Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
Calculated based on number of publications stored in Pure and citations from Scopus
20022022

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    Decentralized and Collaborative Tracing for Group Signatures

    Perera, M. N. S., Nakamura, T., Hashimoto, M., Yokoyama, H., Cheng, C. M. & Sakurai, K., 30 05 2022, ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 1258-1260 3 p. (ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2021

    Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables

    Chieh Chao, W., Chen, C. K. & Cheng, C. M., 30 01 2021, 2021 IEEE Conference on Dependable and Secure Computing, DSC 2021. Institute of Electrical and Electronics Engineers Inc., 9346229. (2021 IEEE Conference on Dependable and Secure Computing, DSC 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Efficient algorithm for computing odd-degree isogenies on montgomery curves

    Kodera, K., Cheng, C. M. & Miyaji, A., 2020, Information Security Applications - 21st International Conference, WISA 2020, Revised Selected Papers. You, I. (ed.). Springer Science and Business Media Deutschland GmbH, p. 258-275 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2018

    Frobenius additive fast fourier transform

    Li, W. D., Chen, M. S., Kuo, P. C., Cheng, C. M. & Yang, B. Y., 11 07 2018, ISSAC 2018 - Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation. Association for Computing Machinery, p. 127-133 7 p. (Proceedings of the International Symposium on Symbolic and Algebraic Computation, ISSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    6 Scopus citations
  • Functional pearl: Folding polynomials of polynomials

    Cheng, C. M., Hsu, R. L. & Mu, S. C., 2018, Functional and Logic Programming - 14th International Symposium, FLOPS 2018, Proceedings. Gallagher, J. P., Sulzmann, M. & Gallagher, J. P. (eds.). Springer Verlag, p. 68-83 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10818 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the computational complexity of ECDLP for elliptic curves in various forms using index calculus

    Cheng, C. M., Kodera, K. & Miyaji, A., 2018, Information Security and Cryptology - ICISC 2017 - 20th International Conference, Revised Selected Papers. Kim, D.-C. & Kim, H. (eds.). Springer Verlag, p. 245-263 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10779 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2016

    Multi-core FPGA implementation of ECC with homogeneous Co-Z coordinate representation

    Peng, B. Y., Hsu, Y. C., Chen, Y. J., Chueh, D. C., Cheng, C. M. & Yang, B. Y., 2016, Cryptology and Network Security - 15th International Conference, CANS 2016, Proceedings. Persiano, G. & Foresti, S. (eds.). Springer Verlag, p. 637-647 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10052 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Portable Implementation of Lattice-Based Cryptography Using JavaScript

    Yuan, Y., Cheng, C. M., Kiyomoto, S., Miyake, Y. & Takagi, T., 02 03 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 58-67 10 p. 7424690. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Public-Key Cryptography – PKC 2016: 19th IACR International Conference on practice and theory in Public-Key Cryptography Taipei, Taiwan, march 6–9, 2016 proceedings, part II

    Cheng, C. M., Chung, K. M., Persiano, G. & Yang, B. Y., 2016, Public-Key Cryptography – PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Cheng, C.-M., Chung, K.-M., Yang, B.-Y. & Persiano, G. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9615).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2015

    A 1.96mm2 low-latency multi-mode crypto-coprocessor for PKC-based IoT security protocols

    Tsai, C. R., Hsiao, M. C., Shen, W. C., Wu, A. Y. A. & Cheng, C. M., 27 07 2015, 2015 IEEE International Symposium on Circuits and Systems, ISCAS 2015. Institute of Electrical and Electronics Engineers Inc., p. 834-837 4 p. 7168763. (Proceedings - IEEE International Symposium on Circuits and Systems; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • A memory efficient variant of an implementation of the F4 algorithm for computing Gröbner bases

    Huang, Y. J., Hong, W. C., Cheng, C. M., Chen, J. M. & Yang, B. Y., 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 374-393 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU

    Tanaka, S., Cheng, C. M. & Sakurai, K., 2015, Mathematics and Computing - ICMC 2015. Giri, D., Mohapatra, R. N. & Chowdhury, D. R. (eds.). Springer New York LLC, p. 349-361 13 p. (Springer Proceedings in Mathematics and Statistics; vol. 139).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    A practical attack on patched mifare classic

    Chiu, Y. H., Hong, W. C., Chou, L. P., Ding, J., Yang, B. Y. & Cheng, C. M., 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 150-164 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • A user-friendly authentication solution using NFC card emulation on android

    Lee, H., Hong, W. C., Kao, C. H. & Cheng, C. M., 05 12 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 271-278 8 p. 6978622. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Fast exhaustive search for quadratic systems in double-struck F2 on FPGAs

    Bouillaguet, C., Cheng, C. M., Chou, T., Niederhagen, R. & Yang, B. Y., 2014, Selected Areas in Cryptography, SAC 2013 - 20th International Conference, Revised Selected Papers. Springer Verlag, p. 205-222 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8282 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    7 Scopus citations
  • Lattice-based cryptanalysis - How to estimate the security parameter of lattice-based cryptosystem

    Kuo, P. C. & Cheng, C. M., 18 09 2014, Digest of Technical Papers - IEEE International Conference on Consumer Electronics. Institute of Electrical and Electronics Engineers Inc., p. 53-54 2 p. 6904097. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

    Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., 2014, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2013

    An unsupervised learning model to perform side channel attack

    Chou, J. W., Chu, M. H., Tsai, Y. L., Jin, Y., Cheng, C. M. & Lin, S. D., 2013, Advances in Knowledge Discovery and Data Mining - 17th Pacific-Asia Conference, PAKDD 2013, Proceedings. PART 1 ed. p. 414-425 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7818 LNAI, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Design and implementation of multi-user secure indices for encrypted cloud storage

    Lin, M. P. P., Hong, W. C., Chen, C. H. & Cheng, C. M., 2013, 2013 11th Annual Conference on Privacy, Security and Trust, PST 2013. p. 177-184 8 p. 6596052. (2013 11th Annual Conference on Privacy, Security and Trust, PST 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Efficient computing over GF(216) using graphics processing unit

    Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790. (Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Factoring RSA keys from certified smart cards: Coppersmith in the wild

    Bernstein, D. J., Chang, Y. A., Cheng, C. M., Chou, L. P., Heninger, N., Lange, T. & Van Someren, N., 2013, Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. PART 2 ed. p. 341-360 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8270 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    72 Scopus citations
  • 2012

    COCA: Computation offload to clouds using AOP

    Chen, H. Y., Lin, Y. H. & Cheng, C. M., 2012, Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012. p. 466-473 8 p. 6217455. (Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks

    Chou, J. W., Lin, S. D. & Cheng, C. M., 2012, AISec'12 - Proceedings of the ACM Workshop on Security and Artificial Intelligence. p. 105-109 5 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • Solving quadratic equations with XL on parallel architectures

    Cheng, C. M., Chou, T., Niederhagen, R. & Yang, B. Y., 2012, Cryptographic Hardware and Embedded Systems, CHES 2012 - 14th International Workshop, Proceedings. p. 356-373 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7428 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    15 Scopus citations
  • 2011

    Extreme enumeration on GPU and in clouds - How many dollars you need to break SVP challenges

    Kuo, P. C., Schneider, M., Dagdelen, Ö., Reichelt, J., Buchmann, J., Cheng, C. M. & Yang, B. Y., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 176-191 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    29 Scopus citations
  • Toward green cloud computing

    Chu, F. S., Chen, K. C. & Cheng, C. M., 21 02 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. Association for Computing Machinery, 31. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2010

    ECC2K-130 on NVIDIA GPUs

    Bernstein, D. J., Chen, H. C., Cheng, C. M., Lange, T., Niederhagen, R., Schwabe, P. & Yang, B. Y., 2010, Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Proceedings. p. 328-346 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6498 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    14 Scopus citations
  • Fast exhaustive search for polynomial systems in F2

    Bouillaguet, C., Chen, H. C., Cheng, C. M., Chou, T., Niederhagen, R., Shamir, A. & Yang, B. Y., 2010, Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. Springer Verlag, p. 203-218 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6225 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    53 Scopus citations
  • Integer number crunching on the Cell processor

    Chen, H. C., Cheng, C. M., Hung, S. H. & Lin, Z. C., 2010, Proceedings - 39th International Conference on Parallel Processing, ICPP 2010. p. 508-515 8 p. 5599255. (Proceedings of the International Conference on Parallel Processing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • MIMO-OFDM PHY Integrated (MOPI) scheme for confidential wireless transmission

    Cheng, J. P., Li, Y. H., Yeh, P. C. & Cheng, C. M., 2010, 2010 IEEE Wireless Communications and Networking Conference, WCNC 2010 - Proceedings. 5506395. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2009

    A practical experience with RFID security

    Chen, C. C., Chen, I. T., Cheng, C. M., Chih, M. Y. & Shih, J. R., 2009, Proceedings - 2009 10th International Conference on Mobile Data Management: Systems, Services and Middleware, MDM 2009. p. 395-396 2 p. 5088976. (Proceedings - IEEE International Conference on Mobile Data Management).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • ECM on graphics cards

    Bernstein, D. J., Chen, T. R., Cheng, C. M., Lange, T. & Yang, B. Y., 2009, Advances in Cryptology - EUROCRYPT 2009 - 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 483-501 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5479 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    54 Scopus citations
  • SSE implementation of multivariate PKCs on modern x86 CPUs

    Chen, A. I. T., Chen, M. S., Chen, T. R., Cheng, C. M., Ding, J., Kuo, E. L. H., Lee, F. Y. S. & Yang, B. Y., 2009, Cryptographic Hardware and Embedded Systems - CHES 2009 - 11th International Workshop, Proceedings. p. 33-48 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5747 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    85 Scopus citations
  • 2008

    Could SFLASH be repaired?

    Ding, J., Dubois, V., Yang, B. Y., Chen, O. C. H. & Cheng, C. M., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 691-701 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • New differential-algebraic attacks and reparametrization of rainbow

    Ding, J., Yang, B. Y., Chen, C. H. O., Chen, M. S. & Cheng, C. M., 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 242-257 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    88 Scopus citations
  • Practical-sized instances of multivariate PKCs: Rainbow, TTS, and IC-derivatives

    Chen, A. I. T., Chen, C. H. O., Chen, M. S., Cheng, C. M. & Yang, B. Y., 2008, Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008, Proceedings. Springer Verlag, p. 95-108 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5299 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Rainbow: A wireless medium access control using network coding for multi-hop content distribution

    Cheng, C. M., Kung, H. T., Lin, C. K., Su, C. Y. & Vlah, D., 2008, 2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success. 4753102. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • 2007

    Maximizing throughput of UAV-relaying networks with the load-carry-and-deliver paradigm

    Cheng, C. M., Hsiao, P. H., Kung, H. T. & Vlah, D., 2007, 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007. p. 4420-4427 8 p. 4204981. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    131 Scopus citations
  • Transmit antenna selection based on link-layer channel probing

    Cheng, C. M., Hsiao, P. H., Kung, H. T. & Vlah, D., 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM. 4351703. (2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2006

    Adjacent channel interference in dual-radio 802.11a nodes and its impact on multi-hop networking

    Cheng, C. M., Hsiao, P. H., Kung, H. T. & Vlah, D., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151130. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    68 Scopus citations
  • Implementing minimized multivariate PKC on low-resource embedded systems

    Yang, B. Y., Cheng, C. M., Chen, B. R. & Chen, J. M., 2006, Security in Pervasive Computing - Third International Conference, SPC 2006, Proceedings. Springer Verlag, p. 73-88 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3934 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    34 Scopus citations
  • Parallel use of multiple channels in multi-hop 802.11 wireless networks

    Cheng, C. M., Hsiao, P. H., Kung, H. T. & Vlah, D., 2006, Military Communications Conference 2006, MILCOM 2006. Institute of Electrical and Electronics Engineers Inc., 4086597. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Performance measurement of 802.11a wireless links from UAV to ground nodes with various antenna orientations

    Cheng, C. M., Hsiao, P. H., Kung, H. T. & Vlah, D., 2006, Proceedings - 15th International Conference on Computer Communications and Networks 2006, ICCCN 2006. p. 303-308 6 p. 4067672. (Proceedings - International Conference on Computer Communications and Networks, ICCCN).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    83 Scopus citations
  • 2003

    ANON: An IP-layer anonymizing infrastructure

    Cheng, C. M., Kung, H. T., Tan, K. S. & Bradner, S., 2003, Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003. Institute of Electrical and Electronics Engineers Inc., p. 78-80 3 p. 1194926. (Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Design and analysis of an IP-Layer anonymizing infrastructure

    Kung, H. T., Cheng, C. M., Tan, K. S. & Bradner, S., 2003, Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003. Institute of Electrical and Electronics Engineers Inc., p. 62-75 14 p. 1194873. (Proceedings - DARPA Information Survivability Conference and Exposition, DISCEX 2003; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations