Author of the publication

Enhancing host security using external environment sensors.

, , , , and . Int. J. Inf. Sec., 10 (5): 285-299 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chang, Ee-Chien
add a person with the name Chang, Ee-Chien
 

Other publications of authors with the same name

A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space., and . Inf. Process. Lett., 55 (3): 155-157 (1995)Enhancing host security using external environment sensors., , , , and . Int. J. Inf. Sec., 10 (5): 285-299 (2011)Geometric Properties of Watermarking Schemes., and . ICIP, page 714-717. (2000)ID Repetition in Kad., , , , and . Peer-to-Peer Computing, page 111-120. IEEE, (2009)Progressive transmission and rendering of foveated volume data., , , and . GRAPP, page 67-75. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2006)M2R: Enabling Stronger Privacy in MapReduce Computation., , , , and . USENIX Security Symposium, page 447-462. USENIX Association, (2015)Chain of Trust: Can Trusted Hardware Help Scaling Blockchains?, , , and . CoRR, (2018)Practically Efficient Proof of Retrievability in Cloud Storage., and . IACR Cryptology ePrint Archive, (2011)Evading Classifiers by Morphing in the Dark., , and . ACM Conference on Computer and Communications Security, page 119-133. ACM, (2017)Robust Extraction of Secret Bits from Minutiae., and . ICB, volume 4642 of Lecture Notes in Computer Science, page 750-759. Springer, (2007)