Παρακολούθηση
Po-Wen Chi
Po-Wen Chi
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα gapps.ntnu.edu.tw - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
How to detect a compromised SDN switch
CLL PW Chi, CT Kuo, JW Guo
Network Softwarization (NetSoft), 2015 1st IEEE Conference on, 1-6, 2015
117*2015
Audit-free cloud storage via deniable attribute-based encryption
PW Chi, CL Lei
IEEE Transactions on Cloud Computing 6 (2), 414-427, 2015
792015
Efficient NFV deployment in data center networks
PW Chi, YC Huang, CL Lei
2015 IEEE International Conference on Communications (ICC), 5290-5295, 2015
532015
SDUDP: A reliable UDP-Based transmission protocol over SDN
MH Wang, LW Chen, PW Chi, CL Lei
IEEE Access 5, 5904-5916, 2017
452017
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service
CT Kuo, PW Chi, V Chang, CL Lei
Future Generation Computer Systems 86, 1424-1436, 2018
342018
A privacy-preserving zero-knowledge proof for blockchain
PW Chi, YH Lu, A Guan
Ieee Access, 2023
232023
OpenE2EQoS: Meter-based method for end-to-end QoS of multimedia services over SDN
TN Lin, YM Hsu, SY Kao, PW Chi
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and …, 2016
222016
Apparatus, method, and computer readable medium for transmitting data via a plurality of network interfaces
PW Chi, YH Lin
US Patent 7,957,358, 2011
202011
An AMI threat detection mechanism based on SDN networks
PW Chi, CT Kuo, HM Ruan, SJ Chen, CL Lei
Proc. SECURWARE, 208-211, 2014
142014
A prevention approach to scrambling attacks in WiMAX networks
PW Chi, CL Lei
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
122009
SDN storage: A stream-based storage system over software-defined networks
MH Wang, PW Chi, JW Guo, CL Lei
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
102016
Give me a broadcast-free network
PW Chi, YC Huang, JW Guo, CL Lei
2014 IEEE Global Communications Conference, 1968-1973, 2014
102014
Multi-level privacy preserving k-anonymity
JH Weng, PW Chi
2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 61-67, 2021
82021
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability
PW Chi, MH Wang, HJ Shiu
IEEE Access 8, 89866-89881, 2020
72020
Understanding potential cyber-armies in elections: a study of Taiwan
MH Wang, NL Nguyen, S Dai, PW Chi, CR Dow
Sustainability 12 (6), 2248, 2020
72020
Do not ask me what I am looking for: Index deniable encryption
PW Chi, YL Chang
Future Generation Computer Systems 122, 28-39, 2021
52021
A lightweight compound defense framework against injection attacks in iiot
PW Chi, MH Wang
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
52018
SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled Networks
PW Chi, MH Wang, JW Guo, CL Lei
2016 International Computer Symposium (ICS), 148-153, 2016
52016
A Revocation Key-based Approach Towards Efficient Federated Unlearning
RZ Xu, SY Hong, PW Chi, MH Wang
2023 18th Asia Joint Conference on Information Security (AsiaJCIS), 17-24, 2023
42023
Building a privacy-preserving blockchain-based bidding system: A crypto approach
HH Chen, PW Chi, YH Chuang
IEEE Access 10, 13367-13378, 2022
42022
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20