公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 |
1996 | Anonymous Channel and Authentication in Wireless Communication | Lei, C. L.; Juang, W. S.; Fan, C. I. | Proceedings of International Conference on Networking and Multimedia | | | |
1996 | Blind Threshold Signatures Based on Discrete Logarithm | Juang, W. S.; Lei, C. L. | Proceedings of the 2nd Asian Computing Science Conference, Lecture Notes in Computer Science 1179 | | | |
1985 | Branching Time Logic Strikes Back | Emerson, E. A.; Lei, C. L. | | | | |
1996 | Competitive Analysis of On-line Disk Scheduling | Yeh, T. H.; Kuo, C. M.; Lei, C. L.; H. C. Yen | Proceedings of the 7th International Symposium on Algorithm and Computation, Lecture Notes in Computer Science 1178 | | | |
1997 | Competitive Source Routing on Tori and Meshes | Yeh, T. H.; Kuo, C. M.; Lei, C. L.; H. C. Yen | Proceedings of the 8th International Symposium on Algorithm and Computation, Lecture Notes in Computer Science 1350 | | | |
1996 | Data Prefetching for Distributed Shared Memory Systems | Lai, I. C.; Lei, C. L. | 29th Annual Hawaii International Conference on System Sciences | | | |
1997 | The Design of a Fully Distributed Reusable Component Repositories System | Sun, Y. C.; Lei, C. L.; Kuo, M. L. | Proceedings of National Computer Symposium 1997 | | | |
2004 | Divisible blind signatures based on hash chains | Fan, C. I.; Lei, C. L. | International Journal of Computers & Applications | | | |
1993 | A dynamic cryptographic key assignment scheme in a tree structure | Liaw, H. T.; Wang, S. J.; Lei, C. L. | Computers & Mathematics with Applications | | | |
1993 | A Dynamic Cryptographic Key Assignment Scheme in a Tree Structure for Access Control | Tsai, H. M.; Kuo, S. Y.; Lei, C. L.; Chang, C. C. | National Computer Symposium | | | |
1998 | An Efficient Divisible Blind Signature Scheme | Fan, C. I.; Lei, C. L.; C. Y. Chang; Yu, P. L. | Proceedings of the 8th Conference on Information Security | | | |
1997 | Efficient Fair Blind Signatures for Electronic Cash | Fan, C. I.; Lei, C. L. | Proceedings of National Computer Symposium 1997 | | | |
1986 | Efficient Model Checking in Fragments of the Propositional Mu-Calculus | Emerson, E. A.; Lei, C. L. | IEEE Symposium on Logic in Computer Science | | | |
1997 | Fair Blind Threshold Signatures Based on Discrete Logarithm | Juang, W. S.; Lei, C. L. | Proceedings of National Computer Symposium 1997 | | | |
2001 | Fairness in E-cash Systems | Chen, H. J.; Lei, C. L.; Yu, P. L. | Information Security Newsletter | | | |
1994 | The Formalization and Hierarchy of Memory Consistency Models | Lai, I. C.; Lei, C. L. | International Computer Symposium | | | |
1996 | A High Performance Dynamic Token-Based Distributed Synchronization Algorithm | Lai, I. C.; Lei, C. L. | Proceedings of the 1997 International Symposium on Parallel Architectures, Algorithms and Networks | | | |
1998 | Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting | Lai, I. C.; Lei, C. L. | Proc. 2nd International Workshop on Communication, Architecture, and Applications for Network-based Parallel Computing, _TTS.PUBLISHPLACE | | | |
1989 | An Interval Logic for Reasoning about Timing Properties of Computer Communication Protocols | Shen, M.; Lei, C. L.; Chang, C. C. | 27th Allerton Conf. on Communication, Control, and Computing | | | |
1996 | A Java Security Model Based on Information Flow Control | Lei, C. L.; C. Y. Chang; Juang, W. S. | Proceedings of International Conference on Cryptology and Information Security | | | |