BibTeX records: Shu-Fen Chiou

download as .bib file

@article{DBLP:journals/ijnsec/ChiouPCH19,
  author    = {Shu{-}Fen Chiou and
               Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of the Mutual Authentication and Key Agreement Protocol
               with Smart Cards for Wireless Communications},
  journal   = {Int. J. Netw. Secur.},
  volume    = {21},
  number    = {1},
  pages     = {100--104},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n1/ijns-2019-v21-n1-p100-104.pdf},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/ChiouPCH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PanCCH19,
  author    = {Hsieh{-}Tsen Pan and
               Eko Fajar Cahyadi and
               Shu{-}Fen Chiou and
               Min{-}Shiang Hwang},
  title     = {Research on Batch Verification Schemes for Identifying Illegal Signatures},
  journal   = {Int. J. Netw. Secur.},
  volume    = {21},
  number    = {6},
  pages     = {1062--1070},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n6/ijns-2019-v21-n6-p1062-1070.pdf},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/PanCCH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiaiaai/ShiehCCLLL15,
  author    = {Shu{-}Ling Shieh and
               Shu{-}Fen Chiou and
               Wen{-}Fang Cheng and
               Bo{-}Long Lin and
               Jian{-}Yi Li and
               Ying{-}Chang Lai},
  title     = {Application of Fuzzy Method to Solve the Use of Electrical Energy-Saving},
  booktitle = {{IIAI} 4th International Congress on Advanced Applied Informatics,
               {IIAI-AAI} 2015, Okayama, Japan, July 12-16, 2015},
  pages     = {433--436},
  year      = {2015},
  crossref  = {DBLP:conf/iiaiaai/2015},
  url       = {https://doi.org/10.1109/IIAI-AAI.2015.206},
  doi       = {10.1109/IIAI-AAI.2015.206},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/iiaiaai/ShiehCCLLL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcs2/ShiehCHY13,
  author    = {Shu{-}Ling Shieh and
               Shu{-}Fen Chiou and
               Gwo{-}Haur Hwang and
               Ying{-}Chi Yeh},
  title     = {Applying Cluster Techniques of Data Mining to Analysis the Game-Based
               Digital Learning Work},
  booktitle = {Information Technology Convergence - Security, Robotics, Automations
               and Communication, 5th International Conference on Information Technology
               Convergence and Services, {ITCS} 2013, Fukuoka, Japan, July 8-10,
               2013},
  pages     = {461--467},
  year      = {2013},
  crossref  = {DBLP:conf/itcs2/2013},
  url       = {https://doi.org/10.1007/978-94-007-6996-0\_48},
  doi       = {10.1007/978-94-007-6996-0\_48},
  timestamp = {Wed, 09 Jan 2019 10:47:29 +0100},
  biburl    = {https://dblp.org/rec/conf/itcs2/ShiehCHY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Ordered Multi-proxy Multi-signature Scheme},
  booktitle = {Eighth International Conference on Intelligent Systems Design and
               Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
               3 Volumes},
  pages     = {308--313},
  year      = {2008},
  crossref  = {DBLP:conf/isda/2008},
  url       = {https://doi.org/10.1109/ISDA.2008.189},
  doi       = {10.1109/ISDA.2008.189},
  timestamp = {Wed, 01 Apr 2020 17:00:41 +0200},
  biburl    = {https://dblp.org/rec/conf/isda/HwangTC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  pages     = {95--98},
  year      = {2008},
  crossref  = {DBLP:conf/secrypt/2008},
  timestamp = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl    = {https://dblp.org/rec/conf/secrypt/HwangTC08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WuLC05,
  author    = {Hsien{-}Chu Wu and
               Chi{-}Yu Liu and
               Shu{-}Fen Chiou},
  title     = {Cryptanalysis of a Secure One-time Password Authentication Scheme
               with Low-communication for Mobile Communications},
  journal   = {Int. J. Netw. Secur.},
  volume    = {1},
  number    = {2},
  pages     = {74--76},
  year      = {2005},
  url       = {http://ijns.femto.com.tw/contents/ijns-v1-n2/ijns-2005-v1-n2-p74-76.pdf},
  timestamp = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijnsec/WuLC05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iiaiaai/2015,
  title     = {{IIAI} 4th International Congress on Advanced Applied Informatics,
               {IIAI-AAI} 2015, Okayama, Japan, July 12-16, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7373771/proceeding},
  isbn      = {978-1-4799-9957-6},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/iiaiaai/2015.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itcs2/2013,
  editor    = {James Jong Hyuk Park and
               Leonard Barolli and
               Fatos Xhafa and
               Hwa{-}Young Jeong},
  title     = {Information Technology Convergence - Security, Robotics, Automations
               and Communication, 5th International Conference on Information Technology
               Convergence and Services, {ITCS} 2013, Fukuoka, Japan, July 8-10,
               2013},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {253},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-94-007-6996-0},
  doi       = {10.1007/978-94-007-6996-0},
  isbn      = {978-94-007-6995-3},
  timestamp = {Wed, 09 Jan 2019 10:47:29 +0100},
  biburl    = {https://dblp.org/rec/conf/itcs2/2013.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isda/2008,
  editor    = {Jeng{-}Shyang Pan and
               Ajith Abraham and
               Chin{-}Chen Chang},
  title     = {Eighth International Conference on Intelligent Systems Design and
               Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
               3 Volumes},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4696158/proceeding},
  isbn      = {978-0-7695-3382-7},
  timestamp = {Wed, 01 Apr 2020 17:00:41 +0200},
  biburl    = {https://dblp.org/rec/conf/isda/2008.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2008,
  editor    = {Eduardo Fern{\'{a}}ndez{-}Medina and
               Manu Malek and
               Javier Hernando},
  title     = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2008},
  isbn      = {978-989-8111-59-3},
  timestamp = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl    = {https://dblp.org/rec/conf/secrypt/2008.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics