Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2002 | Quantifying Privacy Leakage Through Answering Database Queries | Hsu, T. -S.; Liau, C. -J.; Wang, D. -W.; Chen, Jeremy K. -P. | ||||
2010 | Quantitative assessment of early intervention strategies: a case study of 2009 H1N1 pandemic in Taiwan | Chern, T. C.; Tsai, M. T.; Chang, H. J.; Chuang, J. H.; Hsu, T. -s.; Kuo, H. S.; Liau, C. J.; Wang, D. W. | ||||
2005 | Secrecy of two-party secure computation | Chiang, Y. T.; Wang, D. W.; Liau, C. J.; Hsu, T. -s. | ||||
2012 | Towards a scripting language for automating secure multiparty computation | Chen, K.; Hsu, T. -s.; Huang, W. K.; Liau, C. J.; Wang, D. W. | ||||
2009 | Towards empirical aspects of secure scalar product | Wang, I-C.; Shen, C. -H.; Hsu, T. -s.; Liau, C. J.; Wang, D. W.; Zhan, J. | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 39, 440-447 | |||
2006 | Value and damage of information: A data security perspective | Wang, D. W.; Liau, C. J.; Hsu, T. -s.; Chen, J. K. -P. | International Journal of Approximate Reasoning 43 |