第 1 到 298 筆結果,共 298 筆。
公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 | |
---|---|---|---|---|---|---|---|
1 | 2022 | Building Machine Learning-based Threat Hunting System from Scratch | Chen, Chung Kuan; Lin, Si Chen; Huang, Szu Chun; Chu, Yung Tien; CHIN-LAUNG LEI ; Huang, Chun Ying | Digital Threats: Research and Practice | 1 | 0 | |
2 | 2021 | Joint feature disentanglement and hallucination for few-shot image classification | Lin C.-C; Chu H.-L; YU-CHIANG WANG ; CHIN-LAUNG LEI | IEEE Transactions on Image Processing | 10 | 6 | |
3 | 2021 | How to design a secure anonymous authentication and key agreement protocol for multi-server environments and prove its security | Chuang Y.-H; Lei C.-L; Shiu H.-J.; CHIN-LAUNG LEI | Symmetry | |||
4 | 2021 | PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPs | Chuang Y.-H; CHIN-LAUNG LEI | IEEE Access | |||
5 | 2020 | POSTER: Construct macOS Cyber Range for Red/Blue Teams | Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI | Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020 | |||
6 | 2020 | An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey | Chuang, Y.-H.; CHIN-LAUNG LEI | International Journal of Communication Systems | 6 | ||
7 | 2020 | Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines | Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI | Proceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020 | |||
8 | 2019 | Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets | Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI | IEEE Access | |||
9 | 2019 | Semantics-Guided Data Hallucination for Few-Shot Visual Classification. | Lin, Chia-Ching; Wang, Yu-Chiang Frank; Lei, Chin-Laung; YU-CHIANG WANG ; CHIN-LAUNG LEI | 2019 IEEE International Conference on Image Processing, ICIP 2019, Taipei, Taiwan, September 22-25, 2019 | 3 | 0 | |
10 | 2019 | MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networks | Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; CHIN-LAUNG LEI | International Journal of Computational Science and Engineering | |||
11 | 2019 | Assessing the profitability of timely opening range breakout breakout on index futures markets | Yi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; Chuan-Ju Wang; CHIN-LAUNG LEI | IEEE Access | 5 | 14 | |
12 | 2019 | An improved key-agreement protocol for channels with small error rate | Guan, A.; CHIN-LAUNG LEI | Journal of Internet Technology | |||
13 | 2019 | Look at Me! Correcting Eye Gaze in Live Video Communication | Chih-Fan Hsu; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI | ACM Transactions on Multimedia Computing Communications and Applications | 6 | 7 | |
14 | 2019 | Efficient Key Agreement Protocol for Smart Sensors | Albert Guan; Chin-Laung Lei; CHIN-LAUNG LEI | DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing | 0 | 0 | |
15 | 2019 | Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme | Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI | IEEE Access | |||
16 | 2018 | Preserving privacy of online digital physiological signals using blind and reversible steganography (vol 151, pg 159, 2017) | Shiu, Hung-Jr; Lin, Bor-Sing; Huang, Chien-Hung; Chiang, Pei-Ying; CHIN-LAUNG LEI | Computer Methods and Programs in Biomedicine | 0 | ||
17 | 2018 | SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events | Ming-Hung Wang; Chin-Laung Lei; CHIN-LAUNG LEI | Journal of Information Science and Engineering | 2 | 2 | |
18 | 2018 | SFaaS: Keeping an Eye on IoT Fusion Environment with Security Fusion as a Service | Chien-Ting Kuo; Po-Wen Chi; Victor Chang; Chin-Laung Lei; CHIN-LAUNG LEI | Future Generation Computer Systems | 25 | 16 | |
19 | 2018 | SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events | 王銘宏(MING-HUNG WANG); 雷欽隆(CHIN-LAUNG LEI); CHIN-LAUNG LEI | Journal of Information Science and Engineering | 2 | 2 | |
20 | 2018 | Realizing the Real-time Gaze Redirection System with Convolutional Neural Network | Chih-Fan Hsu; Yu-Cheng Chen; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI | ACM Multimedia Systems Conference | 0 | 0 | |
21 | 2018 | Infection Categorization Using Deep Autoencoder | Ming-Hung Wang; Meng-Han Tsai; Wei-Chieh Yang; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE INFOCOM’18 Demo Session | 2 | 0 | |
22 | 2018 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | Po-Wen Chi; Chin-Luang Lei; CHIN-LAUNG LEI | IEEE Transactions on Cloud Computing | 42 | 29 | |
23 | 2018 | Time-Shift Replacement Algorithm for Main Memory Performance Optimization | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | Journal of Supercomputing | 1 | 0 | |
24 | 2018 | Uncovering Internal Threats Based on Open-source Intelligence | Meng-Han Tsai; Ming-Hung Wang; Wei-Chieh Yang; Chin-Laung Lei; CHIN-LAUNG LEI | International Computer Symposium | |||
25 | 2018 | Exploring the Persistent Behavior of Financial Markets | Yi-Cheng Tsai; Chuan-Ju Wang; William Cheung; Chung-Shu Wu; Jan-Ming Ho; Chin-Laung Lei; CHIN-LAUNG LEI | Finance Research Letters | 3 | 1 | |
26 | 2017 | SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled Networks | Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; CHIN-LAUNG LEI | Proceedings - 2016 International Computer Symposium, ICS 2016 | |||
27 | 2017 | Is foveated rendering perceivable in virtual reality? Exploring the efficiency and consistency of quality assessment methods | Hsu, C.-F.; Chen, A.; Hsu, C.-H.; Huang, C.-Y.; Lei, C.-L.; Chen, K.-T.; CHIN-LAUNG LEI | MM 2017 - Proceedings of the 2017 ACM Multimedia Conference | |||
28 | 2017 | High-capacity data-hiding scheme on synthesized pitches using amplitude enhancement-A new vision of non-blind audio steganography | Shiu, H.; Lin, B.-S.; Cheng, C.-W.; Huang, C.-H.; CHIN-LAUNG LEI | Symmetry | |||
29 | 2017 | Temporal Dynamics of On-Line Political Ideology: Longitudinal Study on Facebook | Ming-Hung Wang; Alex Chuan-Hsien Chang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI | Annual Conference of the European Political Science Association | |||
30 | 2017 | A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones | Hung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Wei-Chou Lai; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI | Euro-China Conference on Intelligent Data Analysis and Application | 1 | 0 | |
31 | 2017 | High Capacity Information Protection of Synthesized Pitches using Amplitude Enhancement-A New Vision of Acoustic Steganography | Hung-Jr Shiu; Bor-Shing Lin; Chia-Wei Cheng; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI | Symmetry | |||
32 | 2017 | A Feasibility Analysis for Edge Computing Fusion in LPWA IoT Environment with SDN Structure | Chien-Ting Kuo; Victor Chang; Chin-Laung Lei; CHIN-LAUNG LEI | InternationaWorkshop on Data Analytics and Emerging Services | 3 | 0 | |
33 | 2017 | Automatic Test Pattern Generator for Fuzzing Based on Finite State Machines | Ming-Hung Wang; Han-Chi Wang; Chin-Laung Lei; CHIN-LAUNG LEI | Security and Communication Networks | 1 | 0 | |
34 | 2017 | Enhanced Tame-based Key Predistribution Scheme for Sensor Networks | Yen-Hwa Liao; Chin-Laung Lei; Ying-I Ko; Yu-Shian Chen; Chien-Hua Chiu; CHIN-LAUNG LEI | Journal of Internet Technology | 1 | 1 | |
35 | 2017 | SDUDP: A Reliable UDP-based Transmission Protocol over SDN | Ming-Hung Wang; Lung-Wen Chen; Po-Wen Chi; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE Access | 23 | 16 | |
36 | 2017 | CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | National Computer Symposium | |||
37 | 2017 | Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan | Ming-Hung Wang; Alex Chuan-Hsien Chang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI | The Computer Journal | 4 | 4 | |
38 | 2017 | Data Hiding on Social Media Communications Using Text Steganography | Hung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Po-Yang Huang; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI | International Conference on Risks and Security of Internet and System | 10 | 0 | |
39 | 2017 | Is Foveated Rendering Perceivable? A Study on the Efficiency and Consistency of Subjective Assessment Methods | Chih-Fan Hsu; Anthony Chen; Cheng-Hsin Hsu; Chun-Ying Huang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI | ACM Multimedia | |||
40 | 2017 | Privacy Preserving of Online Digital Physiological Signals using Reversible Steganography | Hung-Jr Shiu; Bor-Shing Lin; Chin-Laung Lei; CHIN-LAUNG LEI | Computer Methods and Programs in Biomedicine | 35 | 29 | |
41 | 2017 | A Page Replacement Algorithm Based on Frequency Derived From Reference History | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | ACM SIGAPP Symposium On Applied Computing | 2 | 0 | |
42 | 2017 | Toward High Throughput Backend Provision for Mobile Apps with a Microservice Approach | He-Ming Ruan; Jen-Hao Kuo; Chun-Yi Chan; Chin-Laung Lei; CHIN-LAUNG LEI | International Conferance on Internet Computing and Internet of Things | |||
43 | 2017 | Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend System | He-Ming Ruan; Jen-Hao Kuo; Chun-Yi Chan; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies | 2 | 0 | |
44 | 2016 | Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums | Ming-Hung Wang; CHIN-LAUNG LEI | the 13th Annual IEEE Consumer Communications & Networking Conference | |||
45 | 2016 | DN Storage: A Stream-based Storage System over Software-defined Networks | Ming-Hung Wang; Po-Wen Chi; Jing-Wei Guoy; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE International Conference on Computer Communications | 3 | 0 | |
46 | 2016 | Investigating Vulnerabilities of HTML5 and HTTP/2.0 Websites Using Fuzzing | Ming-Hung Wang; Ting-Chieh Lai; Han-Chi Wang; Lung-Wen Chen; Chin-Wei Tien; Jian-Wei Liao; Chin-Laung Lei; CHIN-LAUNG LEI | Taiwan Academic Network Conference | |||
47 | 2016 | SDN Migration: An Ef?cient Approach to Integrate OpenFlow Networks with STP-enabled Networks | Po-Wen Chi; Ming-Hung Wang; Jing-Wei Guo; Chin-Laung Lei; CHIN-LAUNG LEI | International Computer Symposium | |||
48 | 2016 | Method for processing and verifying remote dynamic data, system using the same, and computer-readable medium | Yu-Shian Chen; Chin-Laung Lei; CHIN-LAUNG LEI | ||||
49 | 2016 | SDNort: A Software Defined Network Testing Framework Using Openflow | Po-Wen Chi; Ming-Hung Wang; Che-Wei Lin; Jing-Wei Guo; Chin-Laung Lei; Nen-Fu Huang; CHIN-LAUNG LEI | 11th Asia Joint Conference on Information Security | 1 | 0 | |
50 | 2015 | Modelling Articles Polarity and Identifying Influential Authors through Social Movements | Ming-Hung Wang; CHIN-LAUNG LEI | IEEE International Conference on Systems, Man, and Cybernetics | |||
51 | 2015 | Efficient NFV Deployment in Data Center Networks | Po-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; CHIN-LAUNG LEI | IEEE ICC 2015 - Next Generation Networking Symposium | |||
52 | 2015 | Discovery of De-identification Policies Considering Re-identification Risks and Information Loss | He-Ming Ruan; Ming-Hwa Tsai; Yen-Nun Huang; Yen-Hua Liao; CHIN-LAUNG LEI | the 10th Asia Joint Conference on Information Security | |||
53 | 2015 | Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing | Yi-Cheng Tsai; Chin-Laung Lei; Jan-Ming Ho; Ming-Yang Kao; Szu-Lang Liao; CHIN-LAUNG LEI | Journal of Information Science and Engineering | |||
54 | 2015 | Discovery of De-identification Policies Considering Re-identification Risks and Information Loss | He-Ming Ruan; CHIN-LAUNG LEI | Engineering Science & Technology Bulletin | |||
55 | 2015 | How to Detect a Compromised SDN Switch | Po-Wen Chi; Chien-Ting Kuo; Jing-Wei Guo; CHIN-LAUNG LEI | IEEE Conference on Network Softwarization, Workshop on Security issues in SDN | |||
56 | 2015 | Audit-Free Cloud Storage via Deniable Attribute-based Encryption | Po-Wen Chi; CHIN-LAUNG LEI | IEEE Transactions on Cloud Computing | |||
57 | 2015 | 資訊安全稽核管控系統、方法及其電腦可讀取紀錄媒體 | 郭建廷; 阮鶴鳴; 雷欽隆; CHIN-LAUNG LEI | ||||
58 | 2015 | 遠端動態資料的處理與驗證方法、系統,以及電腦可讀記錄媒體 | 陳煜弦; 雷欽隆; CHIN-LAUNG LEI | ||||
59 | 2014 | 存取控制系統及其存取控制方法 | 阮鶴鳴; 雷欽隆; 劉永之; CHIN-LAUNG LEI | ||||
60 | 2014 | Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies | Ming-Hung Wang; CHIN-LAUNG LEI | ICS 2014 | |||
61 | 2014 | Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure | He-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI | Workshop on Cryptography and Information Security, ICS 2014 | |||
62 | 2014 | Give Me a Broadcast-Free Network | Po-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; CHIN-LAUNG LEI | Globecom 2014 - Next Generation Networking Symposium | |||
63 | 2014 | A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | Workshop on Cryptography and Information Security, ICS 2014 | |||
64 | 2014 | An AMI Threat Detection Mechanism Based on SDN Networks | Po-Wen Chi; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; CHIN-LAUNG LEI | The Eighth International Conference on Emerging Security Information, Systems and Technologies | |||
65 | 2014 | Stratus: Check and Share Encrypted Data among Heterogeneous Cloud Storage | Yu-Shian Chen; He-Ming Ruan; CHIN-LAUNG LEI | Journal of Internet Technology | |||
66 | 2014 | Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage | He-Ming Ruan; CHIN-LAUNG LEI | The 9th Asia Joint Conference on Information Security | |||
67 | 2014 | Access Control System and Access Control Method Thereof | Chin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI | ||||
68 | 2014 | Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA | Yi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; CHIN-LAUNG LEI | the 10th Annual Conference of the Asia-Pacific Association of Derivatives | |||
69 | 2014 | A Reversible Acoustic Data Hiding Method Based on Analog Modulation | H. J. Shiu; S. Y. Tang; C. H. Huang; R .C. T. Lee; CHIN-LAUNG LEI | Information Sciences | 7 | ||
70 | 2014 | A Social Diffusion Model with an Application on Election Simulation | Jing-Kai Lou; Fu-Min Wang; Chin-Hua Tsai; San-Chuan Hung; Perng-Hwa Kung; Kuan-Ta Chen; CHIN-LAUNG LEI ; SHOU-DE LIN | The Scientific World Journal | 3 | 2 | |
71 | 2013 | Access Control over Vulnerable Devices in Advanced Metering Infrastructure | He-Ming Ruan; Yun-Hsin Chuang; CHIN-LAUNG LEI | National Computer Symposium | |||
72 | 2013 | Aggregate message authentication codes (AMACs) with on-the-fly verification | Yu-Shian Chen; CHIN-LAUNG LEI | International Journal of Information Security | |||
73 | 2013 | Understanding Potential Microtask Workers for Paid Crowdsourcing | Ming-Hung Wang; Kuan-Ta Chen; Shuo-Yang Wang; CHIN-LAUNG LEI | Conference on Human Computation & Crowdsourcing | |||
74 | 2013 | Security Event Handling Framework For Advanced Metering Infrastructure | He-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI | International Conference on Applied and Theoretical Information Systems Research | |||
75 | 2013 | Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE Transactions on Multimedia | |||
76 | 2013 | Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach | Yeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI | IGCVP 2013 | |||
77 | 2013 | Aura: An Anonymous Universal Relay Architecture over Structured Peer-To-Peer Networks | Jiunn-Jye Lee; Li-Yuan Lee; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | 0 | ||
78 | 2013 | A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks | Chia-Chang Hsu; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | |||
79 | 2013 | Etheragent: Scaling Ethernet for Enterprise and Campus Networks | Chien-Hua Chiu; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | |||
80 | 2013 | Access Control System and Access Control Method Thereof | Chin-Laung Lei; Yung-Chih Liu; He-Ming Ruan; CHIN-LAUNG LEI | ||||
81 | 2013 | Gender Swapping and User Behaviors in Online Social Games | Jing-Kai Lou; Kunwoo Park; Meeyoung Cha; Juyong Park; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI | The 22nd International World Wide Web Conference (WWW2013) | |||
82 | 2013 | An Adaptive Sector-Based Routing Model over Structured Peer-to-Peer Networks | Jiunn-Jye Lee; Hann-Huei Chiou; Chia-Chang Hsu; CHIN-LAUNG LEI | Computer Networks | 1 | ||
83 | 2013 | Understanding Potential MicrotaskWorkers for Paid Crowdsourcing. | Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; CHIN-LAUNG LEI | Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, An Adjunct to the Proceedings of the First AAAI Conference on Human Computation and Crowdsourcing, November 7-9, 2013, Palm Springs, CA, USA | |||
84 | 2012 | Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | International Computer Symposium, Advances in Intelligent Systems and Applications | |||
85 | 2012 | A Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure | Christine Peijinn Chai; He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Yun-Hsin Chuang; Chin-Laung Lei; Chun-Ying Huang; Chi-Wen Teng; Yuh-Sheng Shaw; Minsiong Liang; CHIN-LAUNG LEI | The 2nd. International Conference on Applied and Theoretical Information Systems Research | |||
86 | 2012 | Foretelling Online Game Addictveness | Jing-Kai Lou; Kuan-Ta Chen; Hwai-Jung Hsu; CHIN-LAUNG LEI | 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) | |||
87 | 2012 | Are all games equally cloud-gaming-friendly? An electromyographic approach | Yeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI | 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) | |||
88 | 2012 | A Decentralized Clustering Scheme for Transparent Mode Devices | Chien-Hua Chiu; CHIN-LAUNG LEI | Journal of Clustering Computing | |||
89 | 2012 | Efficient Mutual Authentication And Key Agreement With User Anonymity For Roaming Services In Global Mobility Networks | Yun-Hsin Chuang; Yuh-Min Tseng; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | |||
90 | 2012 | Radar Chart: Scanning for High QoE in QoS Dimension | Yu-Chun Chang; Chi-Jui Chang; Kuan-Ta Chen; CHIN-LAUNG LEI | IEEE Network | |||
91 | 2012 | Data Integrity on Remote Storage for On-line Co-working | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | 7th Asia Joint Conference on Information Security | |||
92 | 2012 | An Analysis of Security Patch Lifecycle Using Google Trend Tool | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | 7th Asia Joint Conference on Information Security | |||
93 | 2012 | Enabling Efficient Batch Verification on Data Integrity for Remote Storage | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | The 13th International Conference on Internet Computing | |||
94 | 2012 | SEMPRE: Secure Multicast Architecture Using Proxy Re-Encryptio | Yun-Peng Chiu; Chun-Ying Huang; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | |||
95 | 2012 | 一種定位資訊之情境影像系統 | 趙涵捷; 郭斯彥; 顏嗣鈞; 雷欽隆; 紀廷運; CHIN-LAUNG LEI | ||||
96 | 2012 | Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value | Yi-Cheng Tsai; Zheng-Hui Chen; Jan-Ming Ho; Ming-Yang Kao; Chin-Laung Lei; Szu-Lang Liao; CHIN-LAUNG LEI | IEEE Computational Intelligence | |||
97 | 2012 | Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks | Yen-Hua Liao; Chin-Laung Lei; Ai-Nung Wang; Wen-Chi Tsai; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | |||
98 | 2012 | Radar chart: Scanning for satisfactory QoE in QoS dimensions | Chang, Y.-C.; Chang, C.-J.; Chen, K.-T.; CHIN-LAUNG LEI | IEEE Network | |||
99 | 2012 | Forecasting online game addictiveness | Lou, J.-K.; Chen, K.-T.; Hsu, H.-J.; CHIN-LAUNG LEI | Annual Workshop on Network and Systems Support for Games | |||
100 | 2011 | Measuring the latency of cloud gaming systems | Kuan-Ta Chen; Yu-Chun Chang; Po-Han Tseng; Chun-Ying Huang; CHIN-LAUNG LEI | ACM international conference on Multimedi | |||
101 | 2011 | An Efficient Conference-Key Agreement Protocol for Mobile Devices | Ren-Chiun Wang; Chun-Han Tung; CHIN-LAUNG LEI | National Computer Symposium | |||
102 | 2011 | A Mechanism on Risk Analysis of Information Security with Dynamic Assessment | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | 3rd International Workshop on Managing Insider Security Threats | |||
103 | 2011 | AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | The 6th Joint Workshop on Information Security | |||
104 | 2011 | Security Threats in Advanced Metering Infrastructure | He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; CHIN-LAUNG LEI | The 6th Joint Workshop on Information Security | |||
105 | 2011 | Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Journal of Computer and System Sciences | 24 | 14 | |
106 | 2011 | Understanding the Performance of Thin-Client Gaming | Yu-Chun Chang; Kuan-Ta Chen; Po-Han Tseng; CHIN-LAUNG LEI | 2011 Annual IEEE Communications Quality and Reliability (CQR) International Workshop | |||
107 | 2011 | Generic Framework for Electronic Anonymous Auctions | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | International Conference on Information Security | |||
108 | 2011 | DevilTyper: A Game for CAPTCHA Usability Evaluation | Chien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; CHIN-LAUNG LEI | ACM Computer in Entertainment | |||
109 | 2011 | World of Warcraft Avatar History Dataset | Yeng-Ting Lee; Kuan-Ta Chen; Yun-Maw Cheng; CHIN-LAUNG LEI | ACM Multimedia Systems Conferene | |||
110 | 2011 | Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework | Kuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI | ACM Multimedia Systems Conference (MMSys 2011) | |||
111 | 2011 | Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Computer Communications | 58 | ||
112 | 2011 | 存取控制系統及其存取控制方法, | 阮鶴鳴; 雷欽隆; 劉永之; CHIN-LAUNG LEI | ||||
113 | 2010 | Smart Card-based Secure Web Services in the Three-party Setting | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | |||
114 | 2010 | DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests | Chien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; CHIN-LAUNG LEI | 7th ACM International Conference on Advances in Computer Entertainment Technology | |||
115 | 2010 | A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc Networks | Chia-Chang Hsu; CHIN-LAUNG LEI | 8th ACM International Symposium on Mobility Management and Wireless Access | |||
116 | 2010 | What can the temporal social behavior tell us? An estimation of vertex-betweenness using dynamic social information | Jing-Kai Lou; Shou-de Lin; Kuan-Ta Chen; CHIN-LAUNG LEI ; SHOU-DE LIN | The 2010 International Conference on Advances in Social Networks Analysis and Mining | |||
117 | 2010 | Online Game QoE Evaluation using Paired Comparisons | Yu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; Chien-Ju Ho; CHIN-LAUNG LEI | 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop | |||
118 | 2010 | Radar Chart: Scanning for High QoE in QoS Dimensions | Yu-Chun Chang; Chi-Jui Chang; Kuan-Ta Chen; CHIN-LAUNG LEI | 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop | |||
119 | 2010 | Generic Framework Intimating Conventional Anonymous Auctions | Yu-Shian Chen; CHIN-LAUNG LEI | the 20th Cryptology & Information Security Conference | |||
120 | 2010 | Filtering False Messages En-route in Wireless Multi-hop Networks | Yu-Shian Chen; CHIN-LAUNG LEI | IEEE Wireless Communications and Networking Conference | |||
121 | 2010 | Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment | Kuan-Ta Chen; Chi-Jui Chang; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE Network | |||
122 | 2010 | Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings | Wen-Shenq Juang; Chin-Laung Lei; Horng-Twu Liaw; Wei-Ken Nien; CHIN-LAUNG LEI | International Journal of Innovative Computing Information and Control | |||
123 | 2010 | A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | International Journal of Ad Hoc and Ubiquitous Computing | |||
124 | 2010 | Firework search for location aided routing enhancement in mobile ad-hoc networks | Hsu, C.-C.; CHIN-LAUNG LEI | MobiWac'10 - Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access, Co-located with MSWiM'10 | |||
125 | 2009 | A Robust Grid-based Key Predistribution Scheme for Sensor Networks | Yen-Hua Liao; Chin-Laung Lei; Wen-Chi Tsai; CHIN-LAUNG LEI ; AI-NUNG WANG | Fourth International Conference on Innovative Computing, Information and Control | |||
126 | 2009 | A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Workshop on Mobile Computing and Wireless Communication, NCS2009 | |||
127 | 2009 | A crowdsourceable QoE evaluation framework for multimedia content | Kuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI | ACM Multimedia 2009 | |||
128 | 2009 | On the Challenges and Designs of Transport Protocols for MMORPGs | Chen-Chi Wu; Kuan-Ta Chen; Chih-Ming Chen; POLLY HUANG ; CHIN-LAUNG LEI | Springer Multimedia Tools and Applications | |||
129 | 2009 | A Geographic Scheme with Location Update for Ad Hoc Routing | Chia-Chang Hsu; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications | |||
130 | 2009 | Computer and Network Security in Practice Applying to High-tech Society | Shiuh-Jeng Wang; Chung-Huang Yang; CHIN-LAUNG LEI | ||||
131 | 2009 | A Robust Hypercube-based Pairwise Key Establishment for Sensor Networks | Yen-Hua Liao; Chin-Laung Lei; Ai-Nung Wang; Wen-Chi Tsai; CHIN-LAUNG LEI | The 4th Joint Workshop on Information Security | |||
132 | 2009 | An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video | |||
133 | 2009 | Fair anonymous rewarding based on electronic cash | Chun-I Fan; Shi-Yuan Huang; Pei-Hsiu Ho; CHIN-LAUNG LEI | Journal of Systems and Software | |||
134 | 2009 | A Prevention Approach to Scrambling Attack in WiMAX Networks | Powen Chi; CHIN-LAUNG LEI | The 10th IEEE International Symposium on a World of Wireless, Mobile and Multmedia Networks | |||
135 | 2009 | A Security Enhancement for Two User Identification Schemes with Anonymity against Active Attacks | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | the 19th Cryptology & Information Security Conference | |||
136 | 2009 | Peer-to-Peer Application Recognition Based on Signaling Activity | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE International Conference on Communications (ICC) | |||
137 | 2009 | Identifying MMORPG Bots: A Traffic Analysis Approach (Extended) | Chen, Kuan-Ta; Jiang, Jhih-Wei; POLLY HUANG ; Chu, Hao-Hua; CHIN-LAUNG LEI ; CHEN, WEN-CHIN | EURASIP Journal on Advances in Signal Processing | |||
138 | 2009 | A Robust Authentication Scheme with User Anonymity for Wireless Environments | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | International Journal of Innovative Computing, Information and Control | |||
139 | 2009 | User Authentication Scheme with Privacy-preservation for Multi-server Environment | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | IEEE Communications Letters | |||
140 | 2009 | A Collusion-Resistant Automation Scheme for Social Moderation Systems | Jing-Kai Lou; Kuan-Ta Chen; CHIN-LAUNG LEI | the 6th annual IEEE Consumer Communications and Networking Conference | |||
141 | 2009 | Tame pool-based pairwise key predistribution for large-scale sensor networks | Liao, Y.-H.; CHIN-LAUNG LEI ; AI-NUNG WANG ; Tsai, W.-C. | GLOBECOM - IEEE Global Telecommunications Conference | 1 | 3 | |
142 | 2008 | Inferring Speech Activity from Encrypted Skype Traffic | Yu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; CHIN-LAUNG LEI | IEEE Global Telecommunications Conference, GLOBECOM'08 | |||
143 | 2008 | 一種定位資訊之情境影像裝置 | 趙涵捷; 郭斯彥; 顏嗣鈞; 雷欽隆; 紀廷運; CHIN-LAUNG LEI | ||||
144 | 2008 | A Web Metering Scheme for Fair Advertisement Transactions | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | International Journal of Security and Its Applications | |||
145 | 2008 | 高韌性同儕網路及其在即時多媒體上之應用-同儕網路計算之信任與安全機制的設計與實作 (新制多年期第1年) | 雷欽隆 | ||||
146 | 2008 | A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks | Li Chen; Chia-Chang Hsu; CHIN-LAUNG LEI | International Workshop on Wireless Technologies for Smart Homes | |||
147 | 2008 | A Sector-Based Routing Model over Structured Peer-to-Peer Networks | Jiunn-Jye Lee; Hann-Huei Chiou; Yu-Sheng Yang; Yu-Cheng Su; CHIN-LAUNG LEI | International Workshop on Wireless Technologies for Smart Homes | |||
148 | 2008 | 影像偵測觸控學習裝置 | 趙涵捷; 郭斯彥; 顏嗣鈞; 雷欽隆; 紀廷運; CHIN-LAUNG LEI | ||||
149 | 2008 | Information Security | Tzong-Chen; Chin-Laung Lei; Vincent Rijmen; Der-Tsai Lee; CHIN-LAUNG LEI | ||||
150 | 2008 | Detecting Peer-to-Peer Activity by Signaling Packets | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | ACM SIGCOMM 2008 | |||
151 | 2008 | OneClick: A Framework for Capturing Users Network Experiences | Cheng-Chun Tu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | ACM SIGCOMM 2008 | |||
152 | 2008 | 無線感測網路之關鍵技術及在社區照護之應用-子計畫五:無線感測網路下位置知覺醫療照護服務之安全性架構(3/3) | 雷欽隆 | ||||
153 | 2008 | Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings | Wen-Shenq Juang; Chin-Laung Lei; Horng-Twu Liaw; Wei-Ken Nien; CHIN-LAUNG LEI | The 3rd Joint Workshop on Information Security | |||
154 | 2008 | Detecting VoIP Traffic Based on Human Conversation Patterns | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications | |||
155 | 2008 | Lightweight Broadcast Authentication for Multiple Senders in Sensor Networks | Yu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI | The 3rd Joint Workshop on Information Security | |||
156 | 2008 | Broadcast Authentication in Sensor Networks using Compressed Bloom Filters | Yu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI | the 4th IEEE International Conference on Distributed Computing in Sensor Systems | |||
157 | 2008 | A Web Metering Scheme for Fair Advertisement Transactions | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | the 2nd International Conference on Information Security and Assurance | |||
158 | 2008 | An Anonymous and Deniable Conversation for a Thin Client | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Fourth International Symposium on Frontiers in Networking with Applications (FINA2008) | |||
159 | 2008 | Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings | CHIN-LAUNG LEI | ||||
160 | 2008 | Effect of Network Quality on Player Departure Behavior in Online Games | Chen, Kuan-Ta; Huang, Polly ; CHIN-LAUNG LEI | IEEE Transaction on Parallel and Distributed Computing | 60 | 37 | |
161 | 2008 | Detecting VoIP Traffic Based on Human Conversation Patterns. | Wu, Chen-Chi; Chen, Kuan-Ta; Chang, Yu-Chun; CHIN-LAUNG LEI | Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers | |||
162 | 2008 | A Generalizable Methodology for Quantifying User Satisfaction | Huang, Te-Yuan; Chen, Kuan-Ta; POLLY HUANG ; CHIN-LAUNG LEI | IEICE Transactions on Communications E91-B | 10 | 3 | |
163 | 2007 | A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | The Third International Symposium on Security in Ubiquitous Computing | |||
164 | 2007 | 量子演算法之研究及其在密碼學之應用(3/3) | 雷欽隆 | ||||
165 | 2007 | A Universal Anonymous System for Structured Peer-to-Peer Networks | Li Yuan Lee; Jiunn Jye Lee; CHIN-LAUNG LEI | IEEE TENCON 2007 | |||
166 | 2007 | A High-Performance Clustering Scheme with Application in Network Intrusion Prevention System | Chien-Hua Chiu; CHIN-LAUNG LEI | the 7th IEEE International Symposium on Communications and Information Technologies | |||
167 | 2007 | A Survey of Secure Data Aggregation on Sensor Networks | Yu-Shian Chen; Hsu-Chun Hsiao; CHIN-LAUNG LEI | Communications of CCISA | |||
168 | 2007 | 可擴充及調適高速封包處理架構及其在網路安全上之應用 (新制多年期第1年) | 雷欽隆 | ||||
169 | 2007 | Secure Multicast in Dynamic Environments | Chun-Ying Huang; Yun-Peng Chiu; Kuan-Ta Chen; CHIN-LAUNG LEI | Computer Networks | 16 | ||
170 | 2007 | Bounding Peer-to-Peer Upload Traffic in Client Networks | Chun-Ying Huang; CHIN-LAUNG LEI | 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007) | |||
171 | 2007 | Design and Implementation of Secure Communication Channels over UPnP Networks | Jiunn-Jye Lee; Chun-Ying Huang; CHIN-LAUNG LEI | 2007 International Conference on Multimedia and Ubiquitous Engineering | |||
172 | 2007 | A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | 2007 International Conference on Multimedia and Ubiquitous Engineering | |||
173 | 2007 | A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography | C. Y. Huang; Y. P. Chiu; K. T. Chen; CHIN-LAUNG LEI | to appear in ACM Symposium on InformAtion, Computer and Communications Security | |||
174 | 2007 | 感測網路的安全資料彙集機制之概觀 | 陳煜弦; 蕭旭君 ; 雷欽隆 | 資訊安全通訊 | |||
175 | 2006 | Analysis and Evaluation of a Multiple Gateway Traffic-Distribution Scheme for Gateway Clusters | Pan-Lung Tsai; CHIN-LAUNG LEI | Computer Communications | |||
176 | 2006 | VOIP SECURITY (IN COLLECTED PAPERS ON INFORMATION AND COMMUNICATION SECURITY) | Juang, Wen-Shenq; Chen, Sian-Teng; Lei, Chin-Laung | ||||
177 | 2006 | Game Traffic Analysis: An MMORPG Perspective (Extended) | Kuan-Ta Chen; POLLY HUANG ; CHIN-LAUNG LEI | Computer Networks | 81 | 49 | |
178 | 2006 | Confessible Threshold Ring Signatures | Yu-Shian Chen; Chin-Laung Lei; Yu-Peng Chiu; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | |||
179 | 2006 | Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering | Chien-Hua Chiu; Chin-Yen Lee; Pan-Lung Tsai; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | |||
180 | 2006 | Network Game Design: Hints and Implications of Player Interaction | Kuan-Ta Chen; CHIN-LAUNG LEI | NetGames 2006 | |||
181 | 2006 | Design Implications of Social Interaction for Online Games | Kuan-Ta Chen; CHIN-LAUNG LEI | IFIP 5th International Conference on Entertainment Computing (ICEC 2006) | |||
182 | 2006 | Quantifying Skype User Satisfaction | Kuan-Ta Chen; Chun-Ying Huang; Polly Huang; CHIN-LAUNG LEI ; POLLY HUANG | ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communicat (SIGCOMM 2006) | |||
183 | 2006 | Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter | C. Y. Huang; K. T. Chen; CHIN-LAUNG LEI | 2006 International Conference on Dependable Systems and Networks (DSN-2006) | |||
184 | 2006 | On the Sensitivity of Online Game Playing Time to Network QoS | K. T. Chen; P. Huang; C. Y. Huang; CHIN-LAUNG LEI ; POLLY HUANG | 25th Conference on Computer Communications (IEEE INFOCOM 2006) | |||
185 | 2006 | Quantifying Skype user satisfaction. | Chen, Kuan-Ta; Huang, Chun-Ying; Huang, Polly; POLLY HUANG ; CHIN-LAUNG LEI | Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006 | 0 | 0 | |
186 | 2006 | An empirical evaluation of TCP performance in online games | Chen, K.-T.; Huang, C.-Y.; Huang, P.; POLLY HUANG ; CHIN-LAUNG LEI | International Conference on Advances in Computer Entertainment Technology 2006 | 20 | 0 | |
187 | 2006 | Identifying MMORPG bots: A traffic analysis approach | Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; POLLY HUANG ; WEN-CHIN CHEN ; CHIN-LAUNG LEI | International Conference on Advances in Computer Entertainment Technology 2006 | 18 | 0 | |
188 | 2006 | Identifying MMORPG Bots: A Traffic Analysis Approach | Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly ; Chu, Hao-Hua; Lei, Chin-Laung ; Chen, Wen-Chin | 40 | 25 | ||
189 | 2006 | The impact of network variabilities on TCP clocking schemes | Chen, K.-T.; Huang, P.; Huang, C.-Y.; POLLY HUANG ; CHIN-LAUNG LEI | Proceedings - IEEE INFOCOM | 1 | 0 | |
190 | 2006 | How sensitive are online gamers to network quality? | Chen, Kuan-Ta; POLLY HUANG ; CHIN-LAUNG LEI | Communications of the ACM | 91 | 53 | |
191 | 2006 | How sensitive are online gamers to network quality? | Chen, K.-T.; Huang, P.; CHIN-LAUNG LEI | Communications of the ACM | |||
192 | 2005 | A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks | P. L. Tsai; C. Y. Huang; Y. Y. Huang; C. C. Hsu; CHIN-LAUNG LEI | the 12th Annual IEEE International Conference on High Performance Computing | |||
193 | 2005 | Extending Cluster File Systems beyond Last Miles | H. H. Chiou; P. L. Tsai; J. J. Lee; H. F. Tung; CHIN-LAUNG LEI | IEEE TENCON’05 | |||
194 | 2005 | Secure Content Delivery using Key Composition | C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; CHIN-LAUNG LEI | 30th Annual IEEE Conference on Local Computer Networks | |||
195 | 2005 | Automatic Generation of Conflict-Free IPSec Policies | C. L. Chang; Y. P. Chiu; CHIN-LAUNG LEI | International Conference on Formal Techniques for Networked and Distributed Systems | |||
196 | 2005 | 量子演算法之研究及其在密碼學之應用 | 雷欽隆 | ||||
197 | 2005 | 無線感測網路下位置知覺醫療照護服務之安全性架構 | 雷欽隆 | ||||
198 | 2005 | An On-Line Page-Structure Approximation Scheme for Web Proxies | J. J Lee; P. L. Tsai; CHIN-LAUNG LEI | IEEE Distributed, Parallel and Network Applications | |||
199 | 2005 | The Security of Mobile E-Commerce | C. L. Lei; Chun-I Fan; CHIN-LAUNG LEI | ||||
200 | 2005 | Game Traffic Analysis: An MMORPG Perspective | K. T. Chen; P. Huang; C. Y. Huang; CHIN-LAUNG LEI | 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video | |||
201 | 2005 | A CRT-Based Key Pre-distribution Scheme for Sensor Networks | C. L. Lei; P. W. Chi; Y. P. Chiu; CHIN-LAUNG LEI | the 15th Conference on Information Security, | |||
202 | 2005 | Secure Multicast Using Proxy Encryption | Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI | the Seventh International Conference on Information and Communications Security | |||
203 | 2005 | An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. | Kuo, Jen-Hao; Te, Siong-Ui; Liao, Pang-Ting; Huang, Chun-Ying; Tsai, Pan-Lung; Lei, Chin-Laung; Kuo, Sy-Yen; Huang, Yennun; CHIN-LAUNG LEI ; ZSEHONG TSAI ; SY-YEN KUO | 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China | 5 | 0 | |
204 | 2005 | The impact of network variabilities on TCP clocking schemes | Chen, Kuan-Ta; Huang, Polly ; Huang, Chun-Ying; Lei, Chin-Laung | INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies | 3 | 0 | |
205 | 2005 | Game traffic analysis: an MMORPG perspective. | Chen, Kuan-Ta; Huang, Polly; Huang, Chun-Ying; POLLY HUANG ; CHIN-LAUNG LEI | Network and Operating System Support for Digital Audio and Video, 15th International Workshop, NOSSDAV 2005, Stevenson, Washington, USA, June 13-14, 2005, Proceedings | 0 | 0 | |
206 | 2004 | 量子密碼協定之研究與設計 | 雷欽隆 | ||||
207 | 2004 | A Content-Protection Scheme for Multi-Layered Reselling Structures | P. L. Yu; P. L. Tsai; CHIN-LAUNG LEI | 19th IFIP International Information Security Conference | |||
208 | 2004 | 植基於Linux 之高效能安全叢集檔案系統之設計與實作 (II) | 雷欽隆 | ||||
209 | 2004 | 子計畫四:行動電子商務之安全代理人交易模式設計與平台 實作(3/3) | 雷欽隆 | ||||
210 | 2004 | A Session Migration Scheme for Smart Web Services in Mobile Computing | P. L. Tsai; CHIN-LAUNG LEI | International Symposium on Web Services and Applications (ISWS '04), | |||
211 | 2004 | Divisible Blind Signatures based on Hash Chains | C. I. Fan; CHIN-LAUNG LEI | International Journal of Computers and Applications | |||
212 | 2004 | Comments on Improved Proxy Deposit Protocol for E-cash Systems | Y. P. Chiu; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | 14th Conference on Information Security | |||
213 | 2004 | A Remote Control Scheme for Ubiquitous Personal Computing | P. L. Tsai; C. L. Lei; W. Y. Wang; CHIN-LAUNG LEI | IEEE International Conference on Networking, Sensing and Control | |||
214 | 2004 | An Efficient and Anonymous Buyer-Seller Watermarking Protocol | C. L. Lei; P. L. Yu; P. L. Tsai; M. H. Chan; CHIN-LAUNG LEI | IEEE Transactions on Image Processing, | 117 | ||
215 | 2004 | Roundly Router Stamping: Detect and Mitigate DDoS Attacks | C. Y. Huang; CHIN-LAUNG LEI | 14th Conference on Information Security | |||
216 | 2004 | A remote control scheme for ubiquitous personal computing | Tsai, Pan-Lung; Lei, Chin-Laung ; Wang, Wen-Yang | 2004 IEEE International Conference on Networking, Sensing and Control | 8 | 0 | |
217 | 2004 | An Efficient and Anonymous Buyer-Seller Watermarking Protocol | Lei, Chin-Laung; Yu, Pei-Ling; Tsai, Pan-Lung; Chan, Ming-Hwa; LeiChinLaung | IEEE Transactions on Image Processing | |||
218 | 2003 | 行動電子商務之安全代理人交易模式設計與平台實作 (2/3) | 雷欽隆 | ||||
219 | 2003 | 植基於Linux 之高效能安全叢集檔案系統之設計與實作(I) | 雷欽隆 | ||||
220 | 2003 | Design and Implementation of a Secure and High Performance Linux-Based Cluster File System | CHIN-LAUNG LEI | 2003 International Conference on Open Source | |||
221 | 2003 | On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective | Y. M. Hsu; CHIN-LAUNG LEI | The fourth Workshop for Management Sciences | |||
222 | 2003 | Privacy and Anonymity Protection wit Blind Threshold Signatures | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | International Journal of Electronic Commerce | |||
223 | 2003 | User Efficient Fair Blind Signatures | P. L. Yu; C. L. Lei; H. J. Chen; C. Y. Huang; CHIN-LAUNG LEI | Second International Workshop for Asia Public Key Infrastructure | |||
224 | 2002 | A verifiable multi-authority secret election allowing abstention from voting | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | The Computer Journal | 12 | ||
225 | 2002 | Distributed and On-Line Routing on Tori | T. H. Yeh; C. M. Kuo; C. L. Lei; H. C. Yen; CHIN-LAUNG LEI | Algorithmica | |||
226 | 2002 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | Journal of Information Science and Engineering | |||
227 | 2002 | Mobile Agents for E-marketplaces in Wireless Networks | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | The 13th Workshop on Object Oriented Technology and Application | |||
228 | 2002 | A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash | C. I. Fan; CHIN-LAUNG LEI | Journal of Information Science and Engineering | |||
229 | 2002 | Building E-marketplaces with Mobile Agents | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era | |||
230 | 2002 | Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | 4th Workshop on Cyberspace:Information, Law and Society | |||
231 | 2002 | An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections | C. I. Fan; CHIN-LAUNG LEI | Journal of Network and Computer Applications | 2 | ||
232 | 2002 | An Efficient Anonymous Buyer-Seller Watermarking Protocol | C. L. Lei; M. H. Chan; CHIN-LAUNG LEI | 2002 International Computer Symposium, Workshop on Cryptology and Information Security | |||
233 | 2002 | 行動電子商務系統關鍵技術之研發與實作─子計畫四:行動電子商務之安全代理人交易模式設計與平台實作(1/3) | 雷欽隆 | ||||
234 | 2002 | Privacy and Anonymity Protection with Blind Threshold Signatures. | Juang, Wen-Shenq; Lei, Chin-Laung; Liaw, Horng-Twu; CHIN-LAUNG LEI | Int. J. Electronic Commerce | |||
235 | 2002 | An unlinkably divisible and intention attachable ticket scheme for runoff elections. | Fan, Chun-I; CHIN-LAUNG LEI | J. Network and Computer Applications | |||
236 | 2002 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | Lei, Chin-Laung; Juang, Wen-Shenq; Yu, Pei-Ling; LeiChinLaung | Journal of Information Science and Engineering | |||
237 | 2002 | Distributed and On-Line Routing on Tori | Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; CHIN-LAUNG LEI ; HSU-CHUN YEN | Algorithmica | 0 | ||
238 | 2001 | Fair Blind Threshold Signatures Based on Discrete Logarithms | W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI | Computer Systems – Science and Engineering | |||
239 | 2001 | Cryptanalysis on improved user efficient blind signatures | C. I. Fan; CHIN-LAUNG LEI | IEE Electronics Letters | 5 | ||
240 | 2001 | Comments on Improved User Efficient Blind Signatures | C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI | 11th Conference on Information Security | |||
241 | 2001 | Fair Blind Threshold Signatures in Wallet with Observers | W. S. Juang; H. T. Liaw; C. L. Lei; P. C. Lin; CHIN-LAUNG LEI | 2001 National Computer Symposium | |||
242 | 2001 | A Practical Anonymous Payment Scheme for Electronic Commerce | W. S. Juang; H. T. Liaw; C. L. Lei; CHIN-LAUNG LEI | The Seventh International Conference on Distributed Multimedia Systems | |||
243 | 2001 | Smart Card Payment Today and Tomorrow | C. L. Lei; C. E. Yin; CHIN-LAUNG LEI | Information Security Newsletter | |||
244 | 2001 | A Proxy Deposit Protocol for E-Cash Systems | P. L. Yu; CHIN-LAUNG LEI | 11th Conference on Information Security | |||
245 | 2001 | Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes | T. H. Yeh; CHIN-LAUNG LEI | IEICE Transactions on Information and Systems | |||
246 | 2001 | A Computer Immune System using Mobile Agents | L. F. Chen; CHIN-LAUNG LEI | First National Internet Engineering Conference | |||
247 | 2001 | A Secure and Anonymous Multi-authorties E-cash Scheme | W. S. Juang; H. T. Liaw; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | 11th Conference on Information Security | |||
248 | 2001 | A fully distributed approach to repositories of reusable software components | Y. C. Sun; C. L. Lei; M. L. Kuo; CHIN-LAUNG LEI | Journal of Information Science and Engineering | |||
249 | 2001 | A User Efficient Fair E-cash Scheme with Anonymous Certificates | P. L. Yu; CHIN-LAUNG LEI | IEEE Region 10 International Conference on Electrical and Electronics Technology | |||
250 | 2001 | A User Efficient Fair E-cash Scheme without On-line Trusted Third Party | P. L. Yu; C. L. Lei; C. I. Fan; H. J. Chen; CHIN-LAUNG LEI | The 2001 International Workshop on Cryptology and Network Security | |||
251 | 2001 | A Fast Blind Signature Scheme | C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI | The 2001 International Workshop on Cryptology and Network Security | |||
252 | 2001 | Fairness in E-cash Systems | H. J. Chen; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | Information Security Newsletter | |||
253 | 2001 | 網際網路上高效率之安全促成工具(III) | 雷欽隆 | ||||
254 | 2000 | 網際網路上高效率之安全促成工具(II) | 雷欽隆 | ||||
255 | 2000 | 個人化網路教學系統上安全與收費管理之研究與製作(II) | 雷欽隆 | ||||
256 | 2000 | Prediction-capable data compression algorithms for improving transmission efficiency on distributed systems | Chiou, Hann-Huei; Lai, Alexander I-Chi; Lei, Chin-Laung | 20th International Conference on Distributed Computing Systems, 2000 | 1 | 0 | |
257 | 1999 | 網際網路上高效率之安全促成工具 | 雷欽隆 | ||||
258 | 1999 | 個人化網路教學系統上安全與收費管理之研究與製作 | 雷欽隆 | ||||
259 | 1999 | Anonymous Channel and Authentication in Wireless Communications | W. S. Juang; C. L. Lei; C. Y. Chang; CHIN-LAUNG LEI | Computer Communications | |||
260 | 1999 | Issues for Building Virtual Private Networks | CHIN-LAUNG LEI | 1999 Computer & Communications Technologies conference | |||
261 | 1999 | Skins as a Mechanism for Making Languages Syntactically Extensible | Y. C. Sun; CHIN-LAUNG LEI | 1999 National Computer Symposium | |||
262 | 1999 | A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process | C. I. Fan; CHIN-LAUNG LEI | 1999 National Computer Symposium | |||
263 | 1999 | Partially Blind Threshold Signatures Based on Discrete Logarithms | W. S. Juang; CHIN-LAUNG LEI | Computer Communications | |||
264 | 1999 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | 1999 National Computer Symposium | |||
265 | 1998 | Recursive order-statistic soft morphological filters | SOO-CHANG PEI ; CHIN-LAUNG LEI ; Shih, F.Y. | IEE Proceedings: Vision, Image and Signal Processing | 11 | ||
266 | 1998 | ATM 網路安全管理之研究(III) | 雷欽隆 | ||||
267 | 1998 | User efficient blind signatures | Fan, Chun-I; Lei, Chin-Laung | Electronics Letters | 31 | ||
268 | 1998 | Competitive analysis of on-line disk scheduling | Yeh, T.-H.; Kuo, C.-M.; CHIN-LAUNG LEI ; HSU-CHUN YEN | Theory of Computing Systems | 7 | 6 | |
269 | 1998 | Improving dynamic token-based distributed synchronization performance via optimistic broadcasting | Lai, A.I.-C.; CHIN-LAUNG LEI | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |||
270 | 1997 | A high performance dynamic token-based distributed synchronization algorithm | Lai, Alexander I-Chi; Lei, Chin-Laung | Third International Symposium on Parallel Architectures, Algorithms, and Networks | 1 | 0 | |
271 | 1997 | Secure rewarding schemes | Fan, Chun-I; Lei, Chin-Laung | System Sciences | 4 | 0 | |
272 | 1997 | 分散式共用記憶體系統─架構、演算法與發展環境─子計畫二:分散式共用記憶體及應用上之同步與一致性(Ⅲ) | 雷欽隆 | ||||
273 | 1997 | 智慧型 ATM 網路控制管理系統設計與製作(II)─子計畫六:ATM 網路安全管理之研究 | 雷欽隆 | ||||
274 | 1996 | Low-computation blind signature schemes based on quadratic residues | Fan, Chun-I; Lei, Chin-Laung | IEE Electronics Letters | 6 | ||
275 | 1996 | Data prefetching for distributed shared memory systems | Lai, Alexander I-Chi; Lei, Chin-Laung | System Sciences, 1996. | 5 | 0 | |
276 | 1996 | A collision-free secret ballot protocol for computerized general elections | Juang, Wen-Shenq; Lei, Chin-Laung | Computers & Security | 32 | 26 | |
277 | 1996 | Blind Threshold Signatures Based on Discrete Logarithm. | Juang, Wen-Shenq; CHIN-LAUNG LEI | Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, Proceedings | |||
278 | 1996 | A Multi-Recastable Ticket Scheme for Electronic Elections. | Fan, Chun-I; CHIN-LAUNG LEI | Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings | |||
279 | 1996 | 分散式共用記憶體系統-架構演算法與發展環境(2)─分散式共用記憶體系統-架構、演算法與發展環境:子計畫(一)分散式共用記憶體及應用上之同步與一 | 雷欽隆 | ||||
280 | 1996 | Efficient blind signature scheme based on quadratic residues | Fan, C.-I.; CHIN-LAUNG LEI | Electronics Letters | |||
281 | 1996 | Competitive Analysis of On-Line Disk Scheduling. | Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; Lei, Chin-Laung; CHIN-LAUNG LEI ; HSU-CHUN YEN | Algorithms and Computation, 7th International Symposium, ISAAC '96, Osaka, Japan, December 16-18, 1996, Proceedings | 3 | 0 | |
282 | 1996 | A collision-free secret ballot protocol for computerized general elections | Juang, W.-S.; CHIN-LAUNG LEI | Computers and Security | 32 | 26 | |
283 | 1995 | An efficient password authentication scheme based on a unit circle | Liaw, H.-T.; CHIN-LAUNG LEI | Cryptologia | |||
284 | 1995 | 分散式共用記憶體及應用上之同步與一致性 | 雷欽隆 | ||||
285 | 1994 | A Collision Free Secret Ballot Protocol for Computerized General Elections | Juang, W. S.; Lei, C. L. | 30 | 26 | ||
286 | 1994 | 高效率分散式即時作業系統之研製 | 雷欽隆 | ||||
287 | 1993 | A dynamic cryptographic key assignment scheme in a tree structure | Liaw, H.T.; Wang, S.J.; CHIN-LAUNG LEI | Computers and Mathematics with Applications | |||
288 | 1993 | 超級電腦之研究發展(III) | 雷欽隆 | ||||
289 | 1993 | 分散式系統下資訊安全環境之研究 | 雷欽隆 | ||||
290 | 1993 | 高可靠度分散式即時作業系統之研製 | 雷欽隆 | ||||
291 | 1993 | An optimal algorithm to assign cryptographic keys in a tree structure for access control | Liaw, H.-T.; CHIN-LAUNG LEI | BIT | |||
292 | 1992 | A parallel algorithm for finding congruent regions | Lei, Chin-Laung ; Liaw, Horng-Twu | Computers & Graphics | 5 | ||
293 | 1992 | An efficient hierarchy scheme for determining relationships in information systems | Horng-Twu Liaw; CHIN-LAUNG LEI | Computers and Mathematics with Applications | |||
294 | 1992 | 超級電腦之研究發展(II) | 雷欽隆 | ||||
295 | 1991 | 超級電腦之研究發展 | 龐台銘; 郭德盛; 顏嗣鈞 ; 陳良基 ; 雷欽隆 ; 賴飛羆 | ||||
296 | 1987 | Modalities for Model Checking: Branching Time Logic Strikes Back. | Emerson, E. Allen; CHIN-LAUNG LEI | Sci. Comput. Program. | |||
297 | 1985 | Modalities for Model Checking: Branching Time Strikes Back. | Emerson, E. Allen; CHIN-LAUNG LEI | Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, New Orleans, Louisiana, USA, January 1985 | |||
298 | Aug | Towards ubiquitous computing via secure desktop service | Tsai, Pan-Lung; Lei, Chin-Laung | IEEE Region 10 International Conference on Electrical and Electronics Technology | 1 | 0 |