第 1 到 156 筆結果,共 156 筆。
公開日期 | 標題 | 作者 | 來源出版物 | scopus | WOS | 全文 | |
---|---|---|---|---|---|---|---|
1 | 2011 | World of Warcraft Avatar History Dataset | Yeng-Ting Lee; Kuan-Ta Chen; Yun-Maw Cheng; CHIN-LAUNG LEI | ACM Multimedia Systems Conferene | |||
2 | 2010 | What can the temporal social behavior tell us? An estimation of vertex-betweenness using dynamic social information | Jing-Kai Lou; Shou-de Lin; Kuan-Ta Chen; CHIN-LAUNG LEI ; SHOU-DE LIN | The 2010 International Conference on Advances in Social Networks Analysis and Mining | |||
3 | 2003 | User Efficient Fair Blind Signatures | P. L. Yu; C. L. Lei; H. J. Chen; C. Y. Huang; CHIN-LAUNG LEI | Second International Workshop for Asia Public Key Infrastructure | |||
4 | 2011 | Understanding the Performance of Thin-Client Gaming | Yu-Chun Chang; Kuan-Ta Chen; Po-Han Tseng; CHIN-LAUNG LEI | 2011 Annual IEEE Communications Quality and Reliability (CQR) International Workshop | |||
5 | 2013 | Understanding Potential MicrotaskWorkers for Paid Crowdsourcing. | Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; CHIN-LAUNG LEI | Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, An Adjunct to the Proceedings of the First AAAI Conference on Human Computation and Crowdsourcing, November 7-9, 2013, Palm Springs, CA, USA | |||
6 | 2013 | Understanding Potential Microtask Workers for Paid Crowdsourcing | Ming-Hung Wang; Kuan-Ta Chen; Shuo-Yang Wang; CHIN-LAUNG LEI | Conference on Human Computation & Crowdsourcing | |||
7 | 2018 | Uncovering Internal Threats Based on Open-source Intelligence | Meng-Han Tsai; Ming-Hung Wang; Wei-Chieh Yang; Chin-Laung Lei; CHIN-LAUNG LEI | International Computer Symposium | |||
8 | Aug | Towards ubiquitous computing via secure desktop service | Tsai, Pan-Lung; Lei, Chin-Laung | IEEE Region 10 International Conference on Electrical and Electronics Technology | 1 | 0 | |
9 | 2017 | Toward High Throughput Backend Provision for Mobile Apps with a Microservice Approach | He-Ming Ruan; Jen-Hao Kuo; Chun-Yi Chan; Chin-Laung Lei; CHIN-LAUNG LEI | International Conferance on Internet Computing and Internet of Things | |||
10 | 2017 | Temporal Dynamics of On-Line Political Ideology: Longitudinal Study on Facebook | Ming-Hung Wang; Alex Chuan-Hsien Chang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI | Annual Conference of the European Political Science Association | |||
11 | 2009 | Tame pool-based pairwise key predistribution for large-scale sensor networks | Liao, Y.-H.; CHIN-LAUNG LEI ; AI-NUNG WANG ; Tsai, W.-C. | GLOBECOM - IEEE Global Telecommunications Conference | 1 | 3 | |
12 | 2017 | A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones | Hung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Wei-Chou Lai; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI | Euro-China Conference on Intelligent Data Analysis and Application | 1 | 0 | |
13 | 1999 | Skins as a Mechanism for Making Languages Syntactically Extensible | Y. C. Sun; CHIN-LAUNG LEI | 1999 National Computer Symposium | |||
14 | 2019 | Semantics-Guided Data Hallucination for Few-Shot Visual Classification. | Lin, Chia-Ching; Wang, Yu-Chiang Frank; Lei, Chin-Laung; YU-CHIANG WANG ; CHIN-LAUNG LEI | 2019 IEEE International Conference on Image Processing, ICIP 2019, Taipei, Taiwan, September 22-25, 2019 | 3 | 0 | |
15 | 2011 | Security Threats in Advanced Metering Infrastructure | He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; CHIN-LAUNG LEI | The 6th Joint Workshop on Information Security | |||
16 | 2013 | Security Event Handling Framework For Advanced Metering Infrastructure | He-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI | International Conference on Applied and Theoretical Information Systems Research | |||
17 | 1997 | Secure rewarding schemes | Fan, Chun-I; Lei, Chin-Laung | System Sciences | 4 | 0 | |
18 | 2005 | Secure Multicast Using Proxy Encryption | Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI | the Seventh International Conference on Information and Communications Security | |||
19 | 2005 | Secure Content Delivery using Key Composition | C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; CHIN-LAUNG LEI | 30th Annual IEEE Conference on Local Computer Networks | |||
20 | 2016 | SDNort: A Software Defined Network Testing Framework Using Openflow | Po-Wen Chi; Ming-Hung Wang; Che-Wei Lin; Jing-Wei Guo; Chin-Laung Lei; Nen-Fu Huang; CHIN-LAUNG LEI | 11th Asia Joint Conference on Information Security | 1 | 0 | |
21 | 2017 | SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled Networks | Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; CHIN-LAUNG LEI | Proceedings - 2016 International Computer Symposium, ICS 2016 | |||
22 | 2016 | SDN Migration: An Ef?cient Approach to Integrate OpenFlow Networks with STP-enabled Networks | Po-Wen Chi; Ming-Hung Wang; Jing-Wei Guo; Chin-Laung Lei; CHIN-LAUNG LEI | International Computer Symposium | |||
23 | 2004 | Roundly Router Stamping: Detect and Mitigate DDoS Attacks | C. Y. Huang; CHIN-LAUNG LEI | 14th Conference on Information Security | |||
24 | 2008 | Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings | Wen-Shenq Juang; Chin-Laung Lei; Horng-Twu Liaw; Wei-Ken Nien; CHIN-LAUNG LEI | The 3rd Joint Workshop on Information Security | |||
25 | 2018 | Realizing the Real-time Gaze Redirection System with Convolutional Neural Network | Chih-Fan Hsu; Yu-Cheng Chen; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI | ACM Multimedia Systems Conference | 0 | 0 | |
26 | 2010 | Radar Chart: Scanning for High QoE in QoS Dimensions | Yu-Chun Chang; Chi-Jui Chang; Kuan-Ta Chen; CHIN-LAUNG LEI | 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop | |||
27 | 2006 | Quantifying Skype user satisfaction. | Chen, Kuan-Ta; Huang, Chun-Ying; Huang, Polly; POLLY HUANG ; CHIN-LAUNG LEI | Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006 | 0 | 0 | |
28 | 2006 | Quantifying Skype User Satisfaction | Kuan-Ta Chen; Chun-Ying Huang; Polly Huang; CHIN-LAUNG LEI ; POLLY HUANG | ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communicat (SIGCOMM 2006) | |||
29 | 2011 | Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework | Kuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI | ACM Multimedia Systems Conference (MMSys 2011) | |||
30 | 1999 | Provably Secure Blind Threshold Signatures Based on Discrete Logarithm | C. L. Lei; W. S. Juang; CHIN-LAUNG LEI | 1999 National Computer Symposium | |||
31 | 2011 | Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Journal of Computer and System Sciences | 24 | 14 | |
32 | 2020 | POSTER: Construct macOS Cyber Range for Red/Blue Teams | Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI | Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020 | |||
33 | 2009 | Peer-to-Peer Application Recognition Based on Signaling Activity | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IEEE International Conference on Communications (ICC) | |||
34 | 2017 | A Page Replacement Algorithm Based on Frequency Derived From Reference History | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | ACM SIGAPP Symposium On Applied Computing | 2 | 0 | |
35 | 2010 | Online Game QoE Evaluation using Paired Comparisons | Yu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; Chien-Ju Ho; CHIN-LAUNG LEI | 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop | |||
36 | 2008 | OneClick: A Framework for Capturing Users Network Experiences | Cheng-Chun Tu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | ACM SIGCOMM 2008 | |||
37 | 2006 | On the Sensitivity of Online Game Playing Time to Network QoS | K. T. Chen; P. Huang; C. Y. Huang; CHIN-LAUNG LEI ; POLLY HUANG | 25th Conference on Computer Communications (IEEE INFOCOM 2006) | |||
38 | 2003 | On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective | Y. M. Hsu; CHIN-LAUNG LEI | The fourth Workshop for Management Sciences | |||
39 | 2006 | Network Game Design: Hints and Implications of Player Interaction | Kuan-Ta Chen; CHIN-LAUNG LEI | NetGames 2006 | |||
40 | 1996 | A Multi-Recastable Ticket Scheme for Electronic Elections. | Fan, Chun-I; CHIN-LAUNG LEI | Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings | |||
41 | 2015 | Modelling Articles Polarity and Identifying Influential Authors through Social Movements | Ming-Hung Wang; CHIN-LAUNG LEI | IEEE International Conference on Systems, Man, and Cybernetics | |||
42 | 1985 | Modalities for Model Checking: Branching Time Strikes Back. | Emerson, E. Allen; CHIN-LAUNG LEI | Conference Record of the Twelfth Annual ACM Symposium on Principles of Programming Languages, New Orleans, Louisiana, USA, January 1985 | |||
43 | 2002 | Mobile Agents for E-marketplaces in Wireless Networks | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | The 13th Workshop on Object Oriented Technology and Application | |||
44 | 2006 | Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter | C. Y. Huang; K. T. Chen; CHIN-LAUNG LEI | 2006 International Conference on Dependable Systems and Networks (DSN-2006) | |||
45 | 2019 | MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networks | Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; CHIN-LAUNG LEI | International Journal of Computational Science and Engineering | |||
46 | 2011 | Measuring the latency of cloud gaming systems | Kuan-Ta Chen; Yu-Chun Chang; Po-Han Tseng; Chun-Ying Huang; CHIN-LAUNG LEI | ACM international conference on Multimedi | |||
47 | 2008 | Lightweight Broadcast Authentication for Multiple Senders in Sensor Networks | Yu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI | The 3rd Joint Workshop on Information Security | |||
48 | 1999 | Issues for Building Virtual Private Networks | CHIN-LAUNG LEI | 1999 Computer & Communications Technologies conference | |||
49 | 2017 | Is Foveated Rendering Perceivable? A Study on the Efficiency and Consistency of Subjective Assessment Methods | Chih-Fan Hsu; Anthony Chen; Cheng-Hsin Hsu; Chun-Ying Huang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI | ACM Multimedia | |||
50 | 2017 | Is foveated rendering perceivable in virtual reality? Exploring the efficiency and consistency of quality assessment methods | Hsu, C.-F.; Chen, A.; Hsu, C.-H.; Huang, C.-Y.; Lei, C.-L.; Chen, K.-T.; CHIN-LAUNG LEI | MM 2017 - Proceedings of the 2017 ACM Multimedia Conference | |||
51 | 2017 | Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend System | He-Ming Ruan; Jen-Hao Kuo; Chun-Yi Chan; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies | 2 | 0 | |
52 | 2016 | Investigating Vulnerabilities of HTML5 and HTTP/2.0 Websites Using Fuzzing | Ming-Hung Wang; Ting-Chieh Lai; Han-Chi Wang; Lung-Wen Chen; Chin-Wei Tien; Jian-Wei Liao; Chin-Laung Lei; CHIN-LAUNG LEI | Taiwan Academic Network Conference | |||
53 | 2008 | Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings | CHIN-LAUNG LEI | ||||
54 | 2008 | Inferring Speech Activity from Encrypted Skype Traffic | Yu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; CHIN-LAUNG LEI | IEEE Global Telecommunications Conference, GLOBECOM'08 | |||
55 | 2018 | Infection Categorization Using Deep Autoencoder | Ming-Hung Wang; Meng-Han Tsai; Wei-Chieh Yang; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE INFOCOM’18 Demo Session | 2 | 0 | |
56 | 1998 | Improving dynamic token-based distributed synchronization performance via optimistic broadcasting | Lai, A.I.-C.; CHIN-LAUNG LEI | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |||
57 | 2019 | An improved key-agreement protocol for channels with small error rate | Guan, A.; CHIN-LAUNG LEI | Journal of Internet Technology | |||
58 | 2006 | The impact of network variabilities on TCP clocking schemes | Chen, K.-T.; Huang, P.; Huang, C.-Y.; POLLY HUANG ; CHIN-LAUNG LEI | Proceedings - IEEE INFOCOM | 1 | 0 | |
59 | 2005 | The impact of network variabilities on TCP clocking schemes | Chen, Kuan-Ta; Huang, Polly ; Huang, Chun-Ying; Lei, Chin-Laung | INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies | 3 | 0 | |
60 | 2006 | Identifying MMORPG bots: A traffic analysis approach | Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; POLLY HUANG ; WEN-CHIN CHEN ; CHIN-LAUNG LEI | International Conference on Advances in Computer Entertainment Technology 2006 | 18 | 0 | |
61 | 2014 | Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure | He-Ming Ruan; Gan Wei Yeap; CHIN-LAUNG LEI | Workshop on Cryptography and Information Security, ICS 2014 | |||
62 | 2015 | How to Detect a Compromised SDN Switch | Po-Wen Chi; Chien-Ting Kuo; Jing-Wei Guo; CHIN-LAUNG LEI | IEEE Conference on Network Softwarization, Workshop on Security issues in SDN | |||
63 | 2014 | Give Me a Broadcast-Free Network | Po-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; CHIN-LAUNG LEI | Globecom 2014 - Next Generation Networking Symposium | |||
64 | 2010 | Generic Framework Intimating Conventional Anonymous Auctions | Yu-Shian Chen; CHIN-LAUNG LEI | the 20th Cryptology & Information Security Conference | |||
65 | 2011 | Generic Framework for Electronic Anonymous Auctions | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | International Conference on Information Security | |||
66 | 2013 | Gender Swapping and User Behaviors in Online Social Games | Jing-Kai Lou; Kunwoo Park; Meeyoung Cha; Juyong Park; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI | The 22nd International World Wide Web Conference (WWW2013) | |||
67 | 2005 | Game traffic analysis: an MMORPG perspective. | Chen, Kuan-Ta; Huang, Polly; Huang, Chun-Ying; POLLY HUANG ; CHIN-LAUNG LEI | Network and Operating System Support for Digital Audio and Video, 15th International Workshop, NOSSDAV 2005, Stevenson, Washington, USA, June 13-14, 2005, Proceedings | 0 | 0 | |
68 | 2005 | Game Traffic Analysis: An MMORPG Perspective | K. T. Chen; P. Huang; C. Y. Huang; CHIN-LAUNG LEI | 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video | |||
69 | 2012 | Foretelling Online Game Addictveness | Jing-Kai Lou; Kuan-Ta Chen; Hwai-Jung Hsu; CHIN-LAUNG LEI | 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) | |||
70 | 2014 | Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies | Ming-Hung Wang; CHIN-LAUNG LEI | ICS 2014 | |||
71 | 2012 | Forecasting online game addictiveness | Lou, J.-K.; Chen, K.-T.; Hsu, H.-J.; CHIN-LAUNG LEI | Annual Workshop on Network and Systems Support for Games | |||
72 | 2010 | Firework search for location aided routing enhancement in mobile ad-hoc networks | Hsu, C.-C.; CHIN-LAUNG LEI | MobiWac'10 - Proceedings of the 8th ACM International Symposium on Mobility Management and Wireless Access, Co-located with MSWiM'10 | |||
73 | 2014 | Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage | He-Ming Ruan; CHIN-LAUNG LEI | The 9th Asia Joint Conference on Information Security | |||
74 | 2010 | Filtering False Messages En-route in Wireless Multi-hop Networks | Yu-Shian Chen; CHIN-LAUNG LEI | IEEE Wireless Communications and Networking Conference | |||
75 | 2017 | A Feasibility Analysis for Edge Computing Fusion in LPWA IoT Environment with SDN Structure | Chien-Ting Kuo; Victor Chang; Chin-Laung Lei; CHIN-LAUNG LEI | InternationaWorkshop on Data Analytics and Emerging Services | 3 | 0 | |
76 | 2001 | Fair Blind Threshold Signatures in Wallet with Observers | W. S. Juang; H. T. Liaw; C. L. Lei; P. C. Lin; CHIN-LAUNG LEI | 2001 National Computer Symposium | |||
77 | 2005 | Extending Cluster File Systems beyond Last Miles | H. H. Chiou; P. L. Tsai; J. J. Lee; H. F. Tung; CHIN-LAUNG LEI | IEEE TENCON’05 | |||
78 | 2005 | An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. | Kuo, Jen-Hao; Te, Siong-Ui; Liao, Pang-Ting; Huang, Chun-Ying; Tsai, Pan-Lung; Lei, Chin-Laung; Kuo, Sy-Yen; Huang, Yennun; CHIN-LAUNG LEI ; ZSEHONG TSAI ; SY-YEN KUO | 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China | 5 | 0 | |
79 | 2012 | Enabling Efficient Batch Verification on Data Integrity for Remote Storage | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | The 13th International Conference on Internet Computing | |||
80 | 2006 | An empirical evaluation of TCP performance in online games | Chen, K.-T.; Huang, C.-Y.; Huang, P.; POLLY HUANG ; CHIN-LAUNG LEI | International Conference on Advances in Computer Entertainment Technology 2006 | 20 | 0 | |
81 | 2015 | Efficient NFV Deployment in Data Center Networks | Po-Wen Chi; Yu-Cheng Huang; Jing-Wei Guo; CHIN-LAUNG LEI | IEEE ICC 2015 - Next Generation Networking Symposium | |||
82 | 2019 | Efficient Key Agreement Protocol for Smart Sensors | Albert Guan; Chin-Laung Lei; CHIN-LAUNG LEI | DSC 2018 - 2018 IEEE Conference on Dependable and Secure Computing | 0 | 0 | |
83 | 2016 | DN Storage: A Stream-based Storage System over Software-defined Networks | Ming-Hung Wang; Po-Wen Chi; Jing-Wei Guoy; Chin-Laung Lei; CHIN-LAUNG LEI | IEEE International Conference on Computer Communications | 3 | 0 | |
84 | 2015 | Discovery of De-identification Policies Considering Re-identification Risks and Information Loss | He-Ming Ruan; Ming-Hwa Tsai; Yen-Nun Huang; Yen-Hua Liao; CHIN-LAUNG LEI | the 10th Asia Joint Conference on Information Security | |||
85 | 2010 | DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests | Chien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; CHIN-LAUNG LEI | 7th ACM International Conference on Advances in Computer Entertainment Technology | |||
86 | 2008 | Detecting VoIP Traffic Based on Human Conversation Patterns. | Wu, Chen-Chi; Chen, Kuan-Ta; Chang, Yu-Chun; CHIN-LAUNG LEI | Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers | |||
87 | 2008 | Detecting VoIP Traffic Based on Human Conversation Patterns | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications | |||
88 | 2008 | Detecting Peer-to-Peer Activity by Signaling Packets | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | ACM SIGCOMM 2008 | |||
89 | 2002 | Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | 4th Workshop on Cyberspace:Information, Law and Society | |||
90 | 2006 | Design Implications of Social Interaction for Online Games | Kuan-Ta Chen; CHIN-LAUNG LEI | IFIP 5th International Conference on Entertainment Computing (ICEC 2006) | |||
91 | 2007 | Design and Implementation of Secure Communication Channels over UPnP Networks | Jiunn-Jye Lee; Chun-Ying Huang; CHIN-LAUNG LEI | 2007 International Conference on Multimedia and Ubiquitous Engineering | |||
92 | 2012 | Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | International Computer Symposium, Advances in Intelligent Systems and Applications | |||
93 | 2003 | Design and Implementation of a Secure and High Performance Linux-Based Cluster File System | CHIN-LAUNG LEI | 2003 International Conference on Open Source | |||
94 | 1996 | Data prefetching for distributed shared memory systems | Lai, Alexander I-Chi; Lei, Chin-Laung | System Sciences, 1996. | 5 | 0 | |
95 | 2012 | Data Integrity on Remote Storage for On-line Co-working | He-Ming Ruan; Yu-Shian Chen; CHIN-LAUNG LEI | 7th Asia Joint Conference on Information Security | |||
96 | 2017 | Data Hiding on Social Media Communications Using Text Steganography | Hung-Jr Shiu; Bor-Shing Lin; Bor-Shyh Lin; Po-Yang Huang; Chien-Hung Huang; Chin-Laung Lei; CHIN-LAUNG LEI | International Conference on Risks and Security of Internet and System | 10 | 0 | |
97 | 2020 | Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines | Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI | Proceedings - 2020 15th Asia Joint Conference on Information Security, AsiaJCIS 2020 | |||
98 | 2006 | Confessible Threshold Ring Signatures | Yu-Shian Chen; Chin-Laung Lei; Yu-Peng Chiu; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | |||
99 | 1996 | Competitive Analysis of On-Line Disk Scheduling. | Yeh, Tzuoo-Hawn; Kuo, Cheng-Ming; Lei, Chin-Laung; CHIN-LAUNG LEI ; HSU-CHUN YEN | Algorithms and Computation, 7th International Symposium, ISAAC '96, Osaka, Japan, December 16-18, 1996, Proceedings | 3 | 0 | |
100 | 2014 | Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA | Yi-Cheng Tsai; Mu-En Wu; Chin-Laung Lei; Chung-Shu Wu; Jan-Ming Ho; CHIN-LAUNG LEI | the 10th Annual Conference of the Asia-Pacific Association of Derivatives | |||
101 | 2001 | Comments on Improved User Efficient Blind Signatures | C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI | 11th Conference on Information Security | |||
102 | 2004 | Comments on Improved Proxy Deposit Protocol for E-cash Systems | Y. P. Chiu; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | 14th Conference on Information Security | |||
103 | 1994 | A Collision Free Secret Ballot Protocol for Computerized General Elections | Juang, W. S.; Lei, C. L. | 30 | 26 | ||
104 | 2012 | Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value | Yi-Cheng Tsai; Zheng-Hui Chen; Jan-Ming Ho; Ming-Yang Kao; Chin-Laung Lei; Szu-Lang Liao; CHIN-LAUNG LEI | IEEE Computational Intelligence | |||
105 | 2017 | CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network | Hong-Bin Tsai; Chin-Laung Lei; CHIN-LAUNG LEI | National Computer Symposium | |||
106 | 2006 | Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering | Chien-Hua Chiu; Chin-Yen Lee; Pan-Lung Tsai; Chun-Ying Huang; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications (ICSNC 2006) | |||
107 | 2002 | Building E-marketplaces with Mobile Agents | C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI | The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era | |||
108 | 2008 | Broadcast Authentication in Sensor Networks using Compressed Bloom Filters | Yu-Shian Chen; I-Lun Lin; CHIN-LAUNG LEI | the 4th IEEE International Conference on Distributed Computing in Sensor Systems | |||
109 | 2007 | Bounding Peer-to-Peer Upload Traffic in Client Networks | Chun-Ying Huang; CHIN-LAUNG LEI | 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007) | |||
110 | 2016 | Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums | Ming-Hung Wang; CHIN-LAUNG LEI | the 13th Annual IEEE Consumer Communications & Networking Conference | |||
111 | 1996 | Blind Threshold Signatures Based on Discrete Logarithm. | Juang, Wen-Shenq; CHIN-LAUNG LEI | Concurrency and Parallelism, Programming, Networking, and Security: Second Asian Computing Science Conference, ASIAN '96, Singapore, December 2-5, 1996, Proceedings | |||
112 | 2005 | Automatic Generation of Conflict-Free IPSec Policies | C. L. Chang; Y. P. Chiu; CHIN-LAUNG LEI | International Conference on Formal Techniques for Networked and Distributed Systems | |||
113 | 2012 | Are all games equally cloud-gaming-friendly? An electromyographic approach | Yeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI | 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) | |||
114 | 2013 | Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach | Yeng-Ting Lee; Kuan-Ta Chen; Han-I Su; CHIN-LAUNG LEI | IGCVP 2013 | |||
115 | 2005 | An On-Line Page-Structure Approximation Scheme for Web Proxies | J. J Lee; P. L. Tsai; CHIN-LAUNG LEI | IEEE Distributed, Parallel and Network Applications | |||
116 | 2009 | An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger | Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; CHIN-LAUNG LEI | The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video | |||
117 | 2011 | An Efficient Conference-Key Agreement Protocol for Mobile Devices | Ren-Chiun Wang; Chun-Han Tung; CHIN-LAUNG LEI | National Computer Symposium | |||
118 | 2002 | An Efficient Anonymous Buyer-Seller Watermarking Protocol | C. L. Lei; M. H. Chan; CHIN-LAUNG LEI | 2002 International Computer Symposium, Workshop on Cryptology and Information Security | |||
119 | 2008 | An Anonymous and Deniable Conversation for a Thin Client | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Fourth International Symposium on Frontiers in Networking with Applications (FINA2008) | |||
120 | 2012 | An Analysis of Security Patch Lifecycle Using Google Trend Tool | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | 7th Asia Joint Conference on Information Security | |||
121 | 2014 | An AMI Threat Detection Mechanism Based on SDN Networks | Po-Wen Chi; Chien-Ting Kuo; He-Ming Ruan; Shih-Jen Chen; CHIN-LAUNG LEI | The Eighth International Conference on Emerging Security Information, Systems and Technologies | |||
122 | 2011 | AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | The 6th Joint Workshop on Information Security | |||
123 | 2013 | Access Control over Vulnerable Devices in Advanced Metering Infrastructure | He-Ming Ruan; Yun-Hsin Chuang; CHIN-LAUNG LEI | National Computer Symposium | |||
124 | 2008 | A Web Metering Scheme for Fair Advertisement Transactions | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | the 2nd International Conference on Information Security and Assurance | |||
125 | 2001 | A User Efficient Fair E-cash Scheme without On-line Trusted Third Party | P. L. Yu; C. L. Lei; C. I. Fan; H. J. Chen; CHIN-LAUNG LEI | The 2001 International Workshop on Cryptology and Network Security | |||
126 | 2001 | A User Efficient Fair E-cash Scheme with Anonymous Certificates | P. L. Yu; CHIN-LAUNG LEI | IEEE Region 10 International Conference on Electrical and Electronics Technology | |||
127 | 2007 | A Universal Anonymous System for Structured Peer-to-Peer Networks | Li Yuan Lee; Jiunn Jye Lee; CHIN-LAUNG LEI | IEEE TENCON 2007 | |||
128 | 2007 | A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | The Third International Symposium on Security in Ubiquitous Computing | |||
129 | 2004 | A Session Migration Scheme for Smart Web Services in Mobile Computing | P. L. Tsai; CHIN-LAUNG LEI | International Symposium on Web Services and Applications (ISWS '04), | |||
130 | 2009 | A Security Enhancement for Two User Identification Schemes with Anonymity against Active Attacks | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | the 19th Cryptology & Information Security Conference | |||
131 | 2014 | A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | Workshop on Cryptography and Information Security, ICS 2014 | |||
132 | 2001 | A Secure and Anonymous Multi-authorties E-cash Scheme | W. S. Juang; H. T. Liaw; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI | 11th Conference on Information Security | |||
133 | 2008 | A Sector-Based Routing Model over Structured Peer-to-Peer Networks | Jiunn-Jye Lee; Hann-Huei Chiou; Yu-Sheng Yang; Yu-Cheng Su; CHIN-LAUNG LEI | International Workshop on Wireless Technologies for Smart Homes | |||
134 | 2010 | A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc Networks | Chia-Chang Hsu; CHIN-LAUNG LEI | 8th ACM International Symposium on Mobility Management and Wireless Access | |||
135 | 2009 | A Robust Hypercube-based Pairwise Key Establishment for Sensor Networks | Yen-Hua Liao; Chin-Laung Lei; Ai-Nung Wang; Wen-Chi Tsai; CHIN-LAUNG LEI | The 4th Joint Workshop on Information Security | |||
136 | 2009 | A Robust Grid-based Key Predistribution Scheme for Sensor Networks | Yen-Hua Liao; Chin-Laung Lei; Wen-Chi Tsai; CHIN-LAUNG LEI ; AI-NUNG WANG | Fourth International Conference on Innovative Computing, Information and Control | |||
137 | 2004 | A Remote Control Scheme for Ubiquitous Personal Computing | P. L. Tsai; C. L. Lei; W. Y. Wang; CHIN-LAUNG LEI | IEEE International Conference on Networking, Sensing and Control | |||
138 | 2001 | A Proxy Deposit Protocol for E-Cash Systems | P. L. Yu; CHIN-LAUNG LEI | 11th Conference on Information Security | |||
139 | 1999 | A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process | C. I. Fan; CHIN-LAUNG LEI | 1999 National Computer Symposium | |||
140 | 2009 | A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | Workshop on Mobile Computing and Wireless Communication, NCS2009 | |||
141 | 2009 | A Prevention Approach to Scrambling Attack in WiMAX Networks | Powen Chi; CHIN-LAUNG LEI | The 10th IEEE International Symposium on a World of Wireless, Mobile and Multmedia Networks | |||
142 | 2001 | A Practical Anonymous Payment Scheme for Electronic Commerce | W. S. Juang; H. T. Liaw; C. L. Lei; CHIN-LAUNG LEI | The Seventh International Conference on Distributed Multimedia Systems | |||
143 | 2011 | A Mechanism on Risk Analysis of Information Security with Dynamic Assessment | Chien-Ting Kuo; He-Ming Ruan; CHIN-LAUNG LEI ; Sen-Jeng Chen | 3rd International Workshop on Managing Insider Security Threats | |||
144 | 2008 | A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks | Li Chen; Chia-Chang Hsu; CHIN-LAUNG LEI | International Workshop on Wireless Technologies for Smart Homes | |||
145 | 2012 | A Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure | Christine Peijinn Chai; He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Yun-Hsin Chuang; Chin-Laung Lei; Chun-Ying Huang; Chi-Wen Teng; Yuh-Sheng Shaw; Minsiong Liang; CHIN-LAUNG LEI | The 2nd. International Conference on Applied and Theoretical Information Systems Research | |||
146 | 2007 | A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments | Ren-Chiun Wang; Wen-Shenq Juang; CHIN-LAUNG LEI | 2007 International Conference on Multimedia and Ubiquitous Engineering | |||
147 | 2007 | A High-Performance Clustering Scheme with Application in Network Intrusion Prevention System | Chien-Hua Chiu; CHIN-LAUNG LEI | the 7th IEEE International Symposium on Communications and Information Technologies | |||
148 | 2009 | A Geographic Scheme with Location Update for Ad Hoc Routing | Chia-Chang Hsu; CHIN-LAUNG LEI | International Conference on Systems and Networks Communications | |||
149 | 2001 | A Fast Blind Signature Scheme | C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI | The 2001 International Workshop on Cryptology and Network Security | |||
150 | 2007 | A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography | C. Y. Huang; Y. P. Chiu; K. T. Chen; CHIN-LAUNG LEI | to appear in ACM Symposium on InformAtion, Computer and Communications Security | |||
151 | 2005 | A CRT-Based Key Pre-distribution Scheme for Sensor Networks | C. L. Lei; P. W. Chi; Y. P. Chiu; CHIN-LAUNG LEI | the 15th Conference on Information Security, | |||
152 | 2009 | A crowdsourceable QoE evaluation framework for multimedia content | Kuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; CHIN-LAUNG LEI | ACM Multimedia 2009 | |||
153 | 2004 | A Content-Protection Scheme for Multi-Layered Reselling Structures | P. L. Yu; P. L. Tsai; CHIN-LAUNG LEI | 19th IFIP International Information Security Conference | |||
154 | 2001 | A Computer Immune System using Mobile Agents | L. F. Chen; CHIN-LAUNG LEI | First National Internet Engineering Conference | |||
155 | 2009 | A Collusion-Resistant Automation Scheme for Social Moderation Systems | Jing-Kai Lou; Kuan-Ta Chen; CHIN-LAUNG LEI | the 6th annual IEEE Consumer Communications and Networking Conference | |||
156 | 2005 | A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks | P. L. Tsai; C. Y. Huang; Y. Y. Huang; C. C. Hsu; CHIN-LAUNG LEI | the 12th Annual IEEE International Conference on High Performance Computing |