BibTeX records: Shu-Fen Chiou

download as .bib file

@article{DBLP:journals/ijnsec/ChiouPCH19,
  author    = {Shu{-}Fen Chiou and
               Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of the Mutual Authentication and Key Agreement Protocol
               with Smart Cards for Wireless Communications},
  journal   = {Int. J. Netw. Secur.},
  volume    = {21},
  number    = {1},
  pages     = {100--104},
  year      = {2019}
}
@article{DBLP:journals/ijnsec/PanCCH19,
  author    = {Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Shu{-}Fen Chiou and
               Min{-}Shiang Hwang},
  title     = {Research on Batch Verification Schemes for Identifying Illegal Signatures},
  journal   = {Int. J. Netw. Secur.},
  volume    = {21},
  number    = {6},
  pages     = {1062--1070},
  year      = {2019}
}
@inproceedings{DBLP:conf/iiaiaai/ShiehCCLLL15,
  author    = {Shu{-}Ling Shieh and
               Shu{-}Fen Chiou and
               Wen{-}Fang Cheng and
               Bo{-}Long Lin and
               Jian{-}Yi Li and
               Ying{-}Chang Lai},
  title     = {Application of Fuzzy Method to Solve the Use of Electrical Energy-Saving},
  booktitle = {{IIAI-AAI}},
  pages     = {433--436},
  publisher = {{IEEE} Computer Society},
  year      = {2015}
}
@inproceedings{DBLP:conf/itcs2/ShiehCHY13,
  author    = {Shu{-}Ling Shieh and
               Shu{-}Fen Chiou and
               Gwo{-}Haur Hwang and
               Ying{-}Chi Yeh},
  title     = {Applying Cluster Techniques of Data Mining to Analysis the Game-Based
               Digital Learning Work},
  booktitle = {{ITCS}},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {253},
  pages     = {461--467},
  publisher = {Springer},
  year      = {2013}
}
@inproceedings{DBLP:conf/isda/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Ordered Multi-proxy Multi-signature Scheme},
  booktitle = {{ISDA} {(3)}},
  pages     = {308--313},
  publisher = {{IEEE} Computer Society},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle = {{SECRYPT}},
  pages     = {95--98},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@article{DBLP:journals/ijnsec/WuLC05,
  author    = {Hsien{-}Chu Wu and
               Chi{-}Yu Liu and
               Shu{-}Fen Chiou},
  title     = {Cryptanalysis of a Secure One-time Password Authentication Scheme
               with Low-communication for Mobile Communications},
  journal   = {Int. J. Netw. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {74--76},
  year      = {2005}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics