Hsu-Chun Hsiao
Hsu-Chun Hsiao
Verified email at - Homepage
Cited by
Cited by
SCION: Scalability, control, and isolation on next-generation networks
X Zhang, HC Hsiao, G Hasker, H Chan, A Perrig, DG Andersen
2011 IEEE Symposium on Security and Privacy, 212-227, 2011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
Flooding-resilient broadcast authentication for vanets
HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the 17th annual international conference on Mobile computing …, 2011
LAP: Lightweight anonymity and privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
2012 IEEE Symposium on Security and Privacy, 506-520, 2012
Policy-based secure deletion
C Cachin, K Haralambiev, HC Hsiao, A Sorniotti
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
SIBRA: Scalable internet bandwidth reservation architecture
C Basescu, RM Reischuk, P Szalachowski, A Perrig, Y Zhang, HC Hsiao, ...
arXiv preprint arXiv:1510.02696, 2015
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
Computing device to detect malware
H Hsiao, D Shuo, B Salamat, R Gupta, SM Das
US Patent 9,832,211, 2017
Traffic-aware patching for cyber security in mobile IoT
SM Cheng, PY Chen, CC Lin, HC Hsiao
IEEE Communications Magazine 55 (7), 29-35, 2017
GroupIt: Lightweight group key management for dynamic IoT environments
YH Kung, HC Hsiao
IEEE Internet of Things Journal 5 (6), 5155-5165, 2018
Instrim: Lightweight instrumentation for coverage-guided fuzzing
CC Hsu, CY Wu, HC Hsiao, SK Huang
Symposium on Network and Distributed System Security (NDSS), Workshop on …, 2018
Securing data planes in software-defined networks
TW Chao, YM Ke, BH Chen, JL Chen, CJ Hsieh, SC Lee, HC Hsiao
2016 IEEE NetSoft Conference and Workshops (NetSoft), 465-470, 2016
Safechain: Securing trigger-action programming from attack chains
KH Hsu, YH Chiang, HC Hsiao
IEEE Transactions on Information Forensics and Security 14 (10), 2607-2622, 2019
Efficient and secure threshold-based event validation for VANETs
HC Hsiao, A Studer, R Dubey, E Shi, A Perrig
Proceedings of the fourth ACM conference on Wireless network security, 163-174, 2011
On the feasibility of rerouting-based DDoS defenses
M Tran, MS Kang, HC Hsiao, WH Chiang, SP Tung, YS Wang
2019 IEEE Symposium on Security and Privacy (SP), 1169-1184, 2019
Shortmac: efficient data-plane fault localization.
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
NDSS, 2012
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Computing device to detect malware
H Hsiao, D Shuo, B Salamat, R Gupta, SM Das
US Patent 9,973,517, 2018
Cicadas: Congesting the internet with coordinated and decentralized pulsating attacks
YM Ke, CW Chen, HC Hsiao, A Perrig, V Sekar
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20