Chin-Tser Huang
Affiliations: | Computer Science & Engineering | University of South Carolina, Columbia, SC |
Area:
Computer ScienceGoogle:
"Chin-Tser Huang"Children
Sign in to add traineePrasanth Kalakota | grad student | 2009 | University of South Carolina |
Yi Xian | grad student | 2012 | University of South Carolina |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
He X, Liu Q, Chen S, et al. (2020) Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus Ieee Access. 8: 26623-26636 |
Gebre-Amlak H, Jabbari AMA, Chen Y, et al. (2019) Agile polymorphic software-defined fog computing platform for mobile wireless controllers and sensors International Journal of Internet Technology and Secured Transactions. 9: 426 |
Zeng Q, Luo L, Qian Z, et al. (2019) Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs Ieee Transactions On Dependable and Secure Computing. 1-1 |
Huang C, Sakib MN, Kamhoua C, et al. (2019) A Bayesian Game Theoretic Approach for Inspecting Web-based Malvertising Ieee Transactions On Dependable and Secure Computing. 1-1 |
He X, Liu J, Huang C, et al. (2019) A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology Ieee Access. 7: 131050-131067 |
Lu J, Yao L, He X, et al. (2018) A Security Analysis Method for Security Protocol Implementations Based on Message Construction Applied Sciences. 8: 2543 |
Rajab A, Huang C, Al-Shargabi M. (2018) Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network Optical Switching and Networking. 29: 15-26 |
Gerdes JH, Huang C, Sharaf MA. (2017) Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates Electronic Commerce Research. 17: 289-316 |
Huang J, Huang C. (2016) Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations Journal of Electrical and Computer Engineering. 2016: 1-12 |
Xian Y, Huang C, Cobb J. (2011) Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks Computer Communications. 34: 2184-2194 |