HSIEH, Wen-Shyong
411  Ergebnisse:
Personensuche X
?
2

Mutual trust method for forwarding information in wireless ..:

Lin, Chih-Hsueh ; Huang, Yu-Hsiu ; Yein, Alan Dahgwo...
Advances in Mechanical Engineering.  8 (2016)  4 - p. 168781401664238 , 2016
 
?
4

Image Authentication and Recovery through Optimal Selection..:

CHEN, Chun-Hung ; TANG, Yuan-Liang ; HSIEH, Wen-Shyong
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E98.A (2015)  5 - p. 1126-1129 , 2015
 
?
 
?
6

Secure Access Control Method for Wireless Sensor Networks:

Chen, Cheng-Yeh ; Yein, Alan Dahgwo ; Hsu, Te-Cheng..
International Journal of Distributed Sensor Networks.  11 (2015)  7 - p. 261906 , 2015
 
?
7

A robust watermarking technique based on the polarity relat..:

, In: 2015 IEEE 12th International Conference on Networking, Sensing and Control,
 
?
10

Using BDH for the Message Authentication in VANET:

Huang, Mei-Wen ; Wu, Hsin-Te ; Horng, Gwo-Jiun.
Mathematical Problems in Engineering.  2014 (2014)  - p. 1-13 , 2014
 
?
11

Print-and-Scan Resilient Watermarking through Polarizing DC..:

CHEN, Chun-Hung ; TANG, Yuan-Liang ; HSIEH, Wen-Shyong
IEICE Transactions on Information and Systems.  E96.D (2013)  10 - p. 2208-2214 , 2013
 
?
12

Threshold behavior of multi-path random key pre-distributio..:

Li, Wei-Shuo ; Tsai, Chun-Wei ; Chen, Min..
Mathematical and Computer Modelling.  57 (2013)  11-12 - p. 2776-2787 , 2013
 
?
13

Aggregation Scheme with Secure Hierarchical Clustering for ..:

Su, Tung-Shih ; Huang, Mei-Wen ; Li, Wei-Shou.
International Journal of Distributed Sensor Networks.  8 (2012)  7 - p. 162347 , 2012
 
?
14

RSU-based message authentication for vehicular ad-hoc netwo..:

Wu, Hsin-Te ; Hsieh, Wen-Shyong
Multimedia Tools and Applications.  66 (2011)  2 - p. 215-227 , 2011
 
?
15

Mining regression rules and regression trees:

, In: Research and Development in Knowledge Discovery and Data Mining; Lecture Notes in Computer Science,
 
1-15