公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2001 | Cryptanalysis on improved user efficient blind signatures | C. I. Fan; CHIN-LAUNG LEI | IEE Electronics Letters | | 5 | |
2017 | Data Hiding on Social Media Communications Using Text Steganography | Hung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Po-Yang Huang; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI | International Conference on Risks and Security of Internet and System | 10 | 0 | |
2012 | Data Integrity on Remote Storage for On-line Co-working | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | 7th Asia Joint Conference on Information Security | | | |
1996 | Data prefetching for distributed shared memory systems | Lai, Alexander I-Chi; Lei, Chin-Laung | System Sciences, 1996. | 5 | 0 | |
2003 | Design and Implementation of a Secure and High Performance Linux-Based Cluster File System | CHIN-LAUNG LEI | 2003 International Conference on Open Source | | | |
2012 | Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | International Computer Symposium, Advances in Intelligent Systems and Applications | | | |
2007 | Design and Implementation of Secure Communication Channels over UPnP Networks | Jiunn-Jye Lee; Chun-Ying Huang; CHIN-LAUNG LEI | 2007 International Conference on Multimedia and Ubiquitous Engineering | | | |
2006 | Design Implications of Social Interaction for Online Games | Kuan-Ta Chen; CHIN-LAUNG LEI | IFIP 5th International Conference on Entertainment Computing (ICEC 2006) | | | |
2002 | Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | 4th Workshop on Cyberspace:Information, Law and Society | | | |
2008 | Detecting Peer-to-Peer Activity by Signaling Packets | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | ACM SIGCOMM 2008 | | | |
2008 | Detecting VoIP Traffic Based on Human Conversation Patterns | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications | | | |
2008 | Detecting VoIP Traffic Based on Human Conversation Patterns. | Wu, Chen-Chi; Chen, Kuan-Ta; Chang, Yu-Chun; CHIN-LAUNG LEI | Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers | | | |
2011 | DevilTyper: A Game for CAPTCHA Usability Evaluation | Chien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; CHIN-LAUNG LEI | ACM Computer in Entertainment | | | |
2010 | DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests | Chien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; CHIN-LAUNG LEI | 7th ACM International Conference on Advances in Computer Entertainment Technology | | | |
2015 | Discovery of De-identification Policies Considering Re-identification Risks and Information Loss | He-Ming Ruan; Ming-Hwa Tsai; Yen-Nun Huang; Yen-Hua Liao; CHIN-LAUNG LEI | the 10th Asia Joint Conference on Information Security | | | |
2015 | Discovery of De-identification Policies Considering Re-identification Risks and Information Loss | He-Ming Ruan; CHIN-LAUNG LEI | Engineering Science & Technology Bulletin | | | |
2002 | Distributed and On-Line Routing on Tori | Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; CHIN-LAUNG LEI ; HSU-CHUN YEN | Algorithmica | 0 | | |
2002 | Distributed and On-Line Routing on Tori | T. H. Yeh; C. M. Kuo; C. L. Lei; H. C. Yen; CHIN-LAUNG LEI | Algorithmica | | | |
2004 | Divisible Blind Signatures based on Hash Chains | C. I. Fan; CHIN-LAUNG LEI | International Journal of Computers and Applications | | | |
2016 | DN Storage: A Stream-based Storage System over Software-defined Networks | Ming-Hung Wang; Po-Wen Chi; Jing-Wei Guoy; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE International Conference on Computer Communications | 3 | 0 | |