公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
---|---|---|---|---|---|---|
2001 | A User Efficient Fair E-cash Scheme without On-line Trusted Third Party | P. L. Yu; C. L. Lei; C. I. Fan; H. J. Chen; CHIN-LAUNG LEI | The 2001 International Workshop on Cryptology and Network Security | |||
2002 | A verifiable multi-authority secret election allowing abstention from voting | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | The Computer Journal | 12 | ||
2008 | A Web Metering Scheme for Fair Advertisement Transactions | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | the 2nd International Conference on Information Security and Assurance | |||
2008 | A Web Metering Scheme for Fair Advertisement Transactions | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | International Journal of Security and Its Applications | |||
2013 | Access Control over Vulnerable Devices in Advanced Metering Infrastructure | He-Ming Ruan; Yun-Hsin Chuang; CHIN-LAUNG LEI | National Computer Symposium | |||
2014 | Access Control System and Access Control Method Thereof | Chin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI | ||||
2013 | Access Control System and Access Control Method Thereof | Chin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI | ||||
2011 | AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | The 6th Joint Workshop on Information Security | |||
2013 | Aggregate message authentication codes (AMACs) with on-the-fly verification | Yu-Shian Chen; CHIN-LAUNG LEI | International Journal of Information Security | |||
2013 | An Adaptive Sector-Based Routing Model over Structured Peer-to-Peer Networks | Jiunn-Jye Lee; Hann-Huei Chiou; Chia-Chang Hsu; CHIN-LAUNG LEI | Computer Networks | 1 | ||
2014 | An AMI Threat Detection Mechanism Based on SDN Networks | Po-Wen Chi; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; CHIN-LAUNG LEI | The Eighth International Conference on Emerging Security Information, Systems and Technologies | |||
2012 | An Analysis of Security Patch Lifecycle Using Google Trend Tool | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | 7th Asia Joint Conference on Information Security | |||
2008 | An Anonymous and Deniable Conversation for a Thin Client | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Fourth International Symposium on Frontiers in Networking with Applications (FINA2008) | |||
2004 | An Efficient and Anonymous Buyer-Seller Watermarking Protocol | C. L. Lei; P. L. Yu; P. L. Tsai; M. H. Chan; CHIN-LAUNG LEI | IEEE Transactions on Image Processing, | 117 | ||
2002 | An Efficient Anonymous Buyer-Seller Watermarking Protocol | C. L. Lei; M. H. Chan; CHIN-LAUNG LEI | 2002 International Computer Symposium, Workshop on Cryptology and Information Security | |||
2011 | An Efficient Conference-Key Agreement Protocol for Mobile Devices | Ren-Chiun Wang; Chun-Han Tung; CHIN-LAUNG LEI | National Computer Symposium | |||
2009 | An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video | |||
2005 | An On-Line Page-Structure Approximation Scheme for Web Proxies | J. J Lee; P. L. Tsai; CHIN-LAUNG LEI | IEEE Distributed, Parallel and Network Applications | |||
2002 | An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections | C. I. Fan; CHIN-LAUNG LEI | Journal of Network and Computer Applications | 2 | ||
2006 | Analysis and Evaluation of a Multiple Gateway Traffic-Distribution Scheme for Gateway Clusters | Pan-Lung Tsai; CHIN-LAUNG LEI | Computer Communications |