Shuen-Chih Tsai

  • Citations Per Year
Learn More
Currently, the main threats of network security are coming from hacker intrusion, deny of service (DoS), computer virus, worm, spam, malicious code and sniffer because there are many weaknesses in the original design of IPv4. One is that attackers could send IP spoofing packets which is he wants to attack. That is the attackers modify the IP from the true(More)
In large-scale RFID systems, collecting all of the tag IDs is a time-consuming process. A protocol designated as Smart Trend-Traversal (STT) has been proposed to reduce collisions during the tag collection process and to dynamically construct the query strings used to interrogate the tags. In general, if the tag ID information is known to the reader from a(More)
One of the main technologies of cloud computing is virtualization. Virtualization allows Virtual Machines (VMs) to share physical resources simultaneously resulting in higher utilization of hardware resources and lower infrastructure costs. With the proliferation of VMs, the importance of virtual switches (vSwitches) comes to the forefront. The concept of(More)
  • 1