Shyh-Chang Tsaur

According to our database1, Shyh-Chang Tsaur authored at least 12 papers between 2009 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms.
Int. J. Netw. Secur., 2017

2016
Cryptanalysis of an efficient password authentication scheme.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

Cryptanalysis of Efficient Dynamic ID Based Remote User Authentication Scheme in Multi-Server Environment Using Smart Card.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2011
Implementation of a distributed file storage with replica management in Peer-to-Peer environments.
Int. J. Ad Hoc Ubiquitous Comput., 2011

A Dynamic Join-leave Multi-purpose Scheme for RFID Infrastructure.
Proceedings of the PECCS 2011, 2011

HB Family RFID Mutual Authentication Protocol.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2010
Resampling Halftone Images Using Interpolation and Error-Diffusion.
Comput. J., 2010

A Xen-Based Paravirtualization System toward Efficient High Performance Computing Environments.
Proceedings of the Methods and Tools of Parallel Programming Multicomputers, 2010

2009
Implementation of a Distributed File Storage on Peer-to-Peer Environments.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

A Virtualized HPC Cluster Computing Environment on Xen with Web-Based User Interface.
Proceedings of the High Performance Computing and Applications, 2009

An Automated Image-Based Cell Counter.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

A Distributed File Storage with Replica Management in Peer-to-Peer Environments.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009


  Loading...