default search action
Shiu-Kai Chin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c32]Tyson Brooks, Shiu-Kai Chin:
Introduction to the Minitrack on Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems. HICSS 2021: 1-2
2010 – 2019
- 2019
- [c31]Tyson Brooks, Shiu-Kai Chin, Erich Devendorf:
Introduction to the Minitrack on Cyber-Assurance for the Internet of Things, Software-Defined Networks and Fog Computing Architectures. HICSS 2019: 1 - 2018
- [c30]Tyson Brooks, Shiu-Kai Chin, Erich Devendorf:
Introduction to the Minitrack on Cyber-Assurance for Internet of Things and Fog Computing Architectures. HICSS 2018: 1-2 - 2015
- [c29]Amjad Gawanmeh, Hussam M. N. Al Hamadi, Mahmoud Al-Qutayri, Shiu-Kai Chin, Kashif Saleem:
Reliability analysis of healthcare information systems: State of the art and future directions. HealthCom 2015: 68-74 - 2014
- [j7]Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older:
Banking on interoperability: Secure, interoperable credential management. Comput. Networks 67: 235-251 (2014) - 2012
- [j6]Susan Older, Shiu-Kai Chin:
Engineering Assurance at the Undergraduate Level. IEEE Secur. Priv. 10(6): 74-77 (2012) - 2011
- [b1]Shiu-Kai Chin, Susan Older:
Access Control, Security, and Trust - A Logical Approach. Chapman and Hall / CRC cryptography and network security series, CRC Press 2011, ISBN 978-1-584-88862-8, pp. I-XXI, 1-322 - 2010
- [c28]Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal:
Policy-Based Design and Verification for Mission Assurance. MMM-ACNS 2010: 125-138 - [c27]Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older:
Credentials Management for High-Value Transactions. MMM-ACNS 2010: 169-182
2000 – 2009
- 2005
- [c26]Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Chin:
A Modal Logic for Role-Based Access Control. MMM-ACNS 2005: 179-193 - 2003
- [c25]Susan Older, Shiu-Kai Chin:
Outcomes-based Assessment as an Assurance Education Tool. World Conference on Information Security Education 2003: 179-196 - [c24]Thumrongsak Kosiyatrakul, Susan Older, Polar Humenn, Shiu-Kai Chin:
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL. MMM-ACNS 2003: 32-46 - 2002
- [j5]Susan Older, Shiu-Kai Chin:
Formal Methods for Assuring Security of Protocols. Comput. J. 45(1): 46-54 (2002)
1990 – 1999
- 1999
- [j4]Shiu-Kai Chin:
High-Confidence Design for Security: Don't Trust - Verify. Commun. ACM 42(7): 33-37 (1999) - [c23]Dan Zhou, Shiu-Kai Chin:
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol. World Congress on Formal Methods 1999: 758-775 - [c22]Sae Hwan Kim, Shiu-Kai Chin:
Formal Verification of Tree-Structured Carry-Lookahead Adders. Great Lakes Symposium on VLSI 1999: 232-233 - [c21]Dan Zhou, Joncheng C. Kuo, Susan Older, Shiu-Kai Chin:
Formal Development of Secure Email. HICSS 1999 - 1998
- [j3]Cynthia E. Irvine, Shiu-Kai Chin, Deborah A. Frincke:
Integrating Security into the Curriculum. Computer 31(12): 25-30 (1998) - [c20]Shiu-Kai Chin, Jang Dae Kim:
An Instruction Set Process Calculus. FMCAD 1998: 451-468 - 1997
- [c19]Shiu-Kai Chin:
Experience extending VLSI design with mathematical logic. MSE 1997: 11-12 - 1996
- [c18]Dan Zhou, Shiu-Kai Chin:
Verifying privacy enhanced mail functions with higher order logic. Network Threats 1996: 11-20 - [c17]Shiu-Kai Chin, John Faust, Joseph Giordano:
Formal Methods Applied to Secure Network Engineering. ICECCS 1996: 344-351 - [c16]Juin-Yeu Joseph Lu, Jang Dae Kim, Shiu-Kai Chin:
Hardware Composition with Hardware Flowcharts and Process Algebras. ICECCS 1996: 352- - [c15]Milica Barjaktarovic, Shiu-Kai Chin, Kamal Jabbour:
Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS. ISSTA 1996: 270-279 - 1995
- [c14]Anand Chavan, Shiu-Kai Chin, Shahid Ikram, Jang Dae Kim, Juin-Yeu Zu:
Extending VLSI design with higher-order logic. ICCD 1995: 85-94 - [c13]Shiu-Kai Chin, John Faust, Joseph Giordano:
Integrating formal methods tools to support system design. ICECCS 1995: 88- - [c12]Milica Barjaktarovic, Shiu-Kai Chin, Kamal Jabbour:
Formal specification and verification of communication protocols using automated tools . ICECCS 1995: 246-253 - [c11]Jang Dae Kim, Shiu-Kai Chin:
Formal Verification of Serial Pipeline Multipliers. TPHOLs 1995: 229-244 - 1994
- [c10]Yegnashankar Parasuram, Edward P. Stabler, Shiu-Kai Chin:
Parallel implementation of BDD Algorithms using a Distributed Shared Memory. HICSS (1) 1994: 16-25 - [c9]Juin-Yeu Lu, Shiu-Kai Chin:
Generating Designs Using an Algorithmic Register Transfer Language with Formal Semantics. TPHOLs 1994: 316-331 - 1993
- [c8]Juin-Yeu Lu, Shiu-Kai Chin:
Linking HOL to a VLSI CAD System. HUG 1993: 199-212 - [c7]Stephen H. Brackin, Shiu-Kai Chin:
Server-Process Restrictiveness in HOL. HUG 1993: 450-463 - 1992
- [j2]Shiu-Kai Chin:
Verified functions for generating signed-binary arithmetic hardware. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 11(12): 1529-1558 (1992) - 1991
- [c6]Shiu-Kai Chin:
Verifying Arithmetic Hardware in Higher-Order Logic. TPHOLs 1991: 22-31 - [c5]Shiu-Kai Chin, Graham M. Birtwistle:
Implementing and Verifying Finite-State Machines Using Types in Higher-Order Logic. TPHOLs 1991: 121-129 - 1990
- [j1]Shiu-Kai Chin, Edward P. Stabler:
Synthesis of arithmetic hardware using hardware metafunctions. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 9(8): 793-803 (1990)
1980 – 1989
- 1989
- [c4]Shiu-Kai Chin:
Combining Engineering Vigor with Mathematical Rigor. Hardware Specification, Verification and Synthesis 1989: 152-176 - [c3]Damir Jamsek, Kevin J. Greene, Shiu-Kai Chin, Paul R. Humenn:
WINTER: WAMS in Tim Expression Reduction. NACLP 1989: 1013-1029 - 1988
- [c2]Shiu-Kai Chin, Kevin J. Greene:
Verifiable and executable theories of design for synthesizing correct hardware. ICCD 1988: 604-610 - [c1]Shiu-Kai Chin, Edward P. Stabler, Kevin J. Greene:
Using higher order logic and functional languages to synthesize correct hardware. ICCL 1988: 396-403
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint