Seguir
Hsu-Chun Hsiao
Hsu-Chun Hsiao
Dirección de correo verificada de csie.ntu.edu.tw - Página principal
Título
Citado por
Citado por
Año
SCION: Scalability, control, and isolation on next-generation networks
X Zhang, HC Hsiao, G Hasker, H Chan, A Perrig, DG Andersen
2011 IEEE Symposium on Security and Privacy, 212-227, 2011
2462011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1262009
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
1212011
LAP: Lightweight anonymity and privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
2012 IEEE Symposium on Security and Privacy, 506-520, 2012
1062012
Policy-based secure deletion
C Cachin, K Haralambiev, HC Hsiao, A Sorniotti
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
842013
SIBRA: Scalable internet bandwidth reservation architecture
C Basescu, RM Reischuk, P Szalachowski, A Perrig, Y Zhang, HC Hsiao, ...
arXiv preprint arXiv:1510.02696, 2015
832015
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
752014
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
712009
Traffic-aware patching for cyber security in mobile IoT
SM Cheng, PY Chen, CC Lin, HC Hsiao
IEEE Communications Magazine 55 (7), 29-35, 2017
632017
Computing device to detect malware
H Hsiao, D Shuo, B Salamat, R Gupta, SM Das
US Patent 9,832,211, 2017
612017
GroupIt: Lightweight group key management for dynamic IoT environments
YH Kung, HC Hsiao
IEEE Internet of Things Journal 5 (6), 5155-5165, 2018
542018
Instrim: Lightweight instrumentation for coverage-guided fuzzing
CC Hsu, CY Wu, HC Hsiao, SK Huang
Symposium on Network and Distributed System Security (NDSS), Workshop on …, 2018
522018
Securing data planes in software-defined networks
TW Chao, YM Ke, BH Chen, JL Chen, CJ Hsieh, SC Lee, HC Hsiao
2016 IEEE NetSoft Conference and Workshops (NetSoft), 465-470, 2016
472016
Safechain: Securing trigger-action programming from attack chains
KH Hsu, YH Chiang, HC Hsiao
IEEE Transactions on Information Forensics and Security 14 (10), 2607-2622, 2019
462019
Efficient and secure threshold-based event validation for VANETs
HC Hsiao, A Studer, R Dubey, E Shi, A Perrig
Proceedings of the fourth ACM conference on Wireless network security, 163-174, 2011
422011
On the feasibility of rerouting-based DDoS defenses
M Tran, MS Kang, HC Hsiao, WH Chiang, SP Tung, YS Wang
2019 IEEE Symposium on Security and Privacy (SP), 1169-1184, 2019
412019
Shortmac: efficient data-plane fault localization.
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
NDSS, 2012
372012
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
312013
Computing device to detect malware
H Hsiao, D Shuo, B Salamat, R Gupta, SM Das
US Patent 9,973,517, 2018
292018
Cicadas: Congesting the internet with coordinated and decentralized pulsating attacks
YM Ke, CW Chen, HC Hsiao, A Perrig, V Sekar
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
262016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20