Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2005 | Secrecy of two-party secure computation | Y.T. Chiang; D.W. Wang; C.J. Liau; T.-s. Hsu | ||||
1997 | Security Problems for Statistical Databases with General Cell Suppressions | T.-s. Hsu; M.-Y. Kao | ||||
2000 | Simpler and Faster Vertex-Connectivity Augmentation Algorithms (Extended Abstract) | T.-s. Hsu | ||||
2012 | Towards a scripting language for automating secure multiparty computation | K. Chen; T.-s. Hsu; W.K. Huang; C.J. Liau; D.W. Wang | ||||
2009 | Towards empirical aspects of secure scalar product | I-C. Wang; C.-H. Shen; T.-s. Hsu; C.J. Liau; D.W. Wang; J. Zhan | IEEE Transactions on Systems, Man, and Cybernetics Part C: Applications and Reviews 39(4), 440-447 | |||
2006 | Value versus damage of information release: A data privacy perspective | D.W. Wang; C.J. Liau; T.-s. Hsu; J.K.-P. Chen | International Journal of Approximate Reasoning 43(2), 179-201 |