default search action
Min-Hua Shao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [j6]Min-Hua Shao, Ying-Chih Chin:
A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment. IEICE Trans. Inf. Syst. 95-D(1): 161-168 (2012) - 2011
- [j5]Ning-Han Liu, Cheng-Yi Li, Shu-Ju Hsieh, Cheng-Fa Tsai, Min-Hua Shao:
Long-term Audio Observation by Wireless Sensor Networks with Filtering Strategies. Ad Hoc Sens. Wirel. Networks 12(1-2): 151-167 (2011) - [c11]Min-Hua Shao, Yi-Ping Lee, Yen-Fen Hou, Cheng-Yi Ho:
A Trusted Routing Based Service Discovery Protocol with Backup Nodes in MANETs. WOSIS 2011: 115-122 - 2010
- [c10]Min-Hua Shao, Ying-Chih Chin:
A Novel Dynamic ID-based Remote User Authentication and Access Control Scheme for Multi-server Environment. CIT 2010: 1102-1107 - [c9]Min-Hua Shao, Ji-Bin Lin, Yi-Ping Lee:
Cluster-based Cooperative Back Propagation Network Approach for Intrusion Detection in MANET. CIT 2010: 1627-1632 - [c8]Min-Hua Shao, Shu-Hui Wen:
A study on secure and fair escrow services for digital commerce. NCM 2010: 396-401 - [c7]Min-Hua Shao, Ying-Chih Chin:
A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server Environment. NSS 2010: 548-553
2000 – 2009
- 2009
- [j4]Min-Hua Shao, Shin-Jia Huang:
Lightweight Anonymous Routing for Reliability in Mobile Ad-Hoc Networks. J. Res. Pract. Inf. Technol. 41(2): 171-180 (2009) - 2008
- [c6]Min-Hua Shao, Shin-Jia Huang:
Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks. PDCAT 2008: 335-341 - [c5]Min-Hua Shao, Shin-Jia Huang:
Trust-Aware Anonymous and Efficient Routing for Mobile Ad-Hoc Networks. WOSIS 2008: 132-137 - 2007
- [c4]Min-Hua Shao:
An Effective Privacy-Preserving RFID Scheme against Desynchronization. IIH-MSP 2007: 659-662 - [c3]Min-Hua Shao:
A Privacy-Preserving Buyer-Seller Watermarking Protocol with Semi-trust Third Party. TrustBus 2007: 44-53 - 2006
- [j3]Min-Hua Shao, Guilin Wang, Jianying Zhou:
Some common attacks against certified email protocols and the countermeasures. Comput. Commun. 29(15): 2759-2769 (2006) - [j2]Min-Hua Shao, Jianying Zhou:
Protecting mobile-agent data collection against blocking attacks. Comput. Stand. Interfaces 28(5): 600-611 (2006) - 2005
- [j1]Min-Hua Shao, Jing-Jang Hwang, Soushan Wu:
A transactional-cycle approach to evidence management for dispute resolution. Inf. Manag. 42(4): 607-618 (2005) - [c2]Min-Hua Shao, Jianying Zhou, Guilin Wang:
On the Security of a Certified E-Mail Scheme with Temporal Authentication. ICCSA (3) 2005: 701-710 - 2003
- [c1]Jing-Jang Hwang, Min-Hua Shao, Soushan Wu:
Establishing Chain of Evidence as a Base for Non-Repudiation Services. SEC 2003: 49-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint