Chin-Tser Huang

Affiliations: 
Computer Science & Engineering University of South Carolina, Columbia, SC 
Area:
Computer Science
Google:
"Chin-Tser Huang"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

He X, Liu Q, Chen S, et al. (2020) Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus Ieee Access. 8: 26623-26636
Gebre-Amlak H, Jabbari AMA, Chen Y, et al. (2019) Agile polymorphic software-defined fog computing platform for mobile wireless controllers and sensors International Journal of Internet Technology and Secured Transactions. 9: 426
Zeng Q, Luo L, Qian Z, et al. (2019) Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Ieee Transactions On Dependable and Secure Computing. 1-1
Huang C, Sakib MN, Kamhoua C, et al. (2019) A Bayesian Game Theoretic Approach for Inspecting Web-based Malvertising Ieee Transactions On Dependable and Secure Computing. 1-1
He X, Liu J, Huang C, et al. (2019) A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology Ieee Access. 7: 131050-131067
Lu J, Yao L, He X, et al. (2018) A Security Analysis Method for Security Protocol Implementations Based on Message Construction Applied Sciences. 8: 2543
Rajab A, Huang C, Al-Shargabi M. (2018) Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network Optical Switching and Networking. 29: 15-26
Gerdes JH, Huang C, Sharaf MA. (2017) Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates Electronic Commerce Research. 17: 289-316
Huang J, Huang C. (2016) Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations Journal of Electrical and Computer Engineering. 2016: 1-12
Xian Y, Huang C, Cobb J. (2011) Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks Computer Communications. 34: 2184-2194
See more...