跳至主導覽
跳至搜尋
跳過主要內容
國立陽明交通大學研發優勢分析平台 首頁
English
中文
首頁
人員
單位
研究成果
計畫
獎項
活動
貴重儀器
影響
按專業知識、姓名或所屬機構搜尋
查看斯高帕斯 (Scopus) 概要
謝 續平
教授
資訊安全研究所
h-index
h10-index
h5-index
2096
引文
21
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
242
引文
7
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
27
引文
3
h-指數
按照存儲在普爾(Pure)的出版物數量及斯高帕斯(Scopus)引文計算。
1986 …
2024
每年研究成果
概覽
指紋
網路
計畫
(69)
研究成果
(205)
獎項
(14)
類似的個人檔案
(6)
指紋
查看啟用 Shiuh-Pyng Winston Shieh 的研究主題。這些主題標籤來自此人的作品。共同形成了獨特的指紋。
排序方式
重量
按字母排序
Computer Science
Authentication
100%
Malware
89%
Key Distribution
61%
Wireless Sensor Network
60%
secret sharing scheme
57%
authentication scheme
57%
Fault Tolerant
50%
Authentication Protocol
47%
Cybersecurity
43%
Malware Analysis
42%
Computer System
39%
Multicasting
38%
Internet-Of-Things
38%
Intrusion Detection
37%
Android
28%
Video-on-Demand
28%
Software Testing
28%
Operating System
28%
Password
25%
Telecommunication System
22%
Cryptography
22%
Virtual Machine
21%
Encrypted Data
21%
covert channel
21%
One-Way Hash Function
21%
Data Structure
20%
Context Dependent
20%
Security Problem
19%
Access Structure
19%
Mobile Code
19%
threshold scheme
19%
Authentication Key
19%
Private Key Encryption
19%
Plaintext Attack
19%
Encryption Scheme
19%
Packet Classification
19%
Attackers
19%
Software Developer
19%
Network Security
19%
Graphical User Interface
19%
Data Aggregation
19%
Discrete Logarithm
19%
Multicast Protocol
19%
Load Balancing
19%
Multiple Server
19%
Public-Key Cryptosystems
19%
Testbed
19%
Artificial Intelligence
19%
Operational Security
18%
Sensor Node
17%
Keyphrases
Malware
67%
Wireless Sensor Networks
67%
Authentication Scheme
53%
Malware Analysis
44%
Secret Sharing Scheme
37%
Vulnerability
36%
Perfect Secret Sharing Scheme
36%
Adversary
35%
Master Key
33%
Authentication Protocol
33%
Key Distribution Scheme
32%
Computer System
32%
Intrusion Detection
29%
Key Evolving
28%
Internet of Things
28%
Playback
28%
Optimal Information
28%
Information Dispersal
28%
Secure Key
28%
Security Issues
28%
Fault-tolerant
26%
Encrypted Data
25%
Cybersecurity
25%
Secure Authentication
24%
Key Agreement Protocol
24%
Security Threats
24%
Mobile Communication Systems
24%
Mobile Code Systems
24%
World Wide Web
24%
Covert Storage Channel
22%
Smartphone
22%
Subscriber
22%
Virtual Machine
21%
Secure Network
21%
Multicast
21%
Information Rate
20%
Wireless Networks
20%
Key Distribution
20%
Sensor Node
20%
GUI Testing
19%
Threshold Scheme
19%
Authenticated Key Agreement
19%
Data Aggregation
19%
Packet Classification
19%
Discrete Logarithm Problem
19%
Attacker
19%
Distributed Faults
19%
Large-scale Networks
19%
Secure Broadcasting
19%
Graph-based
19%