第 1 到 298 筆結果,共 298 筆。

公開日期標題作者來源出版物scopusWOS全文
12022Building Machine Learning-based Threat Hunting System from ScratchChen, Chung Kuan; Lin, Si Chen; Huang, Szu Chun; Chu, Yung Tien; CHIN-LAUNG LEI ; Huang, Chun YingDigital Threats: Research and Practice10
22021Joint feature disentanglement and hallucination for few-shot image classificationLin C.-C; Chu H.-L; YU-CHIANG WANG ; CHIN-LAUNG LEI IEEE Transactions on Image Processing106
32021PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPsChuang Y.-H; CHIN-LAUNG LEI IEEE Access
42021How to design a secure anonymous authentication and key agreement protocol for multi-server environments and prove its securityChuang Y.-H; Lei C.-L; Shiu H.-J.; CHIN-LAUNG LEI Symmetry
52020An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a surveyChuang, Y.-H.; CHIN-LAUNG LEI International Journal of Communication Systems6
62020Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design GuidelinesChuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI Proceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020
72020POSTER: Construct macOS Cyber Range for Red/Blue TeamsChen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
82019Efficient Key Agreement Protocol for Smart SensorsAlbert Guan; Chin-Laung Lei; CHIN-LAUNG LEI DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing00
92019Look at Me! Correcting Eye Gaze in Live Video CommunicationChih-Fan Hsu; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI ACM Transactions on Multimedia Computing Communications and Applications67
102019Assessing the profitability of timely opening range breakout breakout on index futures marketsYi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; Chuan-Ju Wang; CHIN-LAUNG LEI IEEE Access514
112019Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement schemeLei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI IEEE Access
122019An improved key-agreement protocol for channels with small error rateGuan, A.; CHIN-LAUNG LEI Journal of Internet Technology
132019Assessing the Profitability of Timely Opening Range Breakout on Index Futures MarketsTsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI IEEE Access
142019MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networksChi, P.-W.; Wang, M.-H.; Guo, J.-W.; CHIN-LAUNG LEI International Journal of Computational Science and Engineering
152019Semantics-Guided Data Hallucination for Few-Shot Visual Classification.Lin, Chia-Ching; Wang, Yu-Chiang Frank; Lei, Chin-Laung; YU-CHIANG WANG ; CHIN-LAUNG LEI 2019 IEEE International Conference on Image Processing, ICIP 2019, Taipei, Taiwan, September 22-25, 201930
162018Time-Shift Replacement Algorithm for Main Memory Performance OptimizationHong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI Journal of Supercomputing10
172018Uncovering Internal Threats Based on Open-source IntelligenceMeng-Han Tsai; Ming-Hung Wang; Wei-Chieh Yang; Chin-Laung Lei; CHIN-LAUNG LEI International Computer Symposium
182018Audit-Free Cloud Storage via Deniable Attribute-based EncryptionPo-Wen Chi; Chin-Luang Lei; CHIN-LAUNG LEI IEEE Transactions on Cloud Computing4229
192018Infection Categorization Using Deep AutoencoderMing-Hung Wang; Meng-Han Tsai; Wei-Chieh Yang; Chin-Laung Lei; CHIN-LAUNG LEI IEEE INFOCOM’18 Demo Session20
202018Exploring the Persistent Behavior of Financial MarketsYi-Cheng Tsai; Chuan-Ju Wang; William Cheung; Chung-Shu Wu; Jan-Ming Ho; Chin-Laung Lei; CHIN-LAUNG LEI Finance Research Letters31
212018SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events王銘宏(MING-HUNG WANG); 雷欽隆(CHIN-LAUNG LEI); CHIN-LAUNG LEI Journal of Information Science and Engineering22
222018SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social EventsMing-Hung Wang; Chin-Laung Lei; CHIN-LAUNG LEI Journal of Information Science and Engineering22
232018SFaaS: Keeping an Eye on IoT Fusion Environment with Security Fusion as a ServiceChien-Ting Kuo; Po-Wen Chi; Victor Chang; Chin-Laung Lei; CHIN-LAUNG LEI Future Generation Computer Systems2516
242018Realizing the Real-time Gaze Redirection System with Convolutional Neural NetworkChih-Fan Hsu; Yu-Cheng Chen; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI ACM Multimedia Systems Conference00
252018Preserving privacy of online digital physiological signals using blind and reversible steganography (vol 151, pg 159, 2017)Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; CHIN-LAUNG LEI Computer Methods and Programs in Biomedicine0
262017Is Foveated Rendering Perceivable? A Study on the Efficiency and Consistency of Subjective Assessment MethodsChih-Fan Hsu; Anthony Chen; Cheng-Hsin Hsu; Chun-Ying Huang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI ACM Multimedia
272017A Page Replacement Algorithm Based on Frequency Derived From Reference HistoryHong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI ACM SIGAPP Symposium On Applied Computing20
282017Toward High Throughput Backend Provision for Mobile Apps with a Microservice ApproachHe-Ming Ruan; Jen-Hao Kuo; Chun-Yi Chan; Chin-Laung Lei; CHIN-LAUNG LEI International Conferance on Internet Computing and Internet of Things
292017Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend SystemHe-Ming Ruan; Jen-Hao Kuo; Chun-Yi Chan; Chin-Laung Lei; CHIN-LAUNG LEI IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies20
302017Estimating Ideological Scores of Facebook Pages: An Empirical Study in TaiwanMing-Hung Wang; Alex Chuan-Hsien Chang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI The Computer Journal44
312017Data Hiding on Social Media Communications Using Text SteganographyHung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Po-Yang Huang; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI International Conference on Risks and Security of Internet and System100
322017Privacy Preserving of Online Digital Physiological Signals using Reversible SteganographyHung-Jr Shiu; Bor-Shing Lin; Chin-Laung Lei; CHIN-LAUNG LEI Computer Methods and Programs in Biomedicine3529
332017Temporal Dynamics of On-Line Political Ideology: Longitudinal Study on FacebookMing-Hung Wang; Alex Chuan-Hsien Chang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI Annual Conference of the European Political Science Association
342017A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure TonesHung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Wei-Chou Lai; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI Euro-China Conference on Intelligent Data Analysis and Application10
352017SDUDP: A Reliable UDP-based Transmission Protocol over SDNMing-Hung Wang; Lung-Wen Chen; Po-Wen Chi; Chin-Laung Lei; CHIN-LAUNG LEI IEEE Access2316
362017A Feasibility Analysis for Edge Computing Fusion in LPWA IoT Environment with SDN StructureChien-Ting Kuo; Victor Chang; Chin-Laung Lei; CHIN-LAUNG LEI InternationaWorkshop on Data Analytics and Emerging Services30
372017Automatic Test Pattern Generator for Fuzzing Based on Finite State MachinesMing-Hung Wang; Han-Chi Wang; Chin-Laung Lei; CHIN-LAUNG LEI Security and Communication Networks10
382017CAHR: Centrality-Aware Hybrid Replacement in Information-Centric NetworkHong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI National Computer Symposium
392017High Capacity Information Protection of Synthesized Pitches using Amplitude Enhancement-A New Vision of Acoustic SteganographyHung-Jr Shiu; Bor-Shing Lin; Chia-Wei Cheng; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI Symmetry
402017Enhanced Tame-based Key Predistribution Scheme for Sensor NetworksYen-Hwa Liao; Chin-Laung Lei; Ying-I Ko; Yu-Shian Chen; Chien-Hua Chiu; CHIN-LAUNG LEI Journal of Internet Technology11
412017Is foveated rendering perceivable in virtual reality? Exploring the efficiency and consistency of quality assessment methodsHsu, C.-F.; Chen, A.; Hsu, C.-H.; Huang, C.-Y.; Lei, C.-L.; Chen, K.-T.; CHIN-LAUNG LEI MM 2017 - Proceedings of the 2017 ACM Multimedia Conference
422017High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement-A new vision of non-blind audio steganographyShiu, H.; Lin, B.-S.; Cheng, C.-W.; Huang, C.-H.; CHIN-LAUNG LEI Symmetry
432017SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled NetworksChi, P.-W.; Wang, M.-H.; Guo, J.-W.; CHIN-LAUNG LEI Proceedings - 2016 International Computer Symposium, ICS 2016
442016Boosting Election Prediction Accuracy by Crowd Wisdom on Social ForumsMing-Hung Wang; CHIN-LAUNG LEI the 13th Annual IEEE Consumer Communications & Networking Conference
452016SDNort: A Software Defined Network Testing Framework Using OpenflowPo-Wen Chi; Ming-Hung Wang; Che-Wei Lin; Jing-Wei Guo; Chin-Laung Lei; Nen-Fu Huang; CHIN-LAUNG LEI 11th Asia Joint Conference on Information Security10
462016Investigating Vulnerabilities of HTML5 and HTTP/2.0 Websites Using FuzzingMing-Hung Wang; Ting-Chieh Lai; Han-Chi Wang; Lung-Wen Chen; Chin-Wei Tien; Jian-Wei Liao; Chin-Laung Lei; CHIN-LAUNG LEI Taiwan Academic Network Conference
472016SDN Migration: An Ef?cient Approach to Integrate OpenFlow Networks with STP-enabled NetworksPo-Wen Chi; Ming-Hung Wang; Jing-Wei Guo; Chin-Laung Lei; CHIN-LAUNG LEI International Computer Symposium
482016Method for processing and verifying remote dynamic data, system using the same, and computer-readable mediumYu-Shian Chen; Chin-Laung Lei; CHIN-LAUNG LEI 
492016DN Storage: A Stream-based Storage System over Software-defined NetworksMing-Hung Wang; Po-Wen Chi; Jing-Wei Guoy; Chin-Laung Lei; CHIN-LAUNG LEI IEEE International Conference on Computer Communications30
502015Modelling Articles Polarity and Identifying Influential Authors through Social MovementsMing-Hung Wang; CHIN-LAUNG LEI IEEE International Conference on Systems, Man, and Cybernetics
512015Efficient NFV Deployment in Data Center NetworksPo-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; CHIN-LAUNG LEI IEEE ICC 2015 - Next Generation Networking Symposium
522015Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage PricingYi-Cheng Tsai; Chin-Laung Lei; Jan-Ming Ho; Ming-Yang Kao; Szu-Lang Liao; CHIN-LAUNG LEI Journal of Information Science and Engineering
532015Discovery of De-identification Policies Considering Re-identification Risks and Information LossHe-Ming Ruan; Ming-Hwa Tsai; Yen-Nun Huang; Yen-Hua Liao; CHIN-LAUNG LEI the 10th Asia Joint Conference on Information Security
542015How to Detect a Compromised SDN SwitchPo-Wen Chi; Chien-Ting Kuo; Jing-Wei Guo; CHIN-LAUNG LEI IEEE Conference on Network Softwarization, Workshop on Security issues in SDN
552015Discovery of De-identification Policies Considering Re-identification Risks and Information LossHe-Ming Ruan; CHIN-LAUNG LEI Engineering Science & Technology Bulletin
562015Audit-Free Cloud Storage via Deniable Attribute-based EncryptionPo-Wen Chi; CHIN-LAUNG LEI IEEE Transactions on Cloud Computing
572015資訊安全稽核管控系統、方法及其電腦可讀取紀錄媒體郭建廷; 阮鶴鳴; 雷欽隆; CHIN-LAUNG LEI 
582015遠端動態資料的處理與驗證方法、系統,以及電腦可讀記錄媒體陳煜弦; 雷欽隆; CHIN-LAUNG LEI 
592014Give Me a Broadcast-Free NetworkPo-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; CHIN-LAUNG LEI Globecom 2014 - Next Generation Networking Symposium
602014Forecasting the Impacts of Articles and Authors on the Social Forum during EmergenciesMing-Hung Wang; CHIN-LAUNG LEI ICS 2014
612014Hybrid Intrusion Detection Framework for Advanced Metering InfrastructureHe-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI Workshop on Cryptography and Information Security, ICS 2014
622014存取控制系統及其存取控制方法阮鶴鳴; 雷欽隆; 劉永之; CHIN-LAUNG LEI 
632014A Security Assessment Environment and Process Design for Smart Meter Vendor Production LineChien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng ChenWorkshop on Cryptography and Information Security, ICS 2014
642014An AMI Threat Detection Mechanism Based on SDN NetworksPo-Wen Chi; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; CHIN-LAUNG LEI The Eighth International Conference on Emerging Security Information, Systems and Technologies
652014Stratus: Check and Share Encrypted Data among Heterogeneous Cloud StorageYu-Shian Chen; He-Ming Ruan; CHIN-LAUNG LEI Journal of Internet Technology
662014Fine-Grained Audit Privilege Control for Integrity Audit on Cloud StorageHe-Ming Ruan; CHIN-LAUNG LEI The 9th Asia Joint Conference on Information Security
672014Access Control System and Access Control Method ThereofChin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI 
682014Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USAYi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; CHIN-LAUNG LEI the 10th Annual Conference of the Asia-Pacific Association of Derivatives 
692014A Reversible Acoustic Data Hiding Method Based on Analog ModulationH. J. Shiu; S. Y. Tang; C. H. Huang; R .C. T. Lee; CHIN-LAUNG LEI Information Sciences7
702014A Social Diffusion Model with an Application on Election SimulationJing-Kai Lou; Fu-Min Wang; Chin-Hua Tsai; San-Chuan Hung; Perng-Hwa Kung; Kuan-Ta Chen; CHIN-LAUNG LEI ; SHOU-DE LIN The Scientific World Journal32
712013Access Control over Vulnerable Devices in Advanced Metering InfrastructureHe-Ming Ruan; Yun-Hsin Chuang; CHIN-LAUNG LEI National Computer Symposium 
722013Understanding Potential Microtask Workers for Paid CrowdsourcingMing-Hung Wang; Kuan-Ta Chen; Shuo-Yang Wang; CHIN-LAUNG LEI Conference on Human Computation & Crowdsourcing
732013Security Event Handling Framework For Advanced Metering InfrastructureHe-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI International Conference on Applied and Theoretical Information Systems Research 
742013Aggregate message authentication codes (AMACs) with on-the-fly verificationYu-Shian Chen; CHIN-LAUNG LEI International Journal of Information Security
752013Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic ApproachYeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI IGCVP 2013
762013Crowdsourcing Multimedia QoE Evaluation: A Trusted FrameworkChen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI IEEE Transactions on Multimedia
772013Aura: An Anonymous Universal Relay Architecture over Structured Peer-To-Peer NetworksJiunn-Jye Lee; Li-Yuan Lee; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control0
782013Etheragent: Scaling Ethernet for Enterprise and Campus NetworksChien-Hua Chiu; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control
792013A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc NetworksChia-Chang Hsu; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control
802013Access Control System and Access Control Method ThereofChin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI 
812013Gender Swapping and User Behaviors in Online Social GamesJing-Kai Lou; Kunwoo Park; Meeyoung Cha; Juyong Park; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI The 22nd International World Wide Web Conference (WWW2013)
822013An Adaptive Sector-Based Routing Model over Structured Peer-to-Peer NetworksJiunn-Jye Lee; Hann-Huei Chiou; Chia-Chang Hsu; CHIN-LAUNG LEI Computer Networks1
832013Understanding Potential MicrotaskWorkers for Paid Crowdsourcing.Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; CHIN-LAUNG LEI Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, An Adjunct to the Proceedings of the First AAAI Conference on Human Computation and Crowdsourcing, November 7-9, 2013, Palm Springs, CA, USA
842012A Lightweight Mutual Authentication Scheme for Advanced Metering InfrastructureChristine Peijinn Chai; He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Yun-Hsin Chuang; Chin-Laung Lei; Chun-Ying Huang; Chi-Wen Teng; Yuh-Sheng Shaw; Minsiong Liang; CHIN-LAUNG LEI The 2nd. International Conference on Applied and Theoretical Information Systems Research
852012Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security AuditingChien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng ChenInternational Computer Symposium, Advances in Intelligent Systems and Applications
862012Are all games equally cloud-gaming-friendly? An electromyographic approachYeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI 2012 International Workshop on Network and Systems Support for Games (NetGames 2012)
872012Foretelling Online Game AddictvenessJing-Kai Lou; Kuan-Ta Chen; Hwai-Jung Hsu; CHIN-LAUNG LEI 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) 
882012Efficient Mutual Authentication And Key Agreement With User Anonymity For Roaming Services In Global Mobility NetworksYun-Hsin Chuang; Yuh-Min Tseng; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control
892012A Decentralized Clustering Scheme for Transparent Mode DevicesChien-Hua Chiu; CHIN-LAUNG LEI Journal of Clustering Computing
902012Data Integrity on Remote Storage for On-line Co-workingHe-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI 7th Asia Joint Conference on Information Security
912012An Analysis of Security Patch Lifecycle Using Google Trend ToolChien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen7th Asia Joint Conference on Information Security
922012Radar Chart: Scanning for High QoE in QoS DimensionYu-Chun Chang; Chi-Jui Chang; Kuan-Ta Chen; CHIN-LAUNG LEI IEEE Network 
932012SEMPRE: Secure Multicast Architecture Using Proxy Re-EncryptioYun-Peng Chiu; Chun-Ying Huang; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control 
942012Enabling Efficient Batch Verification on Data Integrity for Remote StorageHe-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI The 13th International Conference on Internet Computing 
952012Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment ValueYi-Cheng Tsai; Zheng-Hui Chen; Jan-Ming Ho; Ming-Yang Kao; Chin-Laung Lei; Szu-Lang Liao; CHIN-LAUNG LEI IEEE Computational Intelligence
962012一種定位資訊之情境影像系統趙涵捷; 郭斯彥; 顏嗣鈞; 雷欽隆; 紀廷運; CHIN-LAUNG LEI 
972012Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor NetworksYen-Hua Liao; Chin-Laung Lei; Ai-Nung Wang; Wen-Chi Tsai; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control
982012Radar chart: Scanning for satisfactory QoE in QoS dimensionsChang, Y.-C.; Chang, C.-J.; Chen, K.-T.; CHIN-LAUNG LEI IEEE Network
992012Forecasting online game addictivenessLou, J.-K.; Chen, K.-T.; Hsu, H.-J.; CHIN-LAUNG LEI Annual Workshop on Network and Systems Support for Games
1002011Measuring the latency of cloud gaming systemsKuan-Ta Chen; Yu-Chun Chang; Po-Han Tseng; Chun-Ying Huang; CHIN-LAUNG LEI ACM international conference on Multimedi
1012011An Efficient Conference-Key Agreement Protocol for Mobile DevicesRen-Chiun Wang; Chun-Han Tung; CHIN-LAUNG LEI National Computer Symposium 
1022011A Mechanism on Risk Analysis of Information Security with Dynamic AssessmentChien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen3rd International Workshop on Managing Insider Security Threats
1032011Security Threats in Advanced Metering InfrastructureHe-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; CHIN-LAUNG LEI The 6th Joint Workshop on Information Security 
1042011AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology SecurityChien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng ChenThe 6th Joint Workshop on Information Security 
1052011Provably Secure and Efficient Identification and Key Agreement Protocol with User AnonymityRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI Journal of Computer and System Sciences2414
1062011Understanding the Performance of Thin-Client GamingYu-Chun Chang; Kuan-Ta Chen; Po-Han Tseng; CHIN-LAUNG LEI 2011 Annual IEEE Communications Quality and Reliability (CQR) International Workshop
1072011Generic Framework for Electronic Anonymous AuctionsHe-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI International Conference on Information Security 
1082011DevilTyper: A Game for CAPTCHA Usability EvaluationChien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; CHIN-LAUNG LEI ACM Computer in Entertainment
1092011Quantifying QoS Requirements of Network Services: A Cheat-Proof FrameworkKuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI ACM Multimedia Systems Conference (MMSys 2011)
1102011World of Warcraft Avatar History DatasetYeng-Ting Lee; Kuan-Ta Chen; Yun-Maw Cheng; CHIN-LAUNG LEI ACM Multimedia Systems Conferene
1112011Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret KeyRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI Computer Communications58
1122011存取控制系統及其存取控制方法,阮鶴鳴; 雷欽隆; 劉永之; CHIN-LAUNG LEI 
1132010DevilTyper: A Game for Quantifying the Usability of CAPTCHA TestsChien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; CHIN-LAUNG LEI 7th ACM International Conference on Advances in Computer Entertainment Technology 
1142010Smart Card-based Secure Web Services in the Three-party SettingRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control
1152010A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc NetworksChia-Chang Hsu; CHIN-LAUNG LEI 8th ACM International Symposium on Mobility Management and Wireless Access 
1162010What can the temporal social behavior tell us? An estimation of vertex-betweenness using dynamic social informationJing-Kai Lou; Shou-de Lin; Kuan-Ta Chen; CHIN-LAUNG LEI ; SHOU-DE LIN The 2010 International Conference on Advances in Social Networks Analysis and Mining
1172010Radar Chart: Scanning for High QoE in QoS DimensionsYu-Chun Chang; Chi-Jui Chang; Kuan-Ta Chen; CHIN-LAUNG LEI 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop
1182010Online Game QoE Evaluation using Paired ComparisonsYu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; Chien-Ju Ho; CHIN-LAUNG LEI 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop
1192010Generic Framework Intimating Conventional Anonymous AuctionsYu-Shian Chen; CHIN-LAUNG LEI the 20th Cryptology & Information Security Conference 
1202010Filtering False Messages En-route in Wireless Multi-hop NetworksYu-Shian Chen; CHIN-LAUNG LEI IEEE Wireless Communications and Networking Conference
1212010Quadrant of Euphoria: A Crowdsourcing Platform for QoE AssessmentKuan-Ta Chen; Chi-Jui Chang; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI IEEE Network
1222010Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear PairingsWen-Shenq Juang; Chin-Laung Lei; Horng-Twu Liaw; Wei-Ken Nien; CHIN-LAUNG LEI International Journal of Innovative Computing Information and Control
1232010A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication SystemsRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI International Journal of Ad Hoc and Ubiquitous Computing
1242010Firework search for location aided routing enhancement in mobile ad-hoc networksHsu, C.-C.; CHIN-LAUNG LEI MobiWac'10 - Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access, Co-located with MSWiM'10
1252009A Robust Grid-based Key Predistribution Scheme for Sensor NetworksYen-Hua Liao; Chin-Laung Lei; Wen-Chi Tsai; CHIN-LAUNG LEI ; AI-NUNG WANG Fourth International Conference on Innovative Computing, Information and Control
1262009A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication SystemsRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI Workshop on Mobile Computing and Wireless Communication, NCS2009
1272009On the Challenges and Designs of Transport Protocols for MMORPGsChen-Chi Wu; Kuan-Ta Chen; Chih-Ming Chen; POLLY HUANG ; CHIN-LAUNG LEI Springer Multimedia Tools and Applications
1282009A crowdsourceable QoE evaluation framework for multimedia contentKuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI ACM Multimedia 2009
1292009A Geographic Scheme with Location Update for Ad Hoc RoutingChia-Chang Hsu; CHIN-LAUNG LEI International Conference on Systems and Networks Communications
1302009Computer and Network Security in Practice Applying to High-tech SocietyShiuh-Jeng Wang; Chung-Huang Yang; CHIN-LAUNG LEI 
1312009A Robust Hypercube-based Pairwise Key Establishment for Sensor NetworksYen-Hua Liao; Chin-Laung Lei; Ai-Nung Wang; Wen-Chi Tsai; CHIN-LAUNG LEI The 4th Joint Workshop on Information Security 
1322009An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN MessengerChen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video
1332009Fair anonymous rewarding based on electronic cashChun-I Fan; Shi-Yuan Huang; Pei-Hsiu Ho; CHIN-LAUNG LEI Journal of Systems and Software
1342009A Prevention Approach to Scrambling Attack in WiMAX NetworksPowen Chi; CHIN-LAUNG LEI The 10th IEEE International Symposium on a World of Wireless, Mobile and Multmedia Networks
1352009Peer-to-Peer Application Recognition Based on Signaling ActivityChen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI IEEE International Conference on Communications (ICC)
1362009Identifying MMORPG Bots: A Traffic Analysis Approach (Extended)Chen, Kuan-Ta; Jiang, Jhih-Wei; POLLY HUANG ; Chu, Hao-Hua; CHIN-LAUNG LEI ; CHEN, WEN-CHIN EURASIP Journal on Advances in Signal Processing
1372009A Security Enhancement for Two User Identification Schemes with Anonymity against Active AttacksRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI the 19th Cryptology & Information Security Conference 
1382009A Robust Authentication Scheme with User Anonymity for Wireless EnvironmentsRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI International Journal of Innovative Computing, Information and Control
1392009User Authentication Scheme with Privacy-preservation for Multi-server EnvironmentRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI IEEE Communications Letters
1402009A Collusion-Resistant Automation Scheme for Social Moderation SystemsJing-Kai Lou; Kuan-Ta Chen; CHIN-LAUNG LEI the 6th annual IEEE Consumer Communications and Networking Conference
1412009Tame pool-based pairwise key predistribution for large-scale sensor networksLiao, Y.-H.; CHIN-LAUNG LEI ; AI-NUNG WANG ; Tsai, W.-C.GLOBECOM - IEEE Global Telecommunications Conference13
1422008Inferring Speech Activity from Encrypted Skype TrafficYu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; CHIN-LAUNG LEI IEEE Global Telecommunications Conference, GLOBECOM'08
1432008一種定位資訊之情境影像裝置趙涵捷; 郭斯彥; 顏嗣鈞; 雷欽隆; 紀廷運; CHIN-LAUNG LEI 
1442008A Web Metering Scheme for Fair Advertisement TransactionsRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI International Journal of Security and Its Applications
1452008高韌性同儕網路及其在即時多媒體上之應用-同儕網路計算之信任與安全機制的設計與實作 (新制多年期第1年)雷欽隆 
1462008影像偵測觸控學習裝置趙涵捷; 郭斯彥; 顏嗣鈞; 雷欽隆; 紀廷運; CHIN-LAUNG LEI 
1472008Information SecurityTzong-Chen; Chin-Laung Lei; Vincent Rijmen; Der-Tsai Lee; CHIN-LAUNG LEI 
1482008A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor NetworksLi Chen; Chia-Chang Hsu; CHIN-LAUNG LEI International Workshop on Wireless Technologies for Smart Homes
1492008A Sector-Based Routing Model over Structured Peer-to-Peer NetworksJiunn-Jye Lee; Hann-Huei Chiou; Yu-Sheng Yang; Yu-Cheng Su; CHIN-LAUNG LEI International Workshop on Wireless Technologies for Smart Homes
1502008OneClick: A Framework for Capturing Users Network ExperiencesCheng-Chun Tu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI ACM SIGCOMM 2008
1512008Detecting Peer-to-Peer Activity by Signaling PacketsChen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI ACM SIGCOMM 2008
1522008無線感測網路之關鍵技術及在社區照護之應用-子計畫五:無線感測網路下位置知覺醫療照護服務之安全性架構(3/3)雷欽隆 
1532008Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear PairingsWen-Shenq Juang; Chin-Laung Lei; Horng-Twu Liaw; Wei-Ken Nien; CHIN-LAUNG LEI The 3rd Joint Workshop on Information Security
1542008Detecting VoIP Traffic Based on Human Conversation PatternsChen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications
1552008Lightweight Broadcast Authentication for Multiple Senders in Sensor NetworksYu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI The 3rd Joint Workshop on Information Security 
1562008Broadcast Authentication in Sensor Networks using Compressed Bloom FiltersYu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI the 4th IEEE International Conference on Distributed Computing in Sensor Systems
1572008A Web Metering Scheme for Fair Advertisement TransactionsRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI the 2nd International Conference on Information Security and Assurance
1582008An Anonymous and Deniable Conversation for a Thin ClientRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI Fourth International Symposium on Frontiers in Networking with Applications (FINA2008)
1592008A Generalizable Methodology for Quantifying User SatisfactionHuang, Te-Yuan; Chen, Kuan-Ta; POLLY HUANG ; CHIN-LAUNG LEI IEICE Transactions on Communications E91-B103
1602008Detecting VoIP Traffic Based on Human Conversation Patterns.Wu, Chen-Chi; Chen, Kuan-Ta; Chang, Yu-Chun; CHIN-LAUNG LEI Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers
1612008Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. ProceedingsCHIN-LAUNG LEI 
1622008Effect of Network Quality on Player Departure Behavior in Online GamesChen, Kuan-Ta; Huang, Polly ; CHIN-LAUNG LEI IEEE Transaction on Parallel and Distributed Computing6037
1632007A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost ProblemRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI The Third International Symposium on Security in Ubiquitous Computing
1642007量子演算法之研究及其在密碼學之應用(3/3)雷欽隆 
1652007A High-Performance Clustering Scheme with Application in Network Intrusion Prevention SystemChien-Hua Chiu; CHIN-LAUNG LEI the 7th IEEE International Symposium on Communications and Information Technologies
1662007A Survey of Secure Data Aggregation on Sensor NetworksYu-Shian Chen; Hsu-Chun Hsiao; CHIN-LAUNG LEI Communications of CCISA 
1672007A Universal Anonymous System for Structured Peer-to-Peer NetworksLi Yuan Lee; Jiunn Jye Lee; CHIN-LAUNG LEI IEEE TENCON 2007
1682007可擴充及調適高速封包處理架構及其在網路安全上之應用 (新制多年期第1年)雷欽隆 
1692007Secure Multicast in Dynamic EnvironmentsChun-Ying Huang; Yun-Peng Chiu; Kuan-Ta Chen; CHIN-LAUNG LEI Computer Networks16
1702007Bounding Peer-to-Peer Upload Traffic in Client NetworksChun-Ying Huang; CHIN-LAUNG LEI 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007)
1712007Design and Implementation of Secure Communication Channels over UPnP NetworksJiunn-Jye Lee; Chun-Ying Huang; CHIN-LAUNG LEI 2007 International Conference on Multimedia and Ubiquitous Engineering
1722007A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing EnvironmentsRen-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI 2007 International Conference on Multimedia and Ubiquitous Engineering
1732007A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy CryptographyC. Y. Huang; Y. P. Chiu; K. T. Chen; CHIN-LAUNG LEI to appear in ACM Symposium on InformAtion, Computer and Communications Security
1742007感測網路的安全資料彙集機制之概觀陳煜弦; 蕭旭君 ; 雷欽隆 資訊安全通訊
1752006Analysis and Evaluation of a Multiple Gateway Traffic-Distribution Scheme for Gateway ClustersPan-Lung Tsai; CHIN-LAUNG LEI Computer Communications
1762006VOIP SECURITY (IN COLLECTED PAPERS ON INFORMATION AND COMMUNICATION SECURITY)Juang, Wen-Shenq; Chen, Sian-Teng; Lei, Chin-Laung 
1772006Game Traffic Analysis: An MMORPG Perspective (Extended)Kuan-Ta Chen; POLLY HUANG ; CHIN-LAUNG LEI Computer Networks8149
1782006Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive ClusteringChien-Hua Chiu; Chin-Yen Lee; Pan-Lung Tsai; Chun-Ying Huang; CHIN-LAUNG LEI International Conference on Systems and Networks Communications (ICSNC 2006)
1792006Network Game Design: Hints and Implications of Player InteractionKuan-Ta Chen; CHIN-LAUNG LEI NetGames 2006
1802006Confessible Threshold Ring SignaturesYu-Shian Chen; Chin-Laung Lei; Yu-Peng Chiu; Chun-Ying Huang; CHIN-LAUNG LEI International Conference on Systems and Networks Communications (ICSNC 2006)
1812006Quantifying Skype User SatisfactionKuan-Ta Chen; Chun-Ying Huang; Polly Huang; CHIN-LAUNG LEI ; POLLY HUANG ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communicat (SIGCOMM 2006)
1822006Design Implications of Social Interaction for Online GamesKuan-Ta Chen; CHIN-LAUNG LEI IFIP 5th International Conference on Entertainment Computing (ICEC 2006)
1832006Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterC. Y. Huang; K. T. Chen; CHIN-LAUNG LEI 2006 International Conference on Dependable Systems and Networks (DSN-2006)
1842006On the Sensitivity of Online Game Playing Time to Network QoSK. T. Chen; P. Huang; C. Y. Huang; CHIN-LAUNG LEI ; POLLY HUANG 25th Conference on Computer Communications (IEEE INFOCOM 2006)
1852006An empirical evaluation of TCP performance in online gamesChen, K.-T.; Huang, C.-Y.; Huang, P.; POLLY HUANG ; CHIN-LAUNG LEI International Conference on Advances in Computer Entertainment Technology 2006200
1862006Quantifying Skype user satisfaction.Chen, Kuan-Ta; Huang, Chun-Ying; Huang, Polly; POLLY HUANG ; CHIN-LAUNG LEI Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 200600
1872006The impact of network variabilities on TCP clocking schemesChen, K.-T.; Huang, P.; Huang, C.-Y.; POLLY HUANG ; CHIN-LAUNG LEI Proceedings - IEEE INFOCOM10
1882006Identifying MMORPG bots: A traffic analysis approachChen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; POLLY HUANG ; WEN-CHIN CHEN ; CHIN-LAUNG LEI International Conference on Advances in Computer Entertainment Technology 2006180
1892006How sensitive are online gamers to network quality?Chen, Kuan-Ta; POLLY HUANG ; CHIN-LAUNG LEI Communications of the ACM9153
1902006How sensitive are online gamers to network quality?Chen, K.-T.; Huang, P.; CHIN-LAUNG LEI Communications of the ACM
1912006Identifying MMORPG Bots: A Traffic Analysis ApproachChen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly ; Chu, Hao-Hua; Lei, Chin-Laung ; Chen, Wen-Chin 4025
1922005A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private NetworksP. L. Tsai; C. Y. Huang; Y. Y. Huang; C. C. Hsu; CHIN-LAUNG LEI the 12th Annual IEEE International Conference on High Performance Computing
1932005Extending Cluster File Systems beyond Last MilesH. H. Chiou; P. L. Tsai; J. J. Lee; H. F. Tung; CHIN-LAUNG LEI IEEE TENCON’05
1942005Secure Content Delivery using Key CompositionC. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; CHIN-LAUNG LEI 30th Annual IEEE Conference on Local Computer Networks
1952005Automatic Generation of Conflict-Free IPSec PoliciesC. L. Chang; Y. P. Chiu; CHIN-LAUNG LEI International Conference on Formal Techniques for Networked and Distributed Systems
1962005無線感測網路下位置知覺醫療照護服務之安全性架構雷欽隆 
1972005量子演算法之研究及其在密碼學之應用雷欽隆 
1982005An On-Line Page-Structure Approximation Scheme for Web ProxiesJ. J Lee; P. L. Tsai; CHIN-LAUNG LEI IEEE Distributed, Parallel and Network Applications
1992005Game Traffic Analysis: An MMORPG PerspectiveK. T. Chen; P. Huang; C. Y. Huang; CHIN-LAUNG LEI 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video
2002005The Security of Mobile E-CommerceC. L. Lei; Chun-I Fan; CHIN-LAUNG LEI 
2012005A CRT-Based Key Pre-distribution Scheme for Sensor NetworksC. L. Lei; P. W. Chi; Y. P. Chiu; CHIN-LAUNG LEI the 15th Conference on Information Security, 
2022005Secure Multicast Using Proxy EncryptionY. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI the Seventh International Conference on Information and Communications Security
2032005The impact of network variabilities on TCP clocking schemesChen, Kuan-Ta; Huang, Polly ; Huang, Chun-Ying; Lei, Chin-Laung INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies30
2042005An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.Kuo, Jen-Hao; Te, Siong-Ui; Liao, Pang-Ting; Huang, Chun-Ying; Tsai, Pan-Lung; Lei, Chin-Laung; Kuo, Sy-Yen; Huang, Yennun; CHIN-LAUNG LEI ; ZSEHONG TSAI ; SY-YEN KUO 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China50
2052005Game traffic analysis: an MMORPG perspective.Chen, Kuan-Ta; Huang, Polly; Huang, Chun-Ying; POLLY HUANG ; CHIN-LAUNG LEI Network and Operating System Support for Digital Audio and Video, 15th International Workshop, NOSSDAV 2005, Stevenson, Washington, USA, June 13-14, 2005, Proceedings00
2062004量子密碼協定之研究與設計雷欽隆 
2072004A Content-Protection Scheme for Multi-Layered Reselling StructuresP. L. Yu; P. L. Tsai; CHIN-LAUNG LEI 19th IFIP International Information Security Conference
2082004植基於Linux 之高效能安全叢集檔案系統之設計與實作 (II)雷欽隆 
2092004子計畫四:行動電子商務之安全代理人交易模式設計與平台 實作(3/3)雷欽隆 
2102004A Session Migration Scheme for Smart Web Services in Mobile ComputingP. L. Tsai; CHIN-LAUNG LEI International Symposium on Web Services and Applications (ISWS '04),
2112004An Efficient and Anonymous Buyer-Seller Watermarking ProtocolC. L. Lei; P. L. Yu; P. L. Tsai; M. H. Chan; CHIN-LAUNG LEI IEEE Transactions on Image Processing,117
2122004A Remote Control Scheme for Ubiquitous Personal ComputingP. L. Tsai; C. L. Lei; W. Y. Wang; CHIN-LAUNG LEI IEEE International Conference on Networking, Sensing and Control
2132004Roundly Router Stamping: Detect and Mitigate DDoS AttacksC. Y. Huang; CHIN-LAUNG LEI 14th Conference on Information Security
2142004Divisible Blind Signatures based on Hash ChainsC. I. Fan; CHIN-LAUNG LEI International Journal of Computers and Applications
2152004Comments on Improved Proxy Deposit Protocol for E-cash SystemsY. P. Chiu; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI 14th Conference on Information Security 
2162004An Efficient and Anonymous Buyer-Seller Watermarking ProtocolLei, Chin-Laung; Yu, Pei-Ling; Tsai, Pan-Lung; Chan, Ming-Hwa; LeiChinLaung IEEE Transactions on Image Processing 
2172004A remote control scheme for ubiquitous personal computingTsai, Pan-Lung; Lei, Chin-Laung ; Wang, Wen-Yang2004 IEEE International Conference on Networking, Sensing and Control80
2182003行動電子商務之安全代理人交易模式設計與平台實作 (2/3)雷欽隆 
2192003植基於Linux 之高效能安全叢集檔案系統之設計與實作(I)雷欽隆 
2202003Privacy and Anonymity Protection wit Blind Threshold SignaturesW. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI International Journal of Electronic Commerce 
2212003User Efficient Fair Blind SignaturesP. L. Yu; C. L. Lei; H. J. Chen; C. Y. Huang; CHIN-LAUNG LEI Second International Workshop for Asia Public Key Infrastructure 
2222003On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent PerspectiveY. M. Hsu; CHIN-LAUNG LEI The fourth Workshop for Management Sciences 
2232003Design and Implementation of a Secure and High Performance Linux-Based Cluster File SystemCHIN-LAUNG LEI 2003 International Conference on Open Source 
2242002Building E-marketplaces with Mobile AgentsC. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era 
2252002Designing E-Marketplace for Wireless PDA using Mobile Agents and KerberosC. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI 4th Workshop on Cyberspace:Information, Law and Society 
2262002An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff ElectionsC. I. Fan; CHIN-LAUNG LEI Journal of Network and Computer Applications2
2272002Provably Secure Blind Threshold Signatures Based on Discrete LogarithmC. L. Lei; W. S. Juang; CHIN-LAUNG LEI Journal of Information Science and Engineering
2282002Mobile Agents for E-marketplaces in Wireless NetworksC. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI The 13th Workshop on Object Oriented Technology and Application 
2292002A verifiable multi-authority secret election allowing abstention from votingW. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI The Computer Journal12
2302002Distributed and On-Line Routing on ToriT. H. Yeh; C. M. Kuo; C. L. Lei; H. C. Yen; CHIN-LAUNG LEI Algorithmica
2312002An Efficient Anonymous Buyer-Seller Watermarking ProtocolC. L. Lei; M. H. Chan; CHIN-LAUNG LEI 2002 International Computer Symposium, Workshop on Cryptology and Information Security 
2322002A User Efficient Fair Blind Signature Scheme for Untraceable Electronic CashC. I. Fan; CHIN-LAUNG LEI Journal of Information Science and Engineering
2332002Distributed and On-Line Routing on ToriYeh, Tzuoo-Hawn; Kuo, Cheng-Ming; CHIN-LAUNG LEI ; HSU-CHUN YEN Algorithmica0
2342002Provably Secure Blind Threshold Signatures Based on Discrete LogarithmLei, Chin-Laung; Juang, Wen-Shenq; Yu, Pei-Ling; LeiChinLaung Journal of Information Science and Engineering 
2352002Privacy and Anonymity Protection with Blind Threshold Signatures.Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu; CHIN-LAUNG LEI Int. J. Electronic Commerce
2362002An unlinkably divisible and intention attachable ticket scheme for runoff elections.Fan, Chun-I; CHIN-LAUNG LEI J. Network and Computer Applications
2372002行動電子商務系統關鍵技術之研發與實作─子計畫四:行動電子商務之安全代理人交易模式設計與平台實作(1/3)雷欽隆 
2382001Fair Blind Threshold Signatures Based on Discrete LogarithmsW. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI Computer Systems – Science and Engineering
2392001Competitive Analysis of Minimal Oblivious Routing Algorithms on HypercubesT. H. Yeh; CHIN-LAUNG LEI IEICE Transactions on Information and Systems
2402001A Computer Immune System using Mobile AgentsL. F. Chen; CHIN-LAUNG LEI First National Internet Engineering Conference 
2412001A Secure and Anonymous Multi-authorties E-cash SchemeW. S. Juang; H. T. Liaw; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI 11th Conference on Information Security 
2422001A fully distributed approach to repositories of reusable software componentsY. C. Sun; C. L. Lei; M. L. Kuo; CHIN-LAUNG LEI Journal of Information Science and Engineering
2432001A User Efficient Fair E-cash Scheme with Anonymous CertificatesP. L. Yu; CHIN-LAUNG LEI IEEE Region 10 International Conference on Electrical and Electronics Technology
2442001A Proxy Deposit Protocol for E-Cash SystemsP. L. Yu; CHIN-LAUNG LEI 11th Conference on Information Security 
2452001A Practical Anonymous Payment Scheme for Electronic CommerceW. S. Juang; H. T. Liaw; C. L. Lei; CHIN-LAUNG LEI The Seventh International Conference on Distributed Multimedia Systems 
2462001Smart Card Payment Today and TomorrowC. L. Lei; C. E. Yin; CHIN-LAUNG LEI Information Security Newsletter 
2472001Fair Blind Threshold Signatures in Wallet with ObserversW. S. Juang; H. T. Liaw; C. L. Lei; P. C. Lin; CHIN-LAUNG LEI 2001 National Computer Symposium 
2482001Cryptanalysis on improved user efficient blind signaturesC. I. Fan; CHIN-LAUNG LEI IEE Electronics Letters5
2492001Comments on Improved User Efficient Blind SignaturesC. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI 11th Conference on Information Security 
2502001Fairness in E-cash SystemsH. J. Chen; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI Information Security Newsletter 
2512001A Fast Blind Signature SchemeC. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI The 2001 International Workshop on Cryptology and Network Security 
2522001A User Efficient Fair E-cash Scheme without On-line Trusted Third PartyP. L. Yu; C. L. Lei; C. I. Fan; H. J. Chen; CHIN-LAUNG LEI The 2001 International Workshop on Cryptology and Network Security 
2532001網際網路上高效率之安全促成工具(III)雷欽隆 
2542000個人化網路教學系統上安全與收費管理之研究與製作(II)雷欽隆 
2552000網際網路上高效率之安全促成工具(II)雷欽隆 
2562000Prediction-capable data compression algorithms for improving transmission efficiency on distributed systemsChiou, Hann-Huei; Lai, Alexander I-Chi; Lei, Chin-Laung 20th International Conference on Distributed Computing Systems, 200010
2571999網際網路上高效率之安全促成工具雷欽隆 
2581999個人化網路教學系統上安全與收費管理之研究與製作雷欽隆 
2591999Skins as a Mechanism for Making Languages Syntactically ExtensibleY. C. Sun; CHIN-LAUNG LEI 1999 National Computer Symposium 
2601999Issues for Building Virtual Private NetworksCHIN-LAUNG LEI 1999 Computer & Communications Technologies conference 
2611999A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting ProcessC. I. Fan; CHIN-LAUNG LEI 1999 National Computer Symposium 
2621999Anonymous Channel and Authentication in Wireless CommunicationsW. S. Juang; C. L. Lei; C. Y. Chang; CHIN-LAUNG LEI Computer Communications
2631999Partially Blind Threshold Signatures Based on Discrete LogarithmsW. S. Juang; CHIN-LAUNG LEI Computer Communications
2641999Provably Secure Blind Threshold Signatures Based on Discrete LogarithmC. L. Lei; W. S. Juang; CHIN-LAUNG LEI 1999 National Computer Symposium
2651998Recursive order-statistic soft morphological filtersSOO-CHANG PEI ; CHIN-LAUNG LEI ; Shih, F.Y.IEE Proceedings: Vision, Image and Signal Processing11
2661998ATM 網路安全管理之研究(III)雷欽隆 
2671998User efficient blind signaturesFan, Chun-I; Lei, Chin-Laung Electronics Letters31
2681998Competitive analysis of on-line disk schedulingYeh, T.-H.; Kuo, C.-M.; CHIN-LAUNG LEI ; HSU-CHUN YEN Theory of Computing Systems76
2691998Improving dynamic token-based distributed synchronization performance via optimistic broadcastingLai, A.I.-C.; CHIN-LAUNG LEI Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2701997A high performance dynamic token-based distributed synchronization algorithmLai, Alexander I-Chi; Lei, Chin-Laung Third International Symposium on Parallel Architectures, Algorithms, and Networks10
2711997Secure rewarding schemesFan, Chun-I; Lei, Chin-Laung System Sciences40
2721997智慧型 ATM 網路控制管理系統設計與製作(II)─子計畫六:ATM 網路安全管理之研究雷欽隆 
2731997分散式共用記憶體系統─架構、演算法與發展環境─子計畫二:分散式共用記憶體及應用上之同步與一致性(Ⅲ)雷欽隆 
2741996Low-computation blind signature schemes based on quadratic residuesFan, Chun-I; Lei, Chin-Laung IEE Electronics Letters6
2751996Data prefetching for distributed shared memory systemsLai, Alexander I-Chi; Lei, Chin-Laung System Sciences, 1996.50
2761996Competitive Analysis of On-Line Disk Scheduling.Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; Lei, Chin-Laung; CHIN-LAUNG LEI ; HSU-CHUN YEN Algorithms and Computation, 7th International Symposium, ISAAC '96, Osaka, Japan, December 16-18, 1996, Proceedings30
2771996A collision-free secret ballot protocol for computerized general electionsJuang, W.-S.; CHIN-LAUNG LEI Computers and Security3226
2781996分散式共用記憶體系統-架構演算法與發展環境(2)─分散式共用記憶體系統-架構、演算法與發展環境:子計畫(一)分散式共用記憶體及應用上之同步與一雷欽隆 
2791996Blind Threshold Signatures Based on Discrete Logarithm.Juang, Wen-Shenq; CHIN-LAUNG LEI Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, Proceedings
2801996A Multi-Recastable Ticket Scheme for Electronic Elections.Fan, Chun-I; CHIN-LAUNG LEI Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings
2811996Efficient blind signature scheme based on quadratic residuesFan, C.-I.; CHIN-LAUNG LEI Electronics Letters
2821996A collision-free secret ballot protocol for computerized general electionsJuang, Wen-Shenq; Lei, Chin-Laung Computers & Security3226
2831995分散式共用記憶體及應用上之同步與一致性雷欽隆 
2841995An efficient password authentication scheme based on a unit circleLiaw, H.-T.; CHIN-LAUNG LEI Cryptologia
2851994A Collision Free Secret Ballot Protocol for Computerized General ElectionsJuang, W. S.; Lei, C. L. 3026
2861994高效率分散式即時作業系統之研製雷欽隆 
2871993分散式系統下資訊安全環境之研究雷欽隆 
2881993高可靠度分散式即時作業系統之研製雷欽隆 
2891993超級電腦之研究發展(III)雷欽隆 
2901993A dynamic cryptographic key assignment scheme in a tree structureLiaw, H.T.; Wang, S.J.; CHIN-LAUNG LEI Computers and Mathematics with Applications
2911993An optimal algorithm to assign cryptographic keys in a tree structure for access controlLiaw, H.-T.; CHIN-LAUNG LEI BIT
2921992超級電腦之研究發展(II)雷欽隆 
2931992An efficient hierarchy scheme for determining relationships in information systemsHorng-Twu Liaw; CHIN-LAUNG LEI Computers and Mathematics with Applications
2941992A parallel algorithm for finding congruent regionsLei, Chin-Laung ; Liaw, Horng-TwuComputers & Graphics5
2951991超級電腦之研究發展龐台銘; 郭德盛; 顏嗣鈞 ; 陳良基 ; 雷欽隆 ; 賴飛羆 
2961987Modalities for Model Checking: Branching Time Logic Strikes Back.Emerson, E. Allen; CHIN-LAUNG LEI Sci. Comput. Program.
2971985Modalities for Model Checking: Branching Time Strikes Back.Emerson, E. Allen; CHIN-LAUNG LEI Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, New Orleans, Louisiana, USA, January 1985
298AugTowards ubiquitous computing via secure desktop serviceTsai, Pan-Lung; Lei, Chin-Laung IEEE Region 10 International Conference on Electrical and Electronics Technology10