Obserwuj
Po-Wen Chi
Tytuł
Cytowane przez
Cytowane przez
Rok
How to detect a compromised SDN switch
CLL PW Chi, CT Kuo, JW Guo
Network Softwarization (NetSoft), 2015 1st IEEE Conference on, 1-6, 2015
107*2015
Audit-free cloud storage via deniable attribute-based encryption
PW Chi, CL Lei
IEEE Transactions on Cloud Computing 6 (2), 414-427, 2015
722015
Efficient NFV deployment in data center networks
PW Chi, YC Huang, CL Lei
2015 IEEE International Conference on Communications (ICC), 5290-5295, 2015
522015
SDUDP: A reliable UDP-Based transmission protocol over SDN
MH Wang, LW Chen, PW Chi, CL Lei
IEEE Access 5, 5904-5916, 2017
392017
SFaaS: Keeping an eye on IoT fusion environment with security fusion as a service
CT Kuo, PW Chi, V Chang, CL Lei
Future Generation Computer Systems 86, 1424-1436, 2018
332018
OpenE2EQoS: Meter-based method for end-to-end QoS of multimedia services over SDN
TN Lin, YM Hsu, SY Kao, PW Chi
2016 IEEE 27th Annual International Symposium on Personal, Indoor, and …, 2016
202016
Apparatus, method, and computer readable medium for transmitting data via a plurality of network interfaces
PW Chi, YH Lin
US Patent 7,957,358, 2011
202011
An AMI threat detection mechanism based on SDN networks
PW Chi, CT Kuo, HM Ruan, SJ Chen, CL Lei
Proc. SECURWARE, 208-211, 2014
132014
A prevention approach to scrambling attacks in WiMAX networks
PW Chi, CL Lei
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
122009
SDN storage: A stream-based storage system over software-defined networks
MH Wang, PW Chi, JW Guo, CL Lei
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016
102016
Give me a broadcast-free network
PW Chi, YC Huang, JW Guo, CL Lei
2014 IEEE Global Communications Conference, 1968-1973, 2014
92014
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability
PW Chi, MH Wang, HJ Shiu
IEEE Access 8, 89866-89881, 2020
72020
A privacy-preserving zero-knowledge proof for blockchain
PW Chi, YH Lu, A Guan
IEEE Access, 2023
62023
Do not ask me what I am looking for: Index deniable encryption
PW Chi, YL Chang
Future Generation Computer Systems 122, 28-39, 2021
52021
Multi-level privacy preserving k-anonymity
JH Weng, PW Chi
2021 16th Asia Joint Conference on Information Security (AsiaJCIS), 61-67, 2021
52021
Understanding potential cyber-armies in elections: a study of Taiwan
MH Wang, NL Nguyen, S Dai, PW Chi, CR Dow
Sustainability 12 (6), 2248, 2020
52020
A lightweight compound defense framework against injection attacks in iiot
PW Chi, MH Wang
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
52018
SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled Networks
PW Chi, MH Wang, JW Guo, CL Lei
2016 International Computer Symposium (ICS), 148-153, 2016
52016
Building a privacy-preserving blockchain-based bidding system: A crypto approach
HH Chen, PW Chi, YH Chuang
IEEE Access 10, 13367-13378, 2022
32022
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking
PW Chi, MH Wang, Y Zheng
2020 International Computer Symposium (ICS), 397-402, 2020
32020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20