公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2017 | A Page Replacement Algorithm Based on Frequency Derived From Reference History | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | ACM SIGAPP Symposium On Applied Computing | 2 | 0 | |
1992 | A parallel algorithm for finding congruent regions | Lei, Chin-Laung ; Liaw, Horng-Twu | Computers & Graphics | 5 | | |
1999 | Partially Blind Threshold Signatures Based on Discrete Logarithms | W. S. Juang; CHIN-LAUNG LEI | Computer Communications | | | |
2009 | Peer-to-Peer Application Recognition Based on Signaling Activity | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE International Conference on Communications (ICC) | | | |
2020 | POSTER: Construct macOS Cyber Range for Red/Blue Teams | Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI | Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020 | | | |
2000 | Prediction-capable data compression algorithms for improving transmission efficiency on distributed systems | Chiou, Hann-Huei; Lai, Alexander I-Chi; Lei, Chin-Laung | 20th International Conference on Distributed Computing Systems, 2000 | 1 | 0 | |
2018 | Preserving privacy of online digital physiological signals using blind and reversible steganography (vol 151, pg 159, 2017) | Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; CHIN-LAUNG LEI | Computer Methods and Programs in Biomedicine | | 0 | |
2003 | Privacy and Anonymity Protection wit Blind Threshold Signatures | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | International Journal of Electronic Commerce | | | |
2002 | Privacy and Anonymity Protection with Blind Threshold Signatures. | Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu; CHIN-LAUNG LEI | Int. J. Electronic Commerce | | | |
2017 | Privacy Preserving of Online Digital Physiological Signals using Reversible Steganography | Hung-Jr Shiu; Bor-Shing Lin; Chin-Laung Lei; CHIN-LAUNG LEI | Computer Methods and Programs in Biomedicine | 35 | 29 | |
2019 | Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme | Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI | IEEE Access | | | |
2011 | Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Journal of Computer and System Sciences | 24 | 14 | |
2002 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | Lei, Chin-Laung; Juang, Wen-Shenq; Yu, Pei-Ling; LeiChinLaung | Journal of Information Science and Engineering | | | |
2002 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | Journal of Information Science and Engineering | | | |
1999 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | 1999 National Computer Symposium | | | |
2021 | PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPs | Chuang Y.-H; CHIN-LAUNG LEI | IEEE Access | | | |
2010 | Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment | Kuan-Ta Chen; Chi-Jui Chang; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE Network | | | |
2011 | Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework | Kuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI | ACM Multimedia Systems Conference (MMSys 2011) | | | |
2006 | Quantifying Skype User Satisfaction | Kuan-Ta Chen; Chun-Ying Huang; Polly Huang; CHIN-LAUNG LEI ; POLLY HUANG | ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communicat (SIGCOMM 2006) | | | |
2006 | Quantifying Skype user satisfaction. | Chen, Kuan-Ta; Huang, Chun-Ying; Huang, Polly; POLLY HUANG ; CHIN-LAUNG LEI | Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006 | 0 | 0 | |