公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
2006 | Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters | Tsai, Pan-Lung; Lei, Chin-Laung | Computer Communications | | | |
1996 | Blind Threshold Signatures Based on Discrete Logarithm. | Juang, Wen-Shenq; Lei, Chin-Laung; CHIN-LAUNG LEI | Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, Proceedings | 13 | 0 | |
2001 | Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes | Yeh, Tzuoo-hawn; Lei, Chin-laung | IEICE Trans. on Information and Systems E84-D | | | |
1996 | Competitive Analysis of On-Line Disk Scheduling. | Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; Lei, Chin-Laung; CHIN-LAUNG LEI ; HSU-CHUN YEN | Algorithms and Computation, 7th International Symposium, ISAAC '96, Osaka, Japan, December 16-18, 1996, Proceedings | 3 | 0 | |
2008 | Curtain: 使用布隆過濾器之感測器網路廣播認證機制 | 林逸侖; Lin, I-Lun | | | | |
2008 | Detecting VoIP Traffic Based on Human Conversation Patterns. | Wu, Chen-Chi; Chen, Kuan-Ta; Chang, Yu-Chun; Lei, Chin-Laung; CHIN-LAUNG LEI | Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers | 8 | 0 | |
2004 | An Efficient and Anonymous Buyer-Seller Watermarking Protocol | Lei, Chin-Laung; Yu, Pei-Ling; Tsai, Pan-Lung; Chan, Ming-Hwa; LeiChinLaung | IEEE Transactions on Image Processing | | | |
1992 | An efficient hierarchy scheme for determining relationships in information systems | Liaw, Horng-Twu; Lei, Chin-Laung | Computers & Mathematics with Applications | | | |
2005 | An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. | Kuo, Jen-Hao; Te, Siong-Ui; Liao, Pang-Ting; Huang, Chun-Ying; Tsai, Pan-Lung; Lei, Chin-Laung; Kuo, Sy-Yen; Huang, Yennun; CHIN-LAUNG LEI ; ZSEHONG TSAI ; SY-YEN KUO | 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China | 5 | 0 | |
2001 | Fair blind threshold signatures based on discrete logarithm | Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu | Computer Systems-Science and Engineering | | | |
2000 | A False-Sharing Free Distributed Shared Memory Management Scheme | Lai, Alexander I-Chi; Lei, Chin-Laung; Chiou, Hann-Huei | IEICE Trans. on Information and Systems E83-D | | | |
2001 | A Fully Distributed Approach to Repositories of Reusable Software Components | Sun, Yuen-Chang; Kao, Ming-Lin; Lei, Chin-Laung | Journal of Information Science and Engineering | | | |
2006 | Game traffic analysis: An MMORPG perspective | Chen, Kuan-Ta; Huang, Polly ; Lei, Chin-Laung | Computer Networks | 70 | | |
2009 | Identifying MMORPG Bots: A Traffic Analysis Approach (Extended) | Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin ; CHIN-LAUNG LEI ; POLLY HUANG | EURASIP Journal on Advances in Signal Processing | 41 | 25 | |
1987 | Modalities for Model Checking: Branching Time Logic Strikes Back. | Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI | Sci. Comput. Program. | 175 | 0 | |
1985 | Modalities for Model Checking: Branching Time Strikes Back. | Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI | Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, New Orleans, Louisiana, USA, January 1985 | 0 | 0 | |
1996 | A Multi-Recastable Ticket Scheme for Electronic Elections. | Fan, Chun-I; Lei, Chin-Laung; CHIN-LAUNG LEI | Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings | 17 | 0 | |
2000 | A Naming, Storage, and Retrieval Model for Software Assets | Sun, Yuen-Chang; Lei, Chin-Laung | IEICE Transactions on Information and Systems E83-D | | | |
2018 | Preserving privacy of online digital physiological signals using blind and reversible steganography (vol 151, pg 159, 2017) | Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; Lei, Chin-Laung; CHIN-LAUNG LEI | Computer Methods and Programs in Biomedicine | 0 | 0 | |
2003 | Privacy and Anonymity Protection with Blind Threshold Signatures | Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu | International Journal of Electronic Commerce | | | |