Author of the publication

IDR: An Intrusion Detection Router for Defending against Distributed Denial-of-Service (DDoS) Attacks.

, , , , , , , , , , , , , , , , , and . ISPAN, page 581-586. IEEE Computer Society, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security of Tseng-Jan's group signature schemes., , , , , and . Inf. Process. Lett., 75 (5): 187-189 (2000)Delegation of signing and decryption rights using pki proxy memo., , , , , , , and . IASTED Conf. on Software Engineering, page 281-285. IASTED/ACTA Press, (2004)Tuning the Collision Test for Power., , , , and . ACSC, volume 26 of CRPIT, page 23-30. Australian Computer Society, (2004)Engineering design of a mass random access plated wire memory., , and . AFIPS Fall Joint Computing Conference, volume 31 of AFIPS Conference Proceedings, page 363-370. AFIPS / ACM / Thomson Book Company, Washington D.C., (1967)An Efficient Bloom Filter Based Solution for Multiparty Private Matching., , , , and . Security and Management, page 286-292. CSREA Press, (2006)Separable and Anonymous Identity-Based Key Issuing., , , , , , , , and . ICPADS (2), page 275-279. IEEE Computer Society, (2005)An Attack on Libert et al.' s ID-based Undeniable Signature Scheme., , , , , , , and . Int. J. Netw. Secur., 5 (2): 220-223 (2007)Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms., , , , , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 167-177. Springer, (2000)A Hybrid Approach for Authenticating MPEG-2 Streaming Data., , , , , , , , and . MCAM, volume 4577 of Lecture Notes in Computer Science, page 203-212. Springer, (2007)Protecting Digital Legal Professional Privilege (LPP) Data., , , , , , , , and . SADFE, page 91-101. IEEE Computer Society, (2008)