Shiu-Kai Chin

According to our database1, Shiu-Kai Chin authored at least 40 papers between 1988 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Introduction to the Minitrack on Internet of Things Security: CyberAssurance for Edge, Software Defined, and Fog Computing Systems.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2019
Introduction to the Minitrack on Cyber-Assurance for the Internet of Things, Software-Defined Networks and Fog Computing Architectures.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Introduction to the Minitrack on Cyber-Assurance for Internet of Things and Fog Computing Architectures.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2015
Reliability analysis of healthcare information systems: State of the art and future directions.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
Banking on interoperability: Secure, interoperable credential management.
Comput. Networks, 2014

2012
Engineering Assurance at the Undergraduate Level.
IEEE Secur. Priv., 2012

2011
Access Control, Security, and Trust - A Logical Approach.
Chapman and Hall / CRC cryptography and network security series, CRC Press, ISBN: 978-1-584-88862-8, 2011

2010
Policy-Based Design and Verification for Mission Assurance.
Proceedings of the Computer Network Security, 2010

Credentials Management for High-Value Transactions.
Proceedings of the Computer Network Security, 2010

2005
A Modal Logic for Role-Based Access Control.
Proceedings of the Computer Network Security, 2005

2003
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL.
Proceedings of the Computer Network Security, 2003

Outcomes-based Assessment as an Assurance Education Tool.
Proceedings of the Security Education and Critical Infrastructures, 2003

2002
Formal Methods for Assuring Security of Protocols.
Comput. J., 2002

1999
High-Confidence Design for Security: Don't Trust - Verify.
Commun. ACM, 1999

Formal Development of Secure Email.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

Formal Verification of Tree-Structured Carry-Lookahead Adders.
Proceedings of the 9th Great Lakes Symposium on VLSI (GLS-VLSI '99), 1999

Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol.
Proceedings of the FM'99 - Formal Methods, 1999

1998
Integrating Security into the Curriculum.
Computer, 1998

An Instruction Set Process Calculus.
Proceedings of the Formal Methods in Computer-Aided Design, 1998

1997
Experience extending VLSI design with mathematical logic.
Proceedings of the 1997 IEEE International Conference on Microelectronic Systems Education, 1997

1996
Formal Specification and Verification of the Kernel Functional Unit of the OSI Session Layer Protocol and Service Using CCS.
Proceedings of the 1996 International Symposium on Software Testing and Analysis, 1996

Hardware Composition with Hardware Flowcharts and Process Algebras.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

Formal Methods Applied to Secure Network Engineering.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

Verifying privacy enhanced mail functions with higher order logic.
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996

1995
Formal Verification of Serial Pipeline Multipliers.
Proceedings of the Higher Order Logic Theorem Proving and Its Applications, 1995

Integrating formal methods tools to support system design.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Formal specification and verification of communication protocols using automated tools .
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Extending VLSI design with higher-order logic.
Proceedings of the 1995 International Conference on Computer Design (ICCD '95), 1995

1994
Generating Designs Using an Algorithmic Register Transfer Language with Formal Semantics.
Proceedings of the Higher Order Logic Theorem Proving and Its Applications, 1994

Parallel implementation of BDD Algorithms using a Distributed Shared Memory.
Proceedings of the 27th Annual Hawaii International Conference on System Sciences (HICSS-27), 1994

1993
Linking HOL to a VLSI CAD System.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993

Server-Process Restrictiveness in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993

1992
Verified functions for generating signed-binary arithmetic hardware.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1992

1991
Implementing and Verifying Finite-State Machines Using Types in Higher-Order Logic.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991

Verifying Arithmetic Hardware in Higher-Order Logic.
Proceedings of the 1991 International Workshop on the HOL Theorem Proving System and its Applications, 1991

1990
Synthesis of arithmetic hardware using hardware metafunctions.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1990

1989
WINTER: WAMS in Tim Expression Reduction.
Proceedings of the Logic Programming, 1989

Combining Engineering Vigor with Mathematical Rigor.
Proceedings of the Hardware Specification, 1989

1988
Using higher order logic and functional languages to synthesize correct hardware.
Proceedings of the 1988 Internation Conference on Computer Languages, 1988

Verifiable and executable theories of design for synthesizing correct hardware.
Proceedings of the Computer Design: VLSI in Computers and Processors, 1988


  Loading...