公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2003 | On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective | Y. M. Hsu; CHIN-LAUNG LEI | The fourth Workshop for Management Sciences | | | |
2009 | On the Challenges and Designs of Transport Protocols for MMORPGs | Chen-Chi Wu; Kuan-Ta Chen; Chih-Ming Chen; POLLY HUANG ; CHIN-LAUNG LEI | Springer Multimedia Tools and Applications | | | |
2006 | On the Sensitivity of Online Game Playing Time to Network QoS | K. T. Chen; P. Huang; C. Y. Huang; CHIN-LAUNG LEI ; POLLY HUANG | 25th Conference on Computer Communications (IEEE INFOCOM 2006) | | | |
2008 | OneClick: A Framework for Capturing Users Network Experiences | Cheng-Chun Tu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | ACM SIGCOMM 2008 | | | |
2010 | Online Game QoE Evaluation using Paired Comparisons | Yu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; Chien-Ju Ho; CHIN-LAUNG LEI | 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop | | | |
1993 | An optimal algorithm to assign cryptographic keys in a tree structure for access control | Liaw, H.-T.; CHIN-LAUNG LEI | BIT | | | |
2015 | Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing | Yi-Cheng Tsai; Chin-Laung Lei; Jan-Ming Ho; Ming-Yang Kao; Szu-Lang Liao; CHIN-LAUNG LEI | Journal of Information Science and Engineering | | | |
2017 | A Page Replacement Algorithm Based on Frequency Derived From Reference History | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | ACM SIGAPP Symposium On Applied Computing | 2 | 0 | |
1992 | A parallel algorithm for finding congruent regions | Lei, Chin-Laung ; Liaw, Horng-Twu | Computers & Graphics | 5 | | |
1999 | Partially Blind Threshold Signatures Based on Discrete Logarithms | W. S. Juang; CHIN-LAUNG LEI | Computer Communications | | | |
2009 | Peer-to-Peer Application Recognition Based on Signaling Activity | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE International Conference on Communications (ICC) | | | |
2020 | POSTER: Construct macOS Cyber Range for Red/Blue Teams | Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI | Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020 | | | |
2000 | Prediction-capable data compression algorithms for improving transmission efficiency on distributed systems | Chiou, Hann-Huei; Lai, Alexander I-Chi; Lei, Chin-Laung | 20th International Conference on Distributed Computing Systems, 2000 | 1 | 0 | |
2018 | Preserving privacy of online digital physiological signals using blind and reversible steganography (vol 151, pg 159, 2017) | Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; CHIN-LAUNG LEI | Computer Methods and Programs in Biomedicine | | 0 | |
2003 | Privacy and Anonymity Protection wit Blind Threshold Signatures | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | International Journal of Electronic Commerce | | | |
2002 | Privacy and Anonymity Protection with Blind Threshold Signatures. | Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu; CHIN-LAUNG LEI | Int. J. Electronic Commerce | | | |
2017 | Privacy Preserving of Online Digital Physiological Signals using Reversible Steganography | Hung-Jr Shiu; Bor-Shing Lin; Chin-Laung Lei; CHIN-LAUNG LEI | Computer Methods and Programs in Biomedicine | 35 | 29 | |
2019 | Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme | Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI | IEEE Access | | | |
2011 | Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Journal of Computer and System Sciences | 24 | 14 | |
2002 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | Journal of Information Science and Engineering | | | |