Chih-Hao Shen

According to our database1, Chih-Hao Shen authored at least 10 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
An Information-Theoretic Approach for Secure Protocol Composition.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Fast Two-Party Secure Computation with Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2013

2012
Towards Billion-Gate Secure Computation with Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2012

Billion-Gate Secure Computation with Malicious Adversaries.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Two-Output Secure Computation with Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2011

Efficient Secure Computation with Garbled Circuits.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2009
Toward Empirical Aspects of Secure Scalar Product.
IEEE Trans. Syst. Man Cybern. Part C, 2009

An Empirical Study on Privacy and Secure Multi-party Computation Using Exponentiation.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Scalar-product based Secure Two-party Computation.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

2004
Fidelity-Controlled Robustness Enhancement of Blind Watermarking Schemes Using Evolutionary Computational Techniques.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004


  Loading...