公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
---|---|---|---|---|---|---|
2009 | A constrained Function Based Message Authentication Scheme for Sensor Networks | C. M. Yu; C. H. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Wireless Communications and networking Conference | 3 | 0 | |
2009 | A DoS-Resilient En-route Filtering Scheme for Sensor Networks | C. M. Yu; C. H. Lu; S. Y. Kuo; SY-YEN KUO | Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'09) | 6 | 0 | |
2005 | A Secure Quantum Communication Protocol using Insecure Public Channels | I. M. Tsai; C. M. Yu; W. T. Tu; S. Y. Kuo; SY-YEN KUO | 20th International Information Security Conference(SEC’05) | 2 | 0 | |
2009 | A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks | C. M. Yu; C. H. Lu; S. Y. Kuo; SY-YEN KUO | Sixth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2009) | 11 | 0 | |
2018 | Abnormal-node Detection Based on Spatio-temporal and Multivariate-attribute Correlation in Wireless Sensor Networks | N. Berjab; H. H. Le; C. M. Yu; S. Y. Kuo; H. Yokota; SY-YEN KUO | 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018) | 6 | 0 | |
2011 | An Application-Driven Attack Probability-Based Deterministic Pairwise Key Pre-distribution Scheme for Non-Uniformly Deployed Sensor Networks | C. M. Yu; C. C. Li; C. S. Lu; D. T. Lee; S. Y. Kuo; SY-YEN KUO | International Journal of Sensor Networks (IJSNet) | 16 | 13 | |
2007 | Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment | C. M. Yu; C. C. Li; C. S. Lu; D. T. Lee; S. Y. Kuo; SY-YEN KUO | Fourth Workshop on Wireless Ad hoc and Sensor Networks (WWASN2007) | 5 | 0 | |
2016 | Compressed Sensing-Based Clone Identification in Sensor Networks | C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Wireless Communications | 17 | 12 | |
2011 | Constrained Function Based Message Authentication for Sensor Networks | C. M. Yu; Y. D. Tsou; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 21 | 12 | |
2009 | Efficient and Distributed Detection of Node Replication Attacks in Mobile Sensor Networks | C. M. Yu; C. H. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Vehicular Technology Conference (VTC 2009-Fall) | 41 | 0 | |
2007 | Habitual Behavior-Based Opportunistic Data Forwarding in Wildlife Tracking | C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO | 4th IEEE International Symposium on Wireless Communication Systems (ISWCS'07) | 3 | 0 | |
2017 | Impact Analysis for Dos and Integrity Attacks on IoT Systems | N. Berjab; C. M. Yu; S. Y. Kuo; H. Yokota; SY-YEN KUO | 2017 7th International Conference on Information Systems and Technologies (ICIST-2017) | |||
2007 | Improving the Network Flow Problem using Quantum Search | C. M. Yu; I. M. Tsai; Y. H. Chou; Sy-Yen Kuo; SY-YEN KUO | 2007 IEEE Conference on Nanotechnology (IEEE-NANO 2007) | 2 | 0 | |
2009 | Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning | C. Y. Chen; Y. S. Liang; C. M. Yu; C. H. Ho; S. Y. Kuo; SY-YEN KUO | 2009 Pacific Rim International Symposium on Dependable Computing (PRDC'09) | |||
2017 | Key Management in Internet of Things via Kronecker Product | I. C. Tsai; C. M. Yu; H. Yokota; S. Y. Kuo; SY-YEN KUO | 2017 Pacific Rim International Symposium on Dependable Computing (PRDC'17) | 19 | 0 | |
2013 | Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks | C. M. Yu; Y. T. Tsou; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 34 | 27 | |
2012 | Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks | C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE PerCom Workshop (IEEE International Workshop on Sensor Networks and Systems for Pervasive Computing) | 34 | 27 | |
2015 | Locating Stuck-at Error in Quantum Boolean Circuits | T. H. Chang; C. M. Yu; W. H. Chung; S. Y. Kuo; SY-YEN KUO | 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2015) | |||
2010 | Non-Interactive Pairwise Key Establishment for Sensor Networks | C. M. Yu; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 39 | 28 | |
2011 | Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks | C. M. Yu; Y. T. Tsou; C. S. Lu; S. Y. Kuo; SY-YEN KUO | IEEE Transactions on Information Forensics and Security | 33 | 27 |