公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
---|---|---|---|---|---|---|
2001 | Fair Blind Threshold Signatures Based on Discrete Logarithms | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | Computer Systems – Science and Engineering | 2 | 2 | |
2001 | Fair Blind Threshold Signatures in Wallet with Observers | W. S. Juang; H. T. Liaw; C. L. Lei; P. C. Lin; CHIN-LAUNG LEI | 2001 National Computer Symposium | |||
2001 | Fairness in E-cash Systems | H. J. Chen; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | Information Security Newsletter | |||
1999 | Issues for Building Virtual Private Networks | C. L. Lei; CHIN-LAUNG LEI | 1999 Computer & Communications Technologies conference | |||
2002 | Mobile Agents for E-marketplaces in Wireless Networks | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | The 13th Workshop on Object Oriented Technology and Application | |||
2003 | On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective | Y. M. Hsu; C. L. Lei; CHIN-LAUNG LEI | The fourth Workshop for Management Sciences | |||
2006 | On the Sensitivity of Online Game Playing Time to Network QoS | K. T. Chen; P. Huang; C. Y. Huang; C. L. Lei; CHIN-LAUNG LEI ; POLLY HUANG | 25th Conference on Computer Communications (IEEE INFOCOM 2006) | 40 | 0 | |
1999 | Partially Blind Threshold Signatures Based on Discrete Logarithms | W. S. Juang; C. L. Lei; CHIN-LAUNG LEI | Computer Communications | 24 | 19 | |
2003 | Privacy and Anonymity Protection wit Blind Threshold Signatures | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | International Journal of Electronic Commerce | |||
1999 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | 1999 National Computer Symposium | 4 | 4 | |
2002 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | Journal of Information Science and Engineering | 4 | 4 | |
2004 | Roundly Router Stamping: Detect and Mitigate DDoS Attacks | C. Y. Huang,; C. L. Lei; CHIN-LAUNG LEI | 14th Conference on Information Security | |||
2005 | Secure Content Delivery using Key Composition | C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI | 30th Annual IEEE Conference on Local Computer Networks | 0 | 0 | |
2005 | Secure Multicast Using Proxy Encryption | Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI | the Seventh International Conference on Information and Communications Security | 35 | 0 | |
1999 | Skins as a Mechanism for Making Languages Syntactically Extensible | Y. C. Sun; C. L. Lei; CHIN-LAUNG LEI | 1999 National Computer Symposium | |||
2001 | Smart Card Payment Today and Tomorrow | C. L. Lei; C. E. Yin; CHIN-LAUNG LEI | Information Security Newsletter | |||
2005 | The Security of Mobile E-Commerce | C. L. Lei; Chun-I Fan; CHIN-LAUNG LEI | ||||
2003 | User Efficient Fair Blind Signatures | P. L. Yu; C. L. Lei; H. J. Chen; C. Y. Huang; CHIN-LAUNG LEI | Second International Workshop for Asia Public Key Infrastructure |