Issue Date | Title | Author(s) | Source | scopus | WOS | Fulltext/Archive link |
2019 | Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets | Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI | IEEE Access | | 11 | |
1996 | A collision-free secret ballot protocol for computerized general elections | Juang, W.-S.; Lei, C.-L.; CHIN-LAUNG LEI | Computers and Security | 30 | 25 | |
1998 | Competitive analysis of on-line disk scheduling | Yeh, T.-H.; Kuo, C.-M.; Lei, C.-L.; Yen, H.-C.; CHIN-LAUNG LEI | Theory of Computing Systems | 7 | 6 | |
1998 | Competitive analysis of on-line disk scheduling | Yeh, T.-H.; Kuo, C.-M.; Lei, C.-L.; Yen, H.-C.; HSU-CHUN YEN | Theory of Computing Systems | 7 | 6 | |
1997 | Competitive source routing on tori and meshes | Yeh, T.-H.; Kuo, C.-M.; Lei, C.-L.; Yen, H.-C.; CHIN-LAUNG LEI | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2 | 0 | |
1997 | Competitive source routing on tori and meshes | Yeh, T.-H.; Kuo, C.-M.; Lei, C.-L.; Yen, H.-C.; HSU-CHUN YEN | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2 | 0 | |
2020 | Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines | Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI | Proceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020 | | 0 | |
2001 | Cryptanalysis on improved user efficient blind signatures | Fan, C.-I.; Lei, C.-L. | Electronics Letters | | |  |
2009 | Effect of network quality on player departure behavior in online games | Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI | IEEE Transactions on Parallel and Distributed Systems | 47 | 31 | |
1996 | Efficient blind signature scheme based on quadratic residues | Fan, C.-I.; Lei, C.-L.; CHIN-LAUNG LEI | Electronics Letters | 38 | 28 | |
1996 | Efficient blind signature scheme based on quadratic residues | Fan, C.-I.; Lei, C.-L. | Electronics Letters | | |  |
1995 | An efficient password authentication scheme based on a unit circle | Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI | Cryptologia | 8 | 0 | |
2006 | An empirical evaluation of TCP performance in online games | Chen, K.-T.; Huang, C.-Y.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI | International Conference on Advances in Computer Entertainment Technology 2006 | 17 | 0 | |
2010 | Firework search for location aided routing enhancement in mobile ad-hoc networks | Hsu, C.-C.; Lei, C.-L.; CHIN-LAUNG LEI | MobiWac'10 - Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access, Co-located with MSWiM'10 | 2 | 0 | |
2012 | Forecasting online game addictiveness | Lou, J.-K.; Chen, K.-T.; Hsu, H.-J.; Lei, C.-L.; CHIN-LAUNG LEI | Annual Workshop on Network and Systems Support for Games | 2 | 0 | |
2008 | A generalizable methodology for quantifying user satisfaction | Huang, T.-Y.; Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI | IEICE Transactions on Communications | 8 | 3 | |
2017 | High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement-A new vision of non-blind audio steganography | Shiu, H.; Lin, B.-S.; Cheng, C.-W.; Huang, C.-H.; Lei, C.-L.; CHIN-LAUNG LEI | Symmetry | 5 | 7 | |
2006 | How sensitive are online gamers to network quality? | Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI | Communications of the ACM | 76 | 49 | |
2006 | Identifying MMORPG bots: A traffic analysis approach | Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; Chen, W.-C.; CHIN-LAUNG LEI | International Conference on Advances in Computer Entertainment Technology 2006 | 17 | 0 | |
2006 | The impact of network variabilities on TCP clocking schemes | Chen, K.-T.; Huang, P.; Huang, C.-Y.; Lei, C.-L.; POLLY HUANG | Proceedings - IEEE INFOCOM | 1 | 0 | |