Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Organizations
  • Researchers
  • Research Outputs
  • Explore by
    • Organizations
    • Researchers
    • Research Outputs
  • Academic & Publications
  • Sign in
  • 中文
  • English
  1. NTU Scholars
  2. Research Outputs

Browsing by Author


Jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 225 to 244 of 297 < previous   next >
Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
2016SDN Migration: An Ef?cient Approach to Integrate OpenFlow Networks with STP-enabled NetworksPo-Wen Chi; Ming-Hung Wang; Jing-Wei Guo; Chin-Laung Lei; CHIN-LAUNG LEI International Computer Symposium
2017SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled NetworksChi, P.-W.; Wang, M.-H.; Guo, J.-W.; Lei, C.-L.; CHIN-LAUNG LEI Proceedings - 2016 International Computer Symposium, ICS 201640
2016SDNort: A Software Defined Network Testing Framework Using OpenflowPo-Wen Chi; Ming-Hung Wang; Che-Wei Lin; Jing-Wei Guo; Chin-Laung Lei; Nen-Fu Huang; CHIN-LAUNG LEI 11th Asia Joint Conference on Information Security10
2017SDUDP: A Reliable UDP-based Transmission Protocol over SDNMing-Hung Wang; Lung-Wen Chen; Po-Wen Chi; Chin-Laung Lei; CHIN-LAUNG LEI IEEE Access2215
2005Secure Content Delivery using Key CompositionC. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI 30th Annual IEEE Conference on Local Computer Networks 00
2007Secure Multicast in Dynamic EnvironmentsChun-Ying Huang; Yun-Peng Chiu; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI Computer Networks 1416
2005Secure Multicast Using Proxy EncryptionY. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI the Seventh International Conference on Information and Communications Security 350
1997Secure rewarding schemesFan, Chun-I; Lei, Chin-Laung System Sciences 40
2013Security Event Handling Framework For Advanced Metering InfrastructureHe-Ming Ruan; Gan Wei Yeap; Chin-Laung Lei; CHIN-LAUNG LEI International Conference on Applied and Theoretical Information Systems Research 
2011Security Threats in Advanced Metering InfrastructureHe-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI The 6th Joint Workshop on Information Security 
2019Semantics-Guided Data Hallucination for Few-Shot Visual Classification.Lin, Chia-Ching; Wang, Yu-Chiang Frank; Lei, Chin-Laung; YU-CHIANG WANG ; CHIN-LAUNG LEI 2019 IEEE International Conference on Image Processing, ICIP 2019, Taipei, Taiwan, September 22-25, 201910
2012SEMPRE: Secure Multicast Architecture Using Proxy Re-EncryptioYun-Peng Chiu; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control 
2018SFaaS: Keeping an Eye on IoT Fusion Environment with Security Fusion as a ServiceChien-Ting Kuo; Po-Wen Chi; Victor Chang; Chin-Laung Lei; CHIN-LAUNG LEI Future Generation Computer Systems2416
1999Skins as a Mechanism for Making Languages Syntactically ExtensibleY. C. Sun; C. L. Lei; CHIN-LAUNG LEI 1999 National Computer Symposium 
2001Smart Card Payment Today and TomorrowC. L. Lei; C. E. Yin; CHIN-LAUNG LEI Information Security Newsletter 
2010Smart Card-based Secure Web Services in the Three-party SettingRen-Chiun Wang; Wen-Shenq Juang; Chin-Laung Lei; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control 32
2018SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social EventsMing-Hung Wang; Chin-Laung Lei; CHIN-LAUNG LEI Journal of Information Science and Engineering22
2018SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events王銘宏(MING-HUNG WANG); 雷欽隆(CHIN-LAUNG LEI); CHIN-LAUNG LEI Journal of Information Science and Engineering22
2017A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure TonesHung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Wei-Chou Lai; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI Euro-China Conference on Intelligent Data Analysis and Application10
2014Stratus: Check and Share Encrypted Data among Heterogeneous Cloud StorageYu-Shian Chen; He-Ming Ruan; Chin-Laung Lei; CHIN-LAUNG LEI Journal of Internet Technology 00
Showing results 225 to 244 of 297 < previous   next >

臺大位居世界頂尖大學之列,為永久珍藏及向國際展現本校豐碩的研究成果及學術能量,圖書館整合機構典藏(NTUR)與學術庫(AH)不同功能平台,成為臺大學術典藏NTU scholars。期能整合研究能量、促進交流合作、保存學術產出、推廣研究成果。

To permanently archive and promote researcher profiles and scholarly works, Library integrates the services of “NTU Repository” with “Academic Hub” to form NTU Scholars.

總館學科館員 (Main Library)
醫學圖書館學科館員 (Medical Library)
社會科學院辜振甫紀念圖書館學科館員 (Social Sciences Library)

開放取用是從使用者角度提升資訊取用性的社會運動,應用在學術研究上是透過將研究著作公開供使用者自由取閱,以促進學術傳播及因應期刊訂購費用逐年攀升。同時可加速研究發展、提升研究影響力,NTU Scholars即為本校的開放取用典藏(OA Archive)平台。(點選深入了解OA)

  • 請確認所上傳的全文是原創的內容,若該文件包含部分內容的版權非匯入者所有,或由第三方贊助與合作完成,請確認該版權所有者及第三方同意提供此授權。
    Please represent that the submission is your original work, and that you have the right to grant the rights to upload.
  • 若欲上傳已出版的全文電子檔,可使用Sherpa Romeo網站查詢,以確認出版單位之版權政策。
    Please use Sherpa Romeo to find a summary of permissions that are normally given as part of each publisher's copyright transfer agreement.
  • 網站簡介 (Quickstart Guide)
  • 使用手冊 (Instruction Manual)
  • 線上預約服務 (Booking Service)
  • 方案一:臺灣大學計算機中心帳號登入
    (With C&INC Email Account)
  • 方案二:ORCID帳號登入 (With ORCID)
  • 方案一:定期更新ORCID者,以ID匯入 (Search for identifier (ORCID))
  • 方案二:自行建檔 (Default mode Submission)
  • 方案三:學科館員協助匯入 (Email worklist to subject librarians)
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback