公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2017 | CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | National Computer Symposium | | | |
2012 | Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value | Yi-Cheng Tsai; Zheng-Hui Chen; Jan-Ming Ho; Ming-Yang Kao; Chin-Laung Lei; Szu-Lang Liao; CHIN-LAUNG LEI | IEEE Computational Intelligence | | | |
1994 | A Collision Free Secret Ballot Protocol for Computerized General Elections | Juang, W. S.; Lei, C. L. | | 30 | 26 | |
1996 | A collision-free secret ballot protocol for computerized general elections | Juang, Wen-Shenq; Lei, Chin-Laung | Computers & Security | 32 | 26 | |
1996 | A collision-free secret ballot protocol for computerized general elections | Juang, W.-S.; CHIN-LAUNG LEI | Computers and Security | 32 | 26 | |
2004 | Comments on Improved Proxy Deposit Protocol for E-cash Systems | Y. P. Chiu; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | 14th Conference on Information Security | | | |
2001 | Comments on Improved User Efficient Blind Signatures | C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI | 11th Conference on Information Security | | | |
2014 | Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA | Yi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; CHIN-LAUNG LEI | the 10th Annual Conference of the Asia-Pacific Association of Derivatives | | | |
2001 | Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes | T. H. Yeh; CHIN-LAUNG LEI | IEICE Transactions on Information and Systems | | | |
1998 | Competitive analysis of on-line disk scheduling | Yeh, T.-H.; Kuo, C.-M.; CHIN-LAUNG LEI ; HSU-CHUN YEN | Theory of Computing Systems | 7 | 6 | |
1996 | Competitive Analysis of On-Line Disk Scheduling. | Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; Lei, Chin-Laung; CHIN-LAUNG LEI ; HSU-CHUN YEN | Algorithms and Computation, 7th International Symposium, ISAAC '96, Osaka, Japan, December 16-18, 1996, Proceedings | 3 | 0 | |
2009 | Computer and Network Security in Practice Applying to High-tech Society | Shiuh-Jeng Wang; Chung-Huang Yang; CHIN-LAUNG LEI | | | | |
2006 | Confessible Threshold Ring Signatures | Yu-Shian Chen; Chin-Laung Lei; Yu-Peng Chiu; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | | | |
2013 | Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE Transactions on Multimedia | | | |
2020 | Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines | Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI | Proceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020 | | | |
2001 | Cryptanalysis on improved user efficient blind signatures | C. I. Fan; CHIN-LAUNG LEI | IEE Electronics Letters | | 5 | |
2017 | Data Hiding on Social Media Communications Using Text Steganography | Hung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Po-Yang Huang; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI | International Conference on Risks and Security of Internet and System | 10 | 0 | |
2012 | Data Integrity on Remote Storage for On-line Co-working | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | 7th Asia Joint Conference on Information Security | | | |
1996 | Data prefetching for distributed shared memory systems | Lai, Alexander I-Chi; Lei, Chin-Laung | System Sciences, 1996. | 5 | 0 | |
2003 | Design and Implementation of a Secure and High Performance Linux-Based Cluster File System | CHIN-LAUNG LEI | 2003 International Conference on Open Source | | | |