Issue Date | Title | Author(s) | Source | scopus | WOS | Fulltext/Archive link |
1996 | Blind Threshold Signatures Based on Discrete Logarithm. | Juang, Wen-Shenq; CHIN-LAUNG LEI | Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, Proceedings | | | |
2016 | Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums | Ming-Hung Wang; CHIN-LAUNG LEI | the 13th Annual IEEE Consumer Communications & Networking Conference | | | |
2007 | Bounding Peer-to-Peer Upload Traffic in Client Networks | Chun-Ying Huang; CHIN-LAUNG LEI | 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007) | | | |
2008 | Broadcast Authentication in Sensor Networks using Compressed Bloom Filters | Yu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI | the 4th IEEE International Conference on Distributed Computing in Sensor Systems | | | |
2002 | Building E-marketplaces with Mobile Agents | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era | | | |
2006 | Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering | Chien-Hua Chiu; Chin-Yen Lee; Pan-Lung Tsai; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | | | |
2022 | Building Machine Learning-based Threat Hunting System from Scratch | Chen, Chung Kuan; Lin, Si Chen; Huang, Szu Chun; Chu, Yung Tien; CHIN-LAUNG LEI ; Huang, Chun Ying | Digital Threats: Research and Practice | 1 | 0 | |
2017 | CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | National Computer Symposium | | | |
2012 | Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value | Yi-Cheng Tsai; Zheng-Hui Chen; Jan-Ming Ho; Ming-Yang Kao; Chin-Laung Lei; Szu-Lang Liao; CHIN-LAUNG LEI | IEEE Computational Intelligence | | | |
1994 | A Collision Free Secret Ballot Protocol for Computerized General Elections | Juang, W. S.; Lei, C. L. | | 30 | 26 | |
1996 | A collision-free secret ballot protocol for computerized general elections | Juang, Wen-Shenq; Lei, Chin-Laung | Computers & Security | 32 | 26 | |
1996 | A collision-free secret ballot protocol for computerized general elections | Juang, W.-S.; CHIN-LAUNG LEI | Computers and Security | 32 | 26 | |
2004 | Comments on Improved Proxy Deposit Protocol for E-cash Systems | Y. P. Chiu; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | 14th Conference on Information Security | | | |
2001 | Comments on Improved User Efficient Blind Signatures | C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI | 11th Conference on Information Security | | | |
2014 | Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA | Yi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; CHIN-LAUNG LEI | the 10th Annual Conference of the Asia-Pacific Association of Derivatives | | | |
2001 | Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes | T. H. Yeh; CHIN-LAUNG LEI | IEICE Transactions on Information and Systems | | | |
1998 | Competitive analysis of on-line disk scheduling | Yeh, T.-H.; Kuo, C.-M.; CHIN-LAUNG LEI ; HSU-CHUN YEN | Theory of Computing Systems | 7 | 6 | |
1996 | Competitive Analysis of On-Line Disk Scheduling. | Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; Lei, Chin-Laung; CHIN-LAUNG LEI ; HSU-CHUN YEN | Algorithms and Computation, 7th International Symposium, ISAAC '96, Osaka, Japan, December 16-18, 1996, Proceedings | 3 | 0 | |
2009 | Computer and Network Security in Practice Applying to High-tech Society | Shiuh-Jeng Wang; Chung-Huang Yang; CHIN-LAUNG LEI | | | | |
2006 | Confessible Threshold Ring Signatures | Yu-Shian Chen; Chin-Laung Lei; Yu-Peng Chiu; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | | | |