               Jung{-}Lun Hsu},
  title     = {Key Stroke Profiling for Data Loss Prevention},
  booktitle = {Conference on Technologies and Applications of Artificial Intelligence,
               {TAAI} 2013, Taipei, Taiwan, December 6-8, 2013},
  pages     = {7--12},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://doi.org/10.1109/TAAI.2013.16},
  doi       = {10.1109/TAAI.2013.16},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/taai/WuLCLH13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/HwangCO11,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Hsia{-}Hung Ou},
  title     = {On the security of an enhanced {UMTS} authentication and key agreement
               protocol},
  journal   = {Eur. Trans. Telecommun.},
  volume    = {22},
  number    = {3},
  pages     = {99--112},
  year      = {2011},
  url       = {https://doi.org/10.1002/ett.1460},
  doi       = {10.1002/ett.1460},
  timestamp = {Mon, 18 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ett/HwangCO11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/HwangTC11,
  author    = {Tzonelih Hwang and
               Chia{-}Wei Tsai and
               Song{-}Kong Chong},
  title     = {Probabilistic quantum key distribution},
  journal   = {Quantum Inf. Comput.},
  volume    = {11},
  number    = {7{\&}8},
  pages     = {615--637},
  year      = {2011},
  url       = {http://www.rintonpress.com/xxqic11/qic-11-78/0615-0637.pdf},
  timestamp = {Mon, 25 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/qic/HwangTC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/HwangCC10,
  author    = {Min{-}Shiang Hwang and
               Song{-}Kong Chong and
               Te{-}Yu Chen},
  title     = {DoS-resistant ID-based password authentication scheme using smart
               cards},
  journal   = {J. Syst. Softw.},
  volume    = {83},
  number    = {1},
  pages     = {163--172},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jss.2009.07.050},
  doi       = {10.1016/j.jss.2009.07.050},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/jss/HwangCC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/LeeHCC09,
  author    = {Tian{-}Fu Lee and
               Tzonelih Hwang and
               Shu{-}Hui Chang and
               Song{-}Kong Chong},
  title     = {Enhanced delegation-based authentication protocol for PCSs},
  journal   = {{IEEE} Trans. Wireless Communications},
  volume    = {8},
  number    = {5},
  pages     = {2166--2171},
  year      = {2009},
  url       = {https://doi.org/10.1109/TWC.2009.070032},
  doi       = {10.1109/TWC.2009.070032},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/twc/LeeHCC09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/HwangLC08,
  author    = {Min{-}Shiang Hwang and
               Cheng{-}Chi Lee and
               Song{-}Kong Chong},
  title     = {An improved address ownership in mobile IPv6},
  journal   = {Comput. Commun.},
  volume    = {31},
  number    = {14},
  pages     = {3250--3252},
  year      = {2008},
  url       = {https://doi.org/10.1016/j.comcom.2008.05.011},
  doi       = {10.1016/j.comcom.2008.05.011},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/comcom/HwangLC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChongWW05,
  author    = {Song{-}Kong Chong and
               Hsien{-}Chu Wu and
               Chia{-}Chun Wu},
  title     = {A Scheme for Key Management on Alternate Temporal Key Hash},
  journal   = {I. J. Network Security},
  volume    = {1},
  number    = {1},
  pages     = {8--13},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n1/ijns-2005-v1-n1-p8-13.pdf},
  timestamp = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChongWW05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics