dblp.uni-trier.dewww.uni-trier.de

Chin-Chen Chang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
489EEChin-Feng Lee, Kuo-Hui Wang, Chin-Chen Chang, Yu-Lin Huang: A reversible data hiding scheme based on dual steganographic images. ICUIMC 2009: 228-237
488EEChin-Chen Chang, Shih-Chang Chang: The design of e-traveler's check with efficiency and mutual authentication. ICUIMC 2009: 309-316
487EEKuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang: Embedding secret messages based on chaotic map and Huffman coding. ICUIMC 2009: 336-341
486EEChin-Chen Chang, Chia-Yin Lee, Yen-Chang Chiu: Enhanced authentication scheme with anonymity for roaming service in global mobility networks. Computer Communications 32(4): 611-618 (2009)
485EEChung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan: NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns. Fundam. Inform. 90(1-2): 125-155 (2009)
484EEChin-Chen Chang, Yung-Chen Chou: A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes. Fundam. Inform. 90(1-2): 17-26 (2009)
483EEChin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: A novel key management scheme for dynamic multicast communications. Int. J. Communication Systems 22(1): 53-66 (2009)
482EEChin-Chen Chang, Jung-San Lee: Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Network and Computer Applications 32(1): 226-235 (2009)
481EEFei Yu, Chin-Chen Chang, Ben M. Chen, Jian Shu, Guangxue Yue: Editorial. JCP 4(1): 1-2 (2009)
480EEFei Yu, Chin-Chen Chang, Ben M. Chen, Jun Zhang, Guangxue Yue: Editorial. JSW 4(1): 1-2 (2009)
479EEChin-Chen Chang, Yi-Hui Chen, Chia-Chen Lin: A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Soft Comput. 13(4): 321-331 (2009)
2008
478EEChin-Chen Chang, The Duc Kieu, Yung-Chen Chou: Using nearest covering codes to embed secret information in grayscale images. ICUIMC 2008: 315-320
477EEChin-Chen Chang, Jung-San Lee, Ting-Fang Cheng: Security design for three-party encrypted key exchange protocol using smart cards. ICUIMC 2008: 329-333
476EEChin-Feng Lee, Yi-Ren Wang, Chin-Chen Chang: An adaptive EMD embedding method by condensing secret messages based on consecutive ones transformation and token substitution. ICUIMC 2008: 390-395
475EEChin-Chen Chang, The Duc Kieu, Yung-Chen Chou: A High Payload Steganographic Scheme Based on (7, 4) Hamming Code for Digital Images. ISECS 2008: 16-21
474EEChin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le: A Probabilistic Visual Secret Sharing Scheme for Grayscale Images with Voting Strategy. ISECS 2008: 184-188
473EEYu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: Isolated items discarding strategy for discovering high utility itemsets. Data Knowl. Eng. 64(1): 198-217 (2008)
472EEChin-Chen Chang, Chih-Yang Lin, Yi-Pei Hsieh: Three-Phase Lossless Data Hiding Method for the VQ Index Table. Fundam. Inform. 82(1-2): 1-13 (2008)
471EEHui-Feng Huang, Chin-Chen Chang: A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. Fundam. Inform. 84(3-4): 353-361 (2008)
470EEChin-Chen Chang, Yung-Chen Chou, The Duc Kieu: High Capacity Data Hiding for Grayscale Images. Fundam. Inform. 86(4): 435-446 (2008)
469EEChin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen: Adaptive Data Embedding Scheme Based on Similar and Dissimilar Clustering Strategies. Fundam. Inform. 88(1-2): 23-45 (2008)
468EEYung-Chen Chou, Chin-Chen Chang, Kuan-Ming Li: A Large Payload Data Embedding Technique for Color Images. Fundam. Inform. 88(1-2): 47-61 (2008)
467EEChin-Chen Chang, Pei-Yu Lin: A Color Image Authentication Method Using Partitioned Palette and Morphological Operations. IEICE Transactions 91-D(1): 54-61 (2008)
466EEChih-Yang Lin, Chin-Chen Chang, Yu-Zheng Wang: Reversible Steganographic Method with High Payload for JPEG Images. IEICE Transactions 91-D(3): 836-845 (2008)
465EEChang-Chu Chen, Chin-Chen Chang: LSB-Based Steganography Using Reflected Gray Code. IEICE Transactions 91-D(4): 1110-1116 (2008)
464EEChin-Feng Lee, Chin-Chen Chang, Kuo-Hua Wang: An improvement of EMD embedding method for large payloads by pixel segmentation strategy. Image Vision Comput. 26(12): 1670-1676 (2008)
463EETzu-Chuen Lu, Chin-Chen Chang: Lossless nibbled data embedding scheme based on difference expansion. Image Vision Comput. 26(5): 632-638 (2008)
462EEHsien-Wen Tseng, Chin-Chen Chang: An extended difference expansion algorithm for reversible watermarking. Image Vision Comput. 26(8): 1148-1153 (2008)
461EEChin-Chen Chang, Chia-Chen Lin, Chia-Hsuan Lin, Yi-Hui Chen: A novel secret image sharing scheme in color images using small shadow images. Inf. Sci. 178(11): 2433-2447 (2008)
460EEChin-Chen Chang, Wen-Chuan Wu, Yi-Hui Chen: Joint coding and embedding techniques for multimedia images. Inf. Sci. 178(18): 3543-3556 (2008)
459EEChin-Chen Chang, Yen-Ting Kuo, Wen-Kai Tai: Genetic-Based Approach for Synthesizing Texture. International Journal on Artificial Intelligence Tools 17(4): 731-743 (2008)
458EEChia-Chi Wu, Chin-Chen Chang, Iuon-Chang Lin: New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency. J. Comput. Sci. Technol. 23(2): 253-264 (2008)
457EEFei Yu, Chin-Chen Chang, Ben M. Chen, Wen Chen, Yongjun Chen: Editorial. JCM 3(6): 1-2 (2008)
456EEWen Chen, Fei Yu, Chin-Chen Chang, Jiexian Zeng, Guangxue Yue: Editorial. JCM 3(7): 1-2 (2008)
455EEFei Yu, Chin-Chen Chang, Ben M. Chen, Zhigang Chen, Jun Ni: Editorial. JCP 3(12): 1-2 (2008)
454EEFei Yu, Chin-Chen Chang, Ben M. Chen, Yongjun Chen, Zhigang Chen: Editorial. JSW 3(9): 1-2 (2008)
453EEChin-Chen Chang, Pei-Yu Lin: Adaptive watermark mechanism for rightful ownership protection. Journal of Systems and Software 81(7): 1118-1129 (2008)
452EEMing-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: An embedding technique based upon block prediction. Journal of Systems and Software 81(9): 1505-1516 (2008)
451EEChin-Chen Chang, Cheng-Yi Liu, Wen-Kai Tai: Feature alignment approach for hand posture recognition based on curvature scale space. Neurocomputing 71(10-12): 1947-1953 (2008)
450EEYi-Pei Hsieh, Chin-Chen Chang, Li-Jen Liu: A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity. Pattern Recognition 41(10): 3104-3113 (2008)
449EEChin-Chen Chang, Yi-Pei Hsieh, Chia-Hsuan Lin: Sharing secrets in stego images with authentication. Pattern Recognition 41(10): 3130-3137 (2008)
448EEChia-Chen Lin, Wei-Liang Tai, Chin-Chen Chang: Multilevel reversible data hiding based on histogram modification of difference images. Pattern Recognition 41(12): 3582-3591 (2008)
447EEChin-Chen Chang, Yi-Hsuan Fan, Wei-Liang Tai: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recognition 41(2): 654-661 (2008)
446EEChin-Chen Chang, Chih-Yang Lin, Yi-Hsuan Fan: Lossless data hiding for color images based on block truncation coding. Pattern Recognition 41(7): 2347-2357 (2008)
445EEJung-San Lee, Chin-Chen Chang: Preserving data integrity in mobile ad hoc networks with variant Diffie-Hellman protocol. Security and Communication Networks 1(4): 277-286 (2008)
444EEYu-Ting Tsai, Chin-Chen Chang, Qing-Zhen Jiang, Shr-Ching Weng: Importance sampling of products from illumination and BRDF using spherical radial basis functions. The Visual Computer 24(7-9): 817-826 (2008)
2007
443EEChia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang: An Efficient Fragile Watermarking for Web Pages Tamper-Proof. APWeb/WAIM Workshops 2007: 654-663
442EEKuo-Lung Hung, Chin-Chen Chang: Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling Coding. ATC 2007: 333-343
441EEChin-Chen Chang, Yih-Shin Hu, Chia-Chen Lin: A Digital Watermarking Scheme Based on Singular Value Decomposition. ESCAPE 2007: 82-93
440EEChao-Wen Chan, Chin-Chen Chang: A New (t, n)-Threshold Scheme Based on Difference Equations. ESCAPE 2007: 94-106
439EEChin-Chen Chang, Pei-Yu Lin: Significance-Preserving Codebook Using Generic Algorithm. FSKD (3) 2007: 660-664
438EEChin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu: A Semi-blind Watermarking Based on Discrete Wavelet Transform. ICICS 2007: 164-176
437EEChin-Chen Chang, Wen-Chuan Wu: Reversible Quantization-Index Modulation Using Neighboring Correlation. IWDW 2007: 222-232
436EEChin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: A High Payload VQ Steganographic Method for Binary Images. IWDW 2007: 467-481
435EEChin-Chen Chang, Yu-Wei Su, Iuon-Chang Lin: A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Infoscale 2007: 69
434EEKai-Jie Chang, Chin-Chen Chang: An e-mail signature protocol for anti-spam work-in-progress. Infoscale 2007: 70
433EEChin-Chen Chang, Yi-Fang Cheng, Iuon-Chang Lin: Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. Inscrypt 2007: 457-462
432EEChin-Chen Chang, Yi-Hui Chen, Yung-Chen Chou: Reversible Data Embedding Technique for Palette Images Using De-clustering. MCAM 2007: 130-139
431EEChung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan: Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360
430EEChin-Chen Chang, Chih-Yang Lin: Density-Based Image Vector Quantization Using a Genetic Algorithm. MMM (1) 2007: 289-298
429EEChi-Shiang Chan, Chin-Chen Chang: A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. MMM (2) 2007: 461-470
428EEChin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen: An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. MUE 2007: 1210-1215
427EEChin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen: A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967
426EEHui-Feng Huang, Chin-Chen Chang: An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. MUE 2007: 982-986
425EEJieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang: Two-Phase Algorithms for a Novel Utility-Frequent Mining Model. PAKDD Workshops 2007: 433-444
424EEChin-Chen Chang, Chih-Chiang Tsou, Yung-Chen Chou: A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. PCM 2007: 446-449
423EEChin-Chen Chang, Yu-Zheng Wang, Yu-Chen Hu: Adaptive Data Hiding Scheme for Palette Images. Intelligent Multimedia Data Hiding: New Directions 2007: 103-122
422EEChin-Chen Chang, Tzu-Chuen Lu, Yi-Hsuan Fan: A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. Intelligent Multimedia Data Hiding: New Directions 2007: 83-101
421EEYu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: MICF: An effective sanitization algorithm for hiding sensitive patterns on data mining. Advanced Engineering Informatics 21(3): 269-280 (2007)
420EETing-Fang Cheng, Jung-San Lee, Chin-Chen Chang: Security enhancement of an IC-card-based remote login mechanism. Computer Networks 51(9): 2280-2287 (2007)
419EEYuan-Hui Yu, Chin-Chen Chang, Iuon-Chang Lin: A new steganographic method for color and grayscale image hiding. Computer Vision and Image Understanding 107(3): 183-194 (2007)
418EEYa-Fen Chang, Chin-Chen Chang: Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundam. Inform. 76(1-2): 13-23 (2007)
417EEChin-Chen Chang, Chang-Chu Chen: Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality. Fundam. Inform. 76(1-2): 25-37 (2007)
416EEChin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Ya: VQ Codebook Searching Algorithm Based on Correlation Property. Fundam. Inform. 76(1-2): 39-57 (2007)
415EEChin-Chen Chang, Chih-Yang Lin, Chun-Sen Tseng: Secret Image Hiding and Sharing Based on the (t, n)-Threshold. Fundam. Inform. 76(4): 399-411 (2007)
414EEHsien-Chu Wu, Chin-Chen Chang: An Image Retrieval Method Based on Color-Complexity and Spatial-Histogram Features. Fundam. Inform. 76(4): 481-493 (2007)
413EEChin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Novel Image Hiding Scheme Based on VQ and Hamming Distance. Fundam. Inform. 77(3): 217-228 (2007)
412EEChin-Chen Chang, Wen-Chuan Wu: Fast Planar-Oriented Ripple Search Algorithm for Hyperspace VQ Codebook. IEEE Transactions on Image Processing 16(6): 1538-1547 (2007)
411EEChin-Chen Chang, Yi-Pei Hsieh, Chih-Yang Lin: Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes. IEEE Transactions on Information Forensics and Security 2(3-1): 341-349 (2007)
410EEChin-Chen Chang, Wen-Chuan Wu, Chih-Chiang Tsou: Hiding Secret Information Using Adaptive Side-Match VQ. IEICE Transactions 90-D(10): 1678-1686 (2007)
409EEChin-Chen Chang, Yung-Chen Chou, Chih-Yang Lin: Reversible Data Hiding in the VQ-Compressed Domain. IEICE Transactions 90-D(9): 1422-1429 (2007)
408EEJung-San Lee, Chin-Chen Chang, Pen-Yi Chang, Chin-Chen Chang: Anonymous authentication scheme for wireless communications. IJMC 5(5): 590-601 (2007)
407EEJung-San Lee, Chin-Chen Chang, Pen-Yi Chang, Chin-Chen Chang: Anonymous authentication scheme for wireless communications. IJMC 5(5): 590-601 (2007)
406EETzu-Chuen Lu, Chin-Chen Chang: Color image retrieval technique based on color features and image bitmap. Inf. Process. Manage. 43(2): 461-472 (2007)
405EEChin-Chen Chang, Chia-Chen Lin, Chun-Sen Tseng, Wei-Liang Tai: Reversible hiding in DCT-based compressed images. Inf. Sci. 177(13): 2768-2786 (2007)
404EEIuon-Chang Lin, Chin-Chen Chang: Security enhancement for digital signature schemes with fault tolerance in RSA. Inf. Sci. 177(19): 4031-4039 (2007)
403EEChin-Chen Chang, Chih-Yang Lin: Reversible steganographic method using SMVQ approach based on declustering. Inf. Sci. 177(8): 1796-1805 (2007)
402EEYa-Fen Chang, Chin-Chen Chang, Pei-Yu Lin: A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007)
401EEChin-Chen Chang, Chih-Yang Lin, Keng-Chu Lin: Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. J. Network and Computer Applications 30(2): 662-676 (2007)
400EEJung-San Lee, Chin-Chen Chang: Secure communications for cluster-based ad hoc networks using node identities. J. Network and Computer Applications 30(4): 1377-1396 (2007)
399EEChin-Chen Chang, Wen-Chuan Wu, Yu-Chen Hu: Lossless recovery of a VQ index table with embedded secret data. J. Visual Communication and Image Representation 18(3): 207-216 (2007)
398EEChin-Chen Chang, Yu-Chiang Li, Wen-Hung Huang: TFRP: An efficient microaggregation algorithm for statistical disclosure control. Journal of Systems and Software 80(11): 1866-1878 (2007)
397EEMing-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Novel image copy detection with rotating tolerance. Journal of Systems and Software 80(7): 1057-1069 (2007)
396EEYa-Lun Zeng, Charlie Irawan Tan, Wen-Kai Tai, Mau-Tsuen Yang, Cheng-Chin Chiang, Chin-Chen Chang: A momentum-based deformation system for granular material. Journal of Visualization and Computer Animation 18(4-5): 289-300 (2007)
395EEChi-Shiang Chan, Chin-Chen Chang: An efficient image authentication method based on Hamming code. Pattern Recognition 40(2): 681-690 (2007)
2006
394EEYa-Fen Chang, Chin-Chen Chang: Enhanced Anonymous Auction Protocols with Freewheeling Bids. AINA (1) 2006: 353-358
393EEYa-Fen Chang, Chin-Chen Chang, Yu-Wei Su: A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. AINA (2) 2006: 741-745
392EEIuon-Chang Lin, Chin-Chen Chang: An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. ATC 2006: 601-610
391EEChin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: A Secret Image Sharing Scheme Based on Vector Quantization Mechanism. EUC 2006: 469-478
390EEChao-Wen Chan, Chin-Chen Chang: A New Scheme for the Electronic Coin. ICEBE 2006: 339-343
389EEHui-Feng Huang, Chin-Chen Chang: An Untraceable Electronic Cash System Using Fair Blind Signatures. ICEBE 2006: 39-46
388EEChin-Chen Chang, Kuo-Lung Hung: An Efficient Euclidean Distance Estimation Scheme for Accelerating VQ Encoding. ICICIC (1) 2006: 194-196
387EEChin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen: A Discrete Wavelet Transform Based State-Codebook Search Algorithm for Vector Quantization. ICICIC (1) 2006: 197-200
386EEMing-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Fast Wavelet-Based Image Progressive Transmission Method Based on Vector Quantization. ICICIC (2) 2006: 677-680
385EEChin-Chen Chang, Tzu-Chuen Lu: A Wavelet-Based Progressive Digital Image Transmission Scheme. ICICIC (2) 2006: 681-684
384EEChin-Chen Chang, Tung-Shou Chen, Hsien-Chu Hsia: An ImageWatermarking Scheme Using Pattern Coding Technique. ICICIC (3) 2006: 467-470
383EEChin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Multipurpose Wavelet-Based Image Watermarking. ICICIC (3) 2006: 70-73
382EETimothy K. Shih, Chin-Chen Chang, Hsiau Wen Lin: Reusability on Learning Object Repository. ICWL 2006: 203-214
381EEChung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh: Novel Steganographic Schemes Based on Row-Major Mapping Relation. IIH-MSP 2006: 392-395
380EEChin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen: A Heuristic Method for Extracting Enhanced Watermarks from Digital Images. IIH-MSP 2006: 453-456
379EEChin-Chen Chang, Yi-Hui Chen, Kuan-Ming Li: Improved SMVQ Scheme with Edge-Directed Prediction. IIH-MSP 2006: 541-544
378EEChin-Chen Chang, Yung-Chen Chang, Jau-Ji Shen: A Novel Image Compression Algorithm Based on Sixteen Most Lately Used Encoded Codewords. IIH-MSP 2006: 545-548
377EEChin-Chen Chang, Yung-Chen Chou: Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. IIH-MSP 2006: 549-554
376EEChia-Chen Lin, Chin-Chen Chang: An Image Hiding Scheme Based on Du's Disk Allocation Method. IIH-MSP 2006: 617-620
375EEChin-Chen Chang, Jun-Chou Chuang: Progressive Image Transmission Using Significant Features and Linear Regression Prediction. IIH-MSP 2006: 681-684
374 Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai: Comments on Distributed Sign-and-Encryption Schemes. IMECS 2006: 178-180
373 Chin-Chen Chang, Chia-Chi Wu: An Improvement of the Design of Integrating Subliminal Channel with Access Control. IMECS 2006: 276-279
372 Hui-Feng Huang, Chin-Chen Chang: An Untraceable Forward-Secure Blind Signature Scheme. IMECS 2006: 441-446
371 Chin-Chen Chang, Wen-Bin Wu, Jieh-Shan Yeh: A Cryptanalysis on a Generalized Threshold Cryptosystem. IMECS 2006: 452-455
370 Chao-Wen Chan, Chin-Chen Chang: A Scheme for (t, n)-Threshold Secret Image Sharing. IMECS 2006: 619-624
369 Chin-Chen Chang, Keng-Chu Lin: Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless Communications. IMECS 2006: 959-962
368EETzu-Chuen Lu, Chin-Chen Chang: A Bandwidth Efficiency of the Locally Adaptive Compression Method for Hiding Secret Messages. JCIS 2006
367EEHsien-Chu Wu, Chin-Chen Chang, Ting-Wei Yu: A DCT-based Recoverable Image Authentication. JCIS 2006
366EEYa-Fen Chang, Chin-Chen Chang: Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. JCIS 2006
365EEHsien-Chu Wu, Hui-Chuan Lin, Chin-Chen Chang: Reversible Palette Image Steganography Based on De-clustering and Predictive Coding. JCIS 2006
364EEChin-Chen Chang, Wen-Chuan Wu: A novel data hiding scheme for keeping high stego-image quality. MMM 2006
363EEChin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang: A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. UIC 2006: 816-825
362EEJen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. UIC 2006: 998-1007
361EEChin-Chen Chang, Chia-Chi Wu: A Novel Key Agreement Scheme in a Multiple Server Environment. WISA 2006: 187-197
360EEChin-Chen Chang, Yeu-Pong Lai: A division algorithm for residue numbers. Applied Mathematics and Computation 172(1): 368-378 (2006)
359EEChin-Chen Chang, Yeu-Pong Lai: A parallel residue-to-binary conversion algorithm without trial division. Computers & Electrical Engineering 32(6): 454-467 (2006)
358EEChin-Chen Chang, Jung-San Lee: An anonymous voting mechanism based on the key exchange protocol. Computers & Security 25(4): 307-314 (2006)
357EEChin-Chen Chang, Jun-Chou Chuang, Yu-Chen Hu: Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing. Fundam. Inform. 70(3): 171-184 (2006)
356EEChin-Chen Chang, Chih-Yang Lin, Henry Chou: Perfect Hashing Schemes for Mining Traversal Patterns. Fundam. Inform. 70(3): 185-202 (2006)
355EEYu-Chen Hu, Chin-Chen Chang: An Improved Tree-Structured Codebook Search Algorithm for Grayscale Image Compression. Fundam. Inform. 70(3): 251-260 (2006)
354EEChin-Chen Chang, Guei-Mei Chen, Yu-Chen Hu: A Novel Index Coding Scheme for Vector Quantization. Fundam. Inform. 71(2-3): 215-227 (2006)
353EEMing-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: A Robust Content-Based Copy Detection Scheme. Fundam. Inform. 71(2-3): 351-366 (2006)
352EEChia-Chen Lin, Yu-Chen Hu, Chin-Chen Chang: A Novel Image Ownership Protection Scheme Based on Rehashing Concept and Vector Quantization. Fundam. Inform. 71(4): 443-451 (2006)
351 Chin-Chen Chang, Chih-Yang Lin: Reversible Data Embedding Based on Prediction Approach for VQ and SMVQ Compressed Images. Fundam. Inform. 74(2-3): 189-207 (2006)
350EEChin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: A Reversible Data Hiding Scheme Based on Side Match Vector Quantization. IEEE Trans. Circuits Syst. Video Techn. 16(10): 1301-1308 (2006)
349EEChin-Chen Chang, Chih-Yang Lin: Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation. IEEE Transactions on Information Forensics and Security 1(4): 493-501 (2006)
348EEYa-Fen Chang, Jung-San Lee, Chin-Chen Chang: A secure and efficient authentication scheme for mobile users. IJMC 4(5): 581-594 (2006)
347EEYuan-Hui Yu, Chin-Chen Chang: A new edge detection approach based on image context analysis. Image Vision Comput. 24(10): 1090-1102 (2006)
346EEHui-Feng Huang, Chin-Chen Chang: A novel efficient (t, n) threshold proxy signature scheme. Inf. Sci. 176(10): 1338-1349 (2006)
345EEChin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: New image steganographic methods using run-length approach. Inf. Sci. 176(22): 3393-3408 (2006)
344EEChin-Chen Chang, Jiann-Jone Chen, Wen-Kai Tai, Chin-Chuan Han: New Approach for Static Gesture Recognition. J. Inf. Sci. Eng. 22(5): 1047-1057 (2006)
343EEChin-Chen Chang, Tzu-Chuen Lu: A difference expansion oriented data hiding scheme for restoring the original host images. Journal of Systems and Software 79(12): 1754-1766 (2006)
342EEChin-Chen Chang, Tzu-Chuen Lu: Reversible index-domain information hiding scheme based on side-match vector quantization. Journal of Systems and Software 79(8): 1120-1129 (2006)
341EEHsien-Wen Tseng, Chin-Chen Chang: Error resilient locally adaptive data compression. Journal of Systems and Software 79(8): 1156-1160 (2006)
340EEChin-Chen Chang: Adaptive multiple sets of CSS features for hand posture recognition. Neurocomputing 69(16-18): 2017-2025 (2006)
339EEChin-Chen Chang, Chia-Te Liao: An image coding scheme using SMVQ and support vector machines. Neurocomputing 69(16-18): 2327-2335 (2006)
338EEChin-Chen Chang, Chi-Shiang Chan, Yi-Hsuan Fan: Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Pattern Recognition 39(6): 1155-1167 (2006)
337EEChin-Chen Chang, Yu-Chiang Li, Jun-Bin Yeh: Fast codebook search algorithms based on tree-structured vector quantization. Pattern Recognition Letters 27(10): 1077-1086 (2006)
336EEChin-Chen Chang, Yih-Shin Hu, Tzu-Chuen Lu: A watermarking-based image ownership and tampering authentication scheme. Pattern Recognition Letters 27(5): 439-446 (2006)
335EEChin-Chen Chang, Chi-Shiang Chan, Chun-Sen Tseng: Removing blocking effects using an artificial neural network. Signal Processing 86(9): 2381-2387 (2006)
334EEChin-Chen Chang, Iuon-Chang Lin: A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6: 137-146 (2006)
2005
333EEYeu-Pong Lai, Chin-Chen Chang: A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. AINA 2005: 139-144
332EEChia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang: An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. AINA 2005: 249-252
331EEChin-Chen Chang, Jui-Yi Kuo: An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. AINA 2005: 257-260
330EEChi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen: Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. AINA 2005: 261-264
329EEHui-Feng Huang, Chin-Chen Chang: A New Design for Efficient t-out-n Oblivious Transfer Scheme. AINA 2005: 499-502
328EEChi-Shiang Chan, Chin-Chen Chang: A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. AINA 2005: 75-78
327EEChin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao: A DCT-Domain System for Hiding Fractal Compressed Images. AINA 2005: 83-86
326EEChin-Chen Chang, Wei-Liang Tai, Min-Hui Lin: A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. AINA 2005: 947-952
325EEChin-Chen Chang, Tzu-Chuen Lu: A Color-Based Image Retrieval Method Using Color Distribution and Common Bitmap. AIRS 2005: 56-71
324EEChin-Chen Chang, Yeu-Pong Lai: A Parallel Modular Exponentiation Scheme for Transformed Exponents. APPT 2005: 443-452
323EEYu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: A Fast Algorithm for Mining Share-Frequent Itemsets. APWeb 2005: 417-428
322EEMing-Ni Wu, Chia-Chen Lin, Chin-Chen Chang: Image Copy Detection with Rotating Tolerance. CIS (1) 2005: 464-469
321EEChin-Chen Chang, Jung-San Lee: Improvement on an Optimized Protocol for Mobile Network Authentication and Security. CIS (2) 2005: 538-541
320EEHui-Feng Huang, Chin-Chen Chang: Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. CIS (2) 2005: 554-559
319EEChin-Chen Chang, Chia-Chen Lin, Jun-Bin Yeh: Adaptive Hiding Scheme Based on VQ-Indices Using Commutable Codewords. CIS (2) 2005: 567-572
318EEChin-Chen Chang, Jung-San Lee, Chang-Chu Chen: On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. CIT 2005: 702-705
317EEChin-Chen Chang, Jui-Yi Kuo, Jung-San Lee: Time-bounded Based Password Authentication Scheme. CW 2005: 117-122
316EEHui-Feng Huang, Chin-Chen Chang: An efficient deniable authentication protocol. CW 2005: 307-310
315EEYa-Fen Chang, Chin-Chen Chang: Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. CW 2005: 340-344
314EEChin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu: An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. CW 2005: 93-100
313EEYu-Chiang Li, Jieh-Shan Yeh, Chin-Chen Chang: Direct Candidates Generation: A Novel Algorithm for Discovering Complete Share-Frequent Itemsets. FSKD (2) 2005: 551-560
312EEYueh-Yi Lai, Wen-Kai Tai, Chin-Chen Chang, Chen-Duo Liu: Synthesizing transition textures on succession patterns. GRAPHITE 2005: 273-276
311EEHui-Feng Huang, Chin-Chen Chang: A Novel Conference Key Distribution System with Re-keying Protocol. Human.Society@Internet 2005: 282-290
310EEYa-Fen Chang, Chin-Chen Chang: An Improvement on Strong-Password Authentication Protocols. ICESS 2005: 629-637
309EEKuo-Feng Hwang, Chin-Chen Chang, Chao-Wen Chan: A Search Scheme Resulting in Mixing Compressed Text Files. ICPADS (1) 2005: 762-768
308EEChin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin: Sharing a Secret Two-Tone Image in Two Gray-Level Images. ICPADS (2) 2005: 300-304
307EEChin-Chen Chang, Po-Wen Lu: An Image Refining Method Using Digital Watermark via Vector Quantization. ICPADS (2) 2005: 585-589
306EEChin-Chen Chang, Chun-Sen Tseng, Chia-Chen Lin: Hiding Data in Binary Images. ISPEC 2005: 338-349
305EEChin-Chen Chang, Tzu-Chuen Lu: Method for Searching Similar Images Using Quality Index Measurement. KES (2) 2005: 1224-1230
304EEChin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang: VQ Image Steganographic Method with High Embedding Capacity Using Multi-way Search Approach. KES (3) 2005: 1058-1064
303EEChin-Chen Chang, Wen-Chuan Wu: A Reversible Information Hiding Scheme Based on Vector Quantization. KES (3) 2005: 1101-1107
302EEChin-Chen Chang, Yung-Chen Chou, Jau-Ji Shen: Improving Image Quality for JPEG Compression. KES (3) 2005: 442-448
301EEChin-Chen Chang, Tzu-Chuen Lu, Jun-Bin Yeh: A Bandwidth Efficiency of Lempel-Ziv Scheme for Data Authentication. KES (4) 2005: 249-256
300EEChin-Chen Chang, Yung-Chen Chou, Wen-Chuan Wu: Image Retrieval Using Spatial Color and Edge Detection. PCM (1) 2005: 981-992
299EEChin-Chen Chang, Yu-Chiang Li, Jung-San Lee: An Efficient Algorithm for Incremental Mining of Association Rules. RIDE 2005: 3-10
298EEChin-Chen Chang, Jau-Ji Shen, Yung-Chen Chou: FA-Tree - A Dynamic Indexing Structure for Spatial Data. WSTST 2005: 1071-1080
297EEChin-Chen Chang, Wei-Liang Tai, Chia-Chen Lin: Secret Hiding Using Side Match Vector Quantization. WSTST 2005: 172-181
296 Yung-Kuan Chan, Chin-Chen Chang: Content-Based Retrieval Concept. Encyclopedia of Information Science and Technology (I) 2005: 564-568
295EEChin-Chen Chang, Yeu-Pong Lai: A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli. Applied Mathematics and Computation 161(1): 181-194 (2005)
294EEYa-Fen Chang, Chin-Chen Chang, Hui-Feng Huang: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(1): 211-227 (2005)
293EEChao-Wen Chan, Chin-Chen Chang: A scheme for threshold multi-secret sharing. Applied Mathematics and Computation 166(1): 1-14 (2005)
292EEYa-Fen Chang, Chin-Chen Chang: Authentication schemes with no verification table. Applied Mathematics and Computation 167(2): 820-832 (2005)
291EEMin-Shiang Hwang, Kuo-Feng Hwang, Chin-Chen Chang: A time-stamping protocol for digital watermarking. Applied Mathematics and Computation 169(2): 1276-1284 (2005)
290EEJen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang: An iterative modular multiplication algorithm in RNS. Applied Mathematics and Computation 171(1): 637-645 (2005)
289EEChin-Chen Chang, Chih-Yang Lin: Perfect Hashing Schemes for Mining Association Rules. Comput. J. 48(2): 168-179 (2005)
288EEChin-Chen Chang, Jung-San Lee, Ya-Fen Chang: Efficient authentication protocols of GSM. Computer Communications 28(8): 921-928 (2005)
287EEHsien-Chu Wu, Chin-Chen Chang: A novel digital image watermarking scheme based on the vector quantization technique. Computers & Security 24(6): 460-471 (2005)
286 Iuon-Chang Lin, Chin-Chen Chang: A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters. Computers and Artificial Intelligence 24(5): (2005)
285EEIuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Des. Codes Cryptography 36(1): 53-67 (2005)
284EEChi-Shiang Chan, Chin-Chen Chang: An Image Hiding Scheme Based on Multi-bit-reference Substitution Table Using Dynamic Programming Strategy. Fundam. Inform. 65(4): 291-305 (2005)
283EETzu-Chuen Lu, Chin-Chen Chang: Data Compressor for VQ Index Tables. Fundam. Inform. 65(4): 353-371 (2005)
282EEChin-Chen Chang, Chi-Shiang Chan: An Inverse Halftoning Technique Using Modified Look-Up Tables. Fundam. Inform. 68(3): 207-220 (2005)
281EEChih-Yang Lin, Chin-Chen Chang, Chia-Chen Lin: A New Density-Based Scheme for Clustering Based on Genetic Algorithm. Fundam. Inform. 68(4): 315-331 (2005)
280EEChin-Chen Chang, Wen-Chuan Wu: A Steganographic Method for Hiding Secret Data Using Side Match Vector Quantization. IEICE Transactions 88-D(9): 2159-2167 (2005)
279EEChin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai: A dynamic mechanism for determining relationships in a partially ordered user hierarchy. IJHPCN 3(5/6): 378-384 (2005)
278EEChin-Chen Chang, Yung-Chen Chou, Yuan-Hui Yu, Kai-Jung Shih: An image zooming technique based on vector quantization approximation. Image Vision Comput. 23(13): 1214-1225 (2005)
277EEYuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu: A genetic-based adaptive threshold selection method for dynamic path tree structured vector quantization. Image Vision Comput. 23(6): 597-609 (2005)
276EEHsien-Wen Tseng, Chin-Chen Chang: A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization. Informatica (Slovenia) 29(3): 335-342 (2005)
275EEChin-Chen Chang, Iuon-Chang Lin: Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. Informatica, Lith. Acad. Sci. 16(1): 37-44 (2005)
274EEHsien-Wen Tseng, Chin-Chen Chang: Hiding Data in Halftone Images. Informatica, Lith. Acad. Sci. 16(3): 419-430 (2005)
273EEYa-Fen Chang, Chin-Chen Chang: Schemes for Digital Gift Certificates with Low Computation Complexity. Informatica, Lith. Acad. Sci. 16(4): 503-518 (2005)
272EEYa-Fen Chang, Chin-Chen Chang: An efficient authentication protocol for mobile satellite communication systems. Operating Systems Review 39(1): 70-84 (2005)
271EEYuan-Hui Yu, Chin-Chen Chang, Yu-Chen Hu: Hiding secret data in images via predictive coding. Pattern Recognition 38(5): 691-705 (2005)
270EEChin-Chen Chang, Piyu Tsai, Chia-Chen Lin: SVD-based digital image watermarking scheme. Pattern Recognition Letters 26(10): 1577-1586 (2005)
2004
269EEChin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai: A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy. AINA (1) 2004: 133-138
268EEChin-Chen Chang, Ren-Junn Hwang: A New Scheme to Protect Confidential Images. AINA (1) 2004: 158-164
267EEYung-Kuan Chan, Chin-Chen Chang: Spatial Video Retrieval Based on the Piecewise Method. AINA (1) 2004: 171-176
266EERen-Junn Hwang, Chin-Chen Chang: Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. AINA (1) 2004: 208-212
265EEChing-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Supervising Secret-Key Agreements in a Level-Based Hierarchy. AINA (1) 2004: 309-314
264EEChing-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: Using IC Cards to Remotely Login Passwords without Verification Tables. AINA (1) 2004: 321-326
263EEChin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu: Bandwidth Efficiency of an Image Compression Method for Information Hiding. AINA (1) 2004: 426-432
262EEChin-Chen Chang, Ya-Fen Chang: Yet Another Attack on a QR-based Password Authentication System. AINA (2) 2004: 170-173
261EEChin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang: Secret Sharing with Access Structures in a Hierarchy. AINA (2) 2004: 31-34
260EEChin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang: A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. AINA (2) 2004: 376-379
259EEMing-Ni Wu, Min-Hui Lin, Chin-Chen Chang: A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. AWCC 2004: 219-229
258EEChih-Yang Lin, Chin-Chen Chang: A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules. AWCC 2004: 230-240
257EEYu-Chiang Li, Chin-Chen Chang: A New FP-Tree Algorithm for Mining Frequent Itemsets. AWCC 2004: 266-277
256EEHsien-Wen Tseng, Chin-Chen Chang: Steganography Using JPEG-Compressed Images. CIT 2004: 12-17
255EEMin-Hui Lin, Chin-Chen Chang: A Novel Information Hiding Scheme Based on BTC. CIT 2004: 66-71
254EEChin-Chen Chang, Pei-Yu Lin: A Compression-Based Data Hiding Scheme Using Vector Quantization and Principle Component Analysis. CW 2004: 369-375
253EEChin-Chen Chang, Jung-San Lee: An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards. CW 2004: 417-422
252 Chin-Chen Chang, Ya-Fen Chang: The Security Flaw of an Untraceable Signature Scheme. ICEB 2004: 1379-1381
251 Chin-Chen Chang, Chung-Mou Pengwu: Gesture recognition approach for sign language using curvature scale space and hidden Markov model. ICME 2004: 1187-1190
250 Chin-Chen Chang: Novel hierarchical approach for radiosity. ICME 2004: 863-866
249EEJun-Chou Chuang, Chin-Chen Chang: Detection and Restoration of a Tampered Medical Image. MIAR 2004: 78-85
248EEChin-Chen Chang, Piyu Tsai, Min-Hui Lin: An Adaptive Steganography for Index-Based Images Using Codeword Grouping. PCM (3) 2004: 731-738
247 Chin-Chen Chang, Kuo-Lun Chen: A Signature Scheme with (t, n) Shared Verification and Message Recovery. iiWAS 2004
246EEHsien-Wen Tseng, Chin-Chen Chang: A Branch-and-Bound Algorithm for the Construction of Reversible Variable Length Codes. Comput. J. 47(6): 701-707 (2004)
245EEMin-Hui Lin, Chin-Chen Chang, Yan-Ren Chen: A fair and secure mobile agent environment based on blind signature and proxy host. Computers & Security 23(3): 199-212 (2004)
244EEYuan-Hui Yu, Chin-Chen Chang: Scenery Image Segmentation Using Support Vector Machines. Fundam. Inform. 61(3-4): 379-388 (2004)
243EEChin-Chen Chang, Piyu Tsai, Min-Hui Lin: An Adaptive Steganographic Scheme for Color Images. Fundam. Inform. 62(3-4): 275-289 (2004)
242EEHsien-Chu Wu, Chin-Chen Chang: Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization. Fundam. Inform. 63(1): 89-106 (2004)
241EEChin-Chen Chang, Yuan-Hui Yu: An Efficient Approach For Face Detection And Facial Feature Location Using Prune-And-Search Technique. IJPRAI 18(6): 987-1005 (2004)
240EEChin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu: Retrieving digital images from a JPEG compressed image database. Image Vision Comput. 22(6): 471-484 (2004)
239EEHsien-Wen Tseng, Chin-Chen Chang: High Capacity Data Hiding in JPEG-Compressed Images. Informatica, Lith. Acad. Sci. 15(1): 127-142 (2004)
238EEChin-Chen Chang, Hsien-Wen Tseng: VQ-Based Image Watermarking Using Anti-Gray Coding. Informatica, Lith. Acad. Sci. 15(2): 147-160 (2004)
237EEJen-Ho Yang, Chin-Chen Chang, Chien-Yuan Chen: A high-speed division algorithm in residue number system using parity. Int. J. Comput. Math. 81(6): 775-780 (2004)
236EEChin-Chen Chang, Chih-Yang Lin, Pei-Yu Lin: An Efficient Graph-Based Method for Parallel Mining Problems. JIKM 3(2): 143-154 (2004)
235EEChin-Chen Chang, Ren-Junn Hwang: A new scheme to protect confidential images. Journal of Interconnection Networks 5(3): 221-232 (2004)
234EEHui-Feng Huang, Chin-Chen Chang: A new design of efficient partially blind signature scheme. Journal of Systems and Software 73(3): 397-403 (2004)
233EEMin-Hui Lin, Chin-Chen Chang: A secure one-time password authentication scheme with low-computation for mobile communications. Operating Systems Review 38(2): 76-84 (2004)
232EEYa-Fen Chang, Chin-Chen Chang, Chia-Lin Kao: An improvement on a deniable authentication protocol. Operating Systems Review 38(3): 65-74 (2004)
231EEYa-Fen Chang, Chin-Chen Chang: A secure and efficient strong-password authentication protocol. Operating Systems Review 38(3): 79-90 (2004)
230EEChin-Chen Chang, Iuon-Chang Lin: An improvement of delegated multisignature scheme with document decomposition. Operating Systems Review 38(4): 52-57 (2004)
229EEChin-Chen Chang, Yeu-Pong Lai: A convertible group signature scheme. Operating Systems Review 38(4): 58-65 (2004)
228EEYa-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo: A secure one-time password authentication scheme using smart cards without limiting login times. Operating Systems Review 38(4): 80-90 (2004)
227EEChin-Chen Chang, Iuon-Chang Lin: Remarks on fingerprint-based remote user authentication scheme using smart cards. Operating Systems Review 38(4): 91-96 (2004)
226EEChin-Chen Chang, Guei-Mei Chen, Min-Hui Lin: Information hiding based on search-order coding for VQ indices. Pattern Recognition Letters 25(11): 1253-1261 (2004)
225EEChin-Chen Chang, Hsien-Wen Tseng: A steganographic method for digital images using side match. Pattern Recognition Letters 25(12): 1431-1437 (2004)
224EEChin-Chen Chang, Iuon-Chang Lin: Novel full-search schemes for speeding up image coding using vector quantization. Real-Time Imaging 10(2): 95-102 (2004)
223EEPiyu Tsai, Yu-Chen Hu, Chin-Chen Chang: A color image watermarking scheme based on color quantization. Signal Processing 84(1): 95-106 (2004)
2003
222EEChing-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Signature Schemes Based on Two Hard Problems Simultaneously. AINA 2003: 557-560
221EEChao-Wen Chan, Chin-Chen Chang: Huffman Tree Decomposition and Its Coding Applications. AINA 2003: 683-688
220EEChin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin: Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. AINA 2003: 807-811
219EEChin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao: Lossless Image Compression Based on Two-Way Smaller Difference. AINA 2003: 821-824
218EEKuo-Lung Hung, Chin-Chen Chang: A Robust and Recoverable Tamper Proofing Technique for Image Authentication. Human.Society@Internet 2003 2003: 44-53
217EEHui-Feng Huang, Chin-Chen Chang: An Efficient Convertible Authenticated Encryption Scheme and Its Variant. ICICS 2003: 382-392
216 Chin-Chen Chang, Cheng-Yi Liu: Modified curvature scale space feature alignment approach for hand posture recognition. ICIP (3) 2003: 309-312
215EERen-Junn Hwang, Chin-Chen Chang: A Method for Sending Confidential Messages to a Group without Trusted Parties. ISPA 2003: 375-381
214 Kuo-Lung Hung, Chin-Chen Chang, Tung-Shou Chen: An Efficient Block-based Scheme for Progressively Transmitting Lossless Images. MMM 2003: 313-328
213 Chin-Chen Chang, Jun-Chou Chuang, Yih-Shin Hu: Similar Image Retrieval Based on Wavelet Transformation. WAA 2003: 294-
212EEHsien-Wen Tseng, Chin-Chen Chang: Construction of Symmetrical Reversible Variable Length Codes Using Backtracking. Comput. J. 46(1): 100-105 (2003)
211 Chin-Chen Chang, Yeu-Pong Lai: A flexible date-attachment scheme on e-cash. Computers & Security 22(2): 160-166 (2003)
210EEChin-Chen Chang, Ya-Fen Chang: Efficient anonymous auction protocols with freewheeling bids. Computers & Security 22(8): 728-734 (2003)
209EEHui-Feng Huang, Chin-Chen Chang: An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers. Fundam. Inform. 56(3): 243-253 (2003)
208EEChwei-Shyong Tsai, Chin-Chen Chang: An Improvement to Image Segment Based on Human Visual System for Object-based Coding. Fundam. Inform. 58(2): 167-178 (2003)
207EEChwei-Shyong Tsai, Chin-Chen Chang: A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect. Fundam. Inform. 58(2): 179-188 (2003)
206EEHsien-Chu Wu, Chin-Chen Chang: Hiding Digital Watermarks Using Fractal Compression Technique. Fundam. Inform. 58(2): 189-202 (2003)
205EEChao-Wen Chan, Chin-Chen Chang: A New Channel for Image Hiding Based on Interpolating polynomials. Fundam. Inform. 58(2): 93-104 (2003)
204EEIuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Comp. Syst. 19(4): 457-462 (2003)
203EEYu-Chen Hu, Chin-Chen Chang: Edge Detection Using Block Truncation Coding. IJPRAI 17(6): 951-966 (2003)
202EEChin-Chen Chang, Chi-Yien Chung: An efficient protocol for anonymous multicast and reception. Inf. Process. Lett. 85(2): 99-103 (2003)
201EEChin-Chen Chang, Kuo-Feng Hwang: Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards. Informatica, Lith. Acad. Sci. 14(3): 289-294 (2003)
200EEChin-Chen Chang, Chi-Shiang Chan: A Watermarking Scheme Based on Principal Component Analysis Technique. Informatica, Lith. Acad. Sci. 14(4): 431-444 (2003)
199EEChin-Chen Chang, Ju Yuan Hsiao, Chi-Shiang Chan: Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition 36(7): 1583-1595 (2003)
198EEHsien-Wen Tseng, Chin-Chen Chang: A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes. Real-Time Imaging 9(1): 3-10 (2003)
197EEKuo-Lung Hung, Chin-Chen Chang: Error prevention and resilience of VQ encoded images. Signal Processing 83(2): 431-437 (2003)
196EEChin-Chen Chang, Timothy K. Shih, Iuon-Chang Lin: Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. The Visual Computer 19(5): 342-353 (2003)
2002
195EEChin-Chen Chang, Po-Wen Lu, Ju Yuan Hsiao: A Hybrid Method for Estimating the Euclidean Distance between Two Vectors. CW 2002: 183-190
194EEChin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang: An Image Copyright Protection Scheme Based on Torus Automorphism. CW 2002: 217-224
193EEChin-Chen Chang, Tai-Xing Yu: Sharing a Secret Gray Image in Multiple Images. CW 2002: 230-240
192EEChao-Wen Chan, Chin-Chen Chang: Key Exchange Protocols for Multiparty Communication Services. CW 2002: 241-248
191EEHui-Feng Huang, Chin-Chen Chang: Cryptanalysis of the WD Public-Key Cryptosystem. CW 2002: 249-254
190EEChin-Chen Chang, I-Yen Chen, Yea-Shuan Huang: Hand Pose Recognition Using Curvature Scale Space. ICPR (2) 2002: 386-389
189EEChin-Chen Chang, Yuan-Yuan Su: A Dynamic Color Palette for Color Images Coding. IEEE Pacific Rim Conference on Multimedia 2002: 369-376
188EEChin-Chen Chang, Chih-Ping Hsieh, Ju Yuan Hsiao: A Fast and Efficient Noise Reduction Method Suitable for Low Noise Density. IEEE Pacific Rim Conference on Multimedia 2002: 386-392
187EEChin-Chen Chang, Ju Yuan Hsiao, Chi-Lung Chiang: A Cross-Type Peak-and-Valley Filter for Error Prevention and Resilience in Image Communications. IEEE Pacific Rim Conference on Multimedia 2002: 393-400
186 Chin-Chen Chang, Chi-Shiang Chan, Ya-Ping Pan: An Inverse Halftoning Technique using Genetic Algorithm. ISDB 2002: 184-189
185 Tzu-Chuen Lu, Chin-Chen Chang, S. Wesley Changchien: An Association Rule Mining Method for Spatial Database. ISDB 2002: 281-286
184 Yung-Kuan Chan, Chin-Chen Chang, Jau-Ji Shen: A Compact Patricia Trie for a Large Set of Keys. ISDB 2002: 31-36
183 Chin-Chen Chang, Iuon-Chang Lin, Timothy K. Shih: An Efficient Edge Detection Technique for Chinese Calligraphy. JCIS 2002: 960-963
182 Chin-Chen Chang, Ming-Ni Wu: An Algorithm for Color Image Compression Base on Common Bit Map Block Truncation Coding. JCIS 2002: 964-967
181 Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: A New Micro-Payment System Using General Payword Chain. Electronic Commerce Research 2(1-2): 159-168 (2002)
180EEMin-Shiang Hwang, Chin-Chen Chang, Kuo-Feng Hwang: An ElGamal-Like Cryptosystem for Enciphering Large Messages. IEEE Trans. Knowl. Data Eng. 14(2): 445-446 (2002)
179EEYung-Kuan Chan, Chin-Chen Chang: A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels. IJPRAI 16(1): 113-125 (2002)
178EEChin-Chen Chang, Min-Hui Lin, Yu-Chen Hu: A Fast and Secure Image Hiding Scheme Based on LSB Substitution. IJPRAI 16(4): 399-416 (2002)
177EEMin-Hui Lin, Yu-Chen Hu, Chin-Chen Chang: Both Color and Gray Scale Secret Images Hiding in a Color Image. IJPRAI 16(6): 697-714 (2002)
176 Chin-Chen Chang, Tung-Shou Chen, Lou-Zo Chung: A steganographic method based upon JPEG and quantization table modification. Inf. Sci. 141(1-2): 123-138 (2002)
175 Kuo-Lung Hung, Chin-Chen Chang: An improvement of a technique for color quantization using reduction of color space dimensionality. Informatica (Slovenia) 26(1): (2002)
174 Chin-Chen Chang, Jun-Chou Chuang, Tung-Shou Chen: Recognition of Image Authenticity Using Significant DCT Coefficients Quantization. Informatica (Slovenia) 26(4): (2002)
173EEKuo-Lung Hung, Chin-Chen Chang: Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding. Int. J. Comput. Proc. Oriental Lang. 15(1): 101-113 (2002)
172EEChin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Feature-Oriented Copyright Owner Proving Technique for Still Images. International Journal of Software Engineering and Knowledge Engineering 12(3): 317- (2002)
171EEChin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan, Ming-Fen Lin: A Fuzzy-based Approach to Mesh Simplification. J. Inf. Sci. Eng. 18(3): 459-466 (2002)
170EEChin-Chen Chang, Shu-Kai Yang, Ding-Zhou Duan, Ming-Fen Lin: A Fuzzy-based Approach to Mesh Simplification. J. Inf. Sci. Eng. 18(3): 459-466 (2002)
169EEHsien-Chu Wu, Chin-Chen Chang: Detection and restoration of tampered JPEG compressed images. Journal of Systems and Software 64(2): 151-161 (2002)
168EEChwei-Shyong Tsai, Chin-Chen Chang, Tung-Shou Chen: Sharing multiple secrets in digital images. Journal of Systems and Software 64(2): 163-170 (2002)
167EEShu-Kai Yang, Chin-Chen Chang, Ding-Zhou Duan, Ming-Fen Lin: A novel progressive modelling algorithm for 3D models. Journal of Visualization and Computer Animation 13(3): 187-198 (2002)
166EEKuo-Feng Hwang, Chin-Chen Chang: A fast pixel mapping algorithm using principal component analysis. Pattern Recognition Letters 23(14): 1747-1753 (2002)
165EEChin-Chen Chang, Tai-Xing Yu: Cryptanalysis of an encryption scheme for binary images. Pattern Recognition Letters 23(14): 1847-1852 (2002)
164EEChin-Chen Chang, Jun-Chou Chuang: An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Pattern Recognition Letters 23(8): 931-94 (2002)
163EEPiyu Tsai, Chin-Chen Chang, Yu-Chen Hu: An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images. Real-Time Imaging 8(4): 329-343 (2002)
2001
162 Yung-Kuan Chan, Chin-Chen Chang: Concealing a Secret Image Using the Breadth First Traversal Linear Quadtree Structure. CODAS 2001: 213-
161EEChin-Chen Chang, Hsien-Chu Hsia, Tung-Shou Chen: A Progressive Image Transmission Scheme Based on Block Truncation Coding. Human.Society@Internet 2001: 383-397
160EEChin-Chen Chang, Iuon-Chang Lin: Cryptanalysis of the Improved User Efficient Blind Signatures. ICICS 2001: 42-46
159EEChin-Chen Chang, Kuo-Feng Hwang: Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. ICICS 2001: 47-51
158EEYung-Kuan Chan, Chin-Chen Chang: Image Retrieval Based on Tolerable Difference of Direction. ICOIN 2001: 387-392
157EEChin-Chen Chang, Shu-Kai Yang, Jun-Wei Hsieh, Ding-Zhou Duan, Ming-Fen Lin: A Fuzzy Inference System for Simplifying Surfaces with Color. IEEE Pacific Rim Conference on Multimedia 2001: 1078-1083
156EEChin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao: A Novel Scheme for Securing Image Steganography. IEEE Pacific Rim Conference on Multimedia 2001: 804-811
155EEChin-Chen Chang, Chi-Shiang Chan, Ju Yuan Hsiao: A Color Image Retrieval Method Based on Local Histogram. IEEE Pacific Rim Conference on Multimedia 2001: 831-836
154EEChwei-Shyong Tsai, Chin-Chen Chang: A Generalized Secret Image Sharing and Recovery Scheme. IEEE Pacific Rim Conference on Multimedia 2001: 963-968
153 Tzong-Chen Wu, Chin-Chen Chang: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng. 16(1): 25-28 (2001)
152EEKuo-Lung Hung, Chin-Chen Chang: A Novel Progressive Image Transmission Technique for Chinese Calligraphy. Int. J. Comput. Proc. Oriental Lang. 14(4): 293-307 (2001)
151EEChin-Chen Chang, Guu-In Chen: Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance. Int. J. Comput. Proc. Oriental Lang. 14(4): 309-339 (2001)
150EEChin-Chen Chang, Lin-Li Chen, Tung-Shou Chen: A New Two-Path Search Algorithm for Block Motion Estimation of Video Data. J. Inf. Sci. Eng. 17(3): 405-415 (2001)
149EEChin-Chen Chang, Min-Shiang Hwang, Tung-Shou Chen: A new encryption algorithm for image cryptosystems. Journal of Systems and Software 58(2): 83-91 (2001)
148 Yung-Kuan Chan, Chin-Chen Chang: Image matching using run-length feature. Pattern Recognition Letters 22(5): 447-455 (2001)
2000
147EEIuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang: Security Enhancement for the "Simple Authentication Key Agreement Algorithm". COMPSAC 2000: 113-115
146EEChin-Chen Chang, Kuo-Feng Hwang, Yi Lin: A Proof of Copyright Ownership Using Moment-Preserving. COMPSAC 2000: 198-203
145EEChin-Chen Chang, Chao-Wen Chan: Detecting Dealer Cheating in Secret Sharing Systems. COMPSAC 2000: 449-453
144EEChin-Chen Chang, Chwei-Shyong Tsai, Tung-Shou Chen: A New Scheme for Sharing Secret Color Images in Computer Network. ICPADS 2000: 21-27
143EEChin-Chen Chang, Tung-Shou Chen, Yi Lin: An efficient accessing technique of Chinese characters using Boshiamy Chinese input system. IRAL 2000: 61-67
142EEChin-Chen Chang, Tung-Shou Chen: An Improved Prediction Method for Quadtree Image Coding. ISMSE 2000: 269-275
141 Chin-Chen Chang, Jyh-Chiang Yeh, Ju Yuan Hsiao: A Method for Protecting Digital Images from Being Copied Illegally. Kyoto International Conference on Digital Libraries 2000: 348-355
140 Chin-Chen Chang: A Perspective on the Development of Digital Libraries in Taiwan. Kyoto International Conference on Digital Libraries 2000: 44-46
139EEJi-Han Jiang, Chin-Chen Chang, Tung-Shou Chen: A Compact Sparse Matrix Representation Using Random Hash Functions. Data Knowl. Eng. 32(1): 29-49 (2000)
138 Chin-Chen Chang, Jer-Sheng Chou, Tung-Shou Chen: An efficient computation of Euclidean distances using approximated look-up table. IEEE Trans. Circuits Syst. Video Techn. 10(4): 594-599 (2000)
137 Chin-Chen Chang, Pei-Fang Chung: A Technique of Watermarking for Digital Images Using (t, n)-Threshold Scheme. Informatica (Slovenia) 24(1): (2000)
136 Chin-Chen Chang, Chwei-Shyong Tsai: A Technique for Computing Watermarks from Digital Images. Informatica (Slovenia) 24(3): (2000)
135 Chin-Chen Chang, Kuo-Feng Hwang, Min-Shiang Hwang: A Digital Watermarking Scheme Using Human Visual Effects. Informatica (Slovenia) 24(4): (2000)
134EEChin-Feng Lee, Chin-Chen Chang: Breadth-first search oriented symbolic picture representation for spatial match retrieval. Journal of Systems and Software 52(1): 11-23 (2000)
1999
133EEChin-Chen Chang, Fun-Chou Shiue, Tung-Shou Chen: Tree Structured Vector Quantization with Dynamic Path Search. ICPP Workshops 1999: 536-541
132EEChin-Chen Chang, Pai-Cheng Huang, Wei-Bin Lee: Conference key distribution schemes for portable communication systems. Computer Communications 22(12): 1160-1164 (1999)
131EEChien-Yuan Chen, Chin-Chen Chang: A fast modular multiplication algorithm for calculating the product AB modulo N. Inf. Process. Lett. 72(3-4): 77-81 (1999)
130EEWei-Bin Lee, Chin-Chen Chang: (t, n) Threshold Digital Signature With Traceability Property. J. Inf. Sci. Eng. 15(5): 669-678 (1999)
129EERen-Junn Hwang, Chin-Chen Chang: An Improved Threshold Scheme Based on Modular ARithmetic. J. Inf. Sci. Eng. 15(5): 691-699 (1999)
128EERen-Junn Hwang, Wei-Bin Lee, Chin-Chen Chang: A concept of designing cheater identification methods for secret sharing. Journal of Systems and Software 46(1): 7-11 (1999)
127EEChin-Chen Chang, Tian-Fu Lee, Jyh-Jong Leu: Partition search filter and its performance analysis. Journal of Systems and Software 47(1): 35-43 (1999)
1998
126 Yung-Kuan Chan, Chin-Chen Chang: An Efficient Data Structure for Storing Similar Binary Images. FODO 1998: 268-275
125EEChin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee: A Scheme for Obtaining a Message from the Digital Multisignature. Public Key Cryptography 1998: 154-163
124EERen-Junn Hwang, Chin-Chen Chang: An on-line secret sharing scheme for multi-secrets. Computer Communications 21(13): 1170-1176 (1998)
123EEWei-Bin Lee, Chin-Chen Chang: Authenticity of public keys in asymmetric cryptosystems. Computer Communications 21(2): 195-198 (1998)
122EEWei-Bin Lee, Chin-Chen Chang: Using RSA with low exponent in a public network. Computer Communications 21(3): 284-286 (1998)
121EEChing-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Threshold signature schemes with traceable signers in group communications. Computer Communications 21(8): 771-776 (1998)
120EEChin-Chen Chang, Zen-Chung Shih: An accuracy enhancement algorithm for hierarchical radiosity. Computers & Graphics 22(2-3): 225-232 (1998)
119EEChin-Chen Chang, Chin-Feng Lee: A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures. Data Knowl. Eng. 26(2): 121-133 (1998)
118EETung-Shou Chen, Chin-Chen Chang, Min-Shiang Hwang: A virtual image cryptosystem based upon vector quantization. IEEE Transactions on Image Processing 7(10): 1485-1488 (1998)
117 Chin-Chen Chang, Ren-Junn Hwang: Sharing Secret Omages using Shadow Codebooks. Inf. Sci. 111(1-4): 335-345 (1998)
116EEDer-Chyuan Lou, Chin-Chen Chang: An adaptive exponentiation method. Journal of Systems and Software 42(1): 59-69 (1998)
115EEChin-Chen Chang, Chin-Feng Lee: A spatial match retrieval mechanism for symbolic pictures. Journal of Systems and Software 44(1): 73-83 (1998)
114 Chin-Chen Chang, Zen-Chung Shih: Tighter error bounds and weighted error metrics for hierarchical radiosity. Journal of Visualization and Computer Animation 9(2): 53-63 (1998)
1997
113EEWei-Bin Lee, Chin-Chen Chang: Three ID-based information security functions. Computer Communications 20(14): 1301-1307 (1997)
112EEChiuyuan Chen, Chin-Chen Chang, Gerard J. Chang: Proper interval graphs and the guard problem. Discrete Mathematics 170(1-3): 223-230 (1997)
111EEC. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee: Optimal Bucket Allocation Design of k-ary MKH Files for Partial Match Retrieval. IEEE Trans. Knowl. Data Eng. 9(1): 148-160 (1997)
110EETung-Shou Chen, Chin-Chen Chang: A new image coding algorithm using variable-rate side-match finite-state vector quantization. IEEE Transactions on Image Processing 6(8): 1185-1187 (1997)
109EEChin-Chen Chang, Shin-Jia Hwang: A Simple Approach for Generating RSA Keys. Inf. Process. Lett. 63(1): 19-21 (1997)
108EEWei-Bin Lee, Chin-Chen Chang: Authenticated Encryption Schemes with Linkage Between Message Blocks. Inf. Process. Lett. 63(5): 247-250 (1997)
107 Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu: A Binary Access Control Method Using Prime Factorization. Inf. Sci. 96(1&2): 15-26 (1997)
106EEDer-Chyuan Lou, Chin-Chen Chang: A Cost Optimal Search Technique for the Knapsack Problem. International Journal of High Speed Computing 9(1): 1-12 (1997)
105EEC. Y. Chen, H. F. Lin, Chin-Chen Chang, Richard C. T. Lee: Multidisk Smaller Sized MKH file Allocation for Partial Match Retrieval. J. Inf. Sci. Eng. 13(1): 125-141 (1997)
104EEChin-Chen Chang, Wen-Bin Wu: A secure voting system on a public network. Networks 29(2): 81-87 (1997)
103 Der-Chyuan Lou, Chin-Chen Chang: A Parallel Two-List Algorithm for the Knapsack Problem. Parallel Computing 22(14): 1985-1996 (1997)
1996
102 Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang: A group-oriented (t, n) undeniable signature scheme without trusted center. ACISP 1996: 266-274
101 Shin-Jia Hwang, Chin-Chen Chang: A dynamic secret sharing scheme with cheater detection. ACISP 1996: 48-55
100 C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin: A Temporal Join Mechanism Based on Trie-Ranking Data Structure. CODAS 1996: 428-435
99 Chin-Feng Lee, Chin-Chen Chang: Optimal Bit Lengths of Direction Signatures for Spatial Match Accessing Using Basic Linear Hashing Scheme. CODAS 1996: 526-529
98EEC. Y. Chen, Chin-Chen Chang, Richard C. T. Lee, D. C. Lin: Optimal Linear Hashing Files for Orthogonal Range Retrieval. COMPSAC 1996: 406-413
97 Chin-Chen Chang, Ji-Han Jiang: A Spatial Filter for Similarity Retrieval. IJPRAI 10(6): 711-730 (1996)
96EEWei-Bin Lee, Chin-Chen Chang: Integrating Authentication in Public Key Distribution System. Inf. Process. Lett. 57(1): 49-52 (1996)
95EEShin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang: Autenticated Encryption Schemes with Message Linkage. Inf. Process. Lett. 58(4): 189-195 (1996)
94 Annie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang: Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries. Inf. Sci. 90(1-4): 91-107 (1996)
93EEChien-Yuan Chen, Chin-Chen Chang, Wei-Pang Yang: Cryptanalysis of the Secret Exponent of the RSA Scheme. J. Inf. Sci. Eng. 12(2): 277-290 (1996)
92EEWei-Bin Lee, Chin-Chen Chang: On Key Changeable ID-Based Digital Signature Scheme. J. Inf. Sci. Eng. 12(3): 381-386 (1996)
91EEChin-Chen Chang, Ruey-Feng Chang, Wen-Tsai Lee, Ching-Lin Kuo: A Fast Search Algorithm for Vector Quantization. J. Inf. Sci. Eng. 12(4): 593-602 (1996)
90 Chin-Chen Chang, Daniel J. Buehrer: An Improvement to Ziegler's Sparse Matrix Compression Algorithm. Journal of Systems and Software 35(1): 67-71 (1996)
89EEChin-Chen Chang, D. C. Lin: A spatial data representation: an adaptive 2D-H string. Pattern Recognition Letters 17(2): 175-185 (1996)
1995
88 Chiuyuan Chen, Chin-Chen Chang: Connected Proper Interval Graphs and the Guard Problem in Spiral Polygons. Combinatorics and Computer Science 1995: 39-47
87 Shin-Jia Hwang, Chin-Chen Chang, Wei-Pang Yang: Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. Cryptography: Policy and Algorithms 1995: 215-227
86 Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih: Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Computer Communications 18(1): 45-47 (1995)
85EEChin-Chen Chang, Sun-Min Tsu, Chien-Yuan Chen: Remote scheme for password authentication based on theory of quadratic residues. Computer Communications 18(12): 936-942 (1995)
84EEHui-Min Tsai, Chin-Chen Chang: A cryptographic implementation for dynamic access control in a user hierarchy. Computers & Security 14(2): 159-166 (1995)
83 Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: New Public-Key Cipher System Based Upon the Diophantine Equations. IEEE Trans. Computers 44(1): 13-19 (1995)
82 Chin-Chen Chang, J. Liang: Dynamic Pictorial Databases Design for Similarity Retrieval. Inf. Sci. 87(1-3): 29-46 (1995)
81EEYuh-Jiun Chen, Chin-Chen Chang, Wei-Pang Yang: Shortest Weighted Length Addition Chains. J. Inf. Sci. Eng. 11(2): 295-305 (1995)
80EEChin-Chen Chang, Woan-Jing Horng, Daniel J. Buehrer: A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm. J. Inf. Sci. Eng. 11(3): 417-431 (1995)
79EEAnnie Y. H. Chou, Wei-Pang Yang, Chin-Chen Chang: Optimal Two-Attribute Cartesian Product Files for Orthogonal Range Queries. J. Inf. Sci. Eng. 11(4): 625-647 (1995)
78EEYuh-Jiun Chen, Chin-Chen Chang, Wei-Pang Yang: Parallel Computation of the Modular Cascade Exponentiation. Parallel Algorithms Appl. 7(1-2): 29-42 (1995)
77EEChin-Chen Chang, Chin-Feng Lee: Relative coordinates oriented symbolic string for spatial relationship retrieval. Pattern Recognition 28(4): 563-570 (1995)
76EEC. Y. Chen, Chin-Chen Chang, Richard Chia-Tung Lee: A near pattern-matching scheme based upon principal component analysis. Pattern Recognition Letters 16(4): 339-345 (1995)
75EEChin-Chen Chang, Tzong-Chen Wu: An exact match retrieval scheme based upon principal component analysis. Pattern Recognition Letters 16(5): 465-470 (1995)
1994
74EEChu-Hsing Lin, Chin-Chen Chang: Method for constructing a group-oriented cipher system. Computer Communications 17(11): 805-808 (1994)
73EEMing-Yung Ko, Tzonelih Hwang, Chin-Chen Chang: Attacks on an ID-based signature scheme based on Rabin's public key cryptosystem. Computer Communications 17(9): 674-676 (1994)
72EEChin-Chen Chang, J. K. Jan, Daniel J. Buehrer: A scheme to determine the relationship between two users in a hierarchy. Computers & Security 13(3): 255-261 (1994)
71EEChi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang: Authentication and protection of public keys. Computers & Security 13(7): 581-585 (1994)
70EEChin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu: Access control with binary keys. Computers & Security 13(8): 681-686 (1994)
69 Chin-Chen Chang, Yaw-Wen Chen, Daniel J. Buehrer: A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis. IJPRAI 8(4): 859-875 (1994)
68 Tzong-Chen Wu, Chin-Chen Chang: Controlling Access in Tree Hierarchies. Inf. Sci. 78(1-2): 69-76 (1994)
67 J. Liang, Chin-Chen Chang, Ron McFadyen, Richard C. T. Lee: Optimal Multiple Key Hashing Files for Orthogonal Range Queries. Inf. Sci. 79(1-2): 145-158 (1994)
66EEChin-Chen Chang, Feng-Yi Liou: A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal Public Key Cryptosystem. J. Inf. Sci. Eng. 11(3): 423-432 (1994)
65EEChin-Chen Chang, Shin-Jia Hwang, Daniel J. Buehrer: New concepts for multiple stack systems: Born and reborn. Journal of Systems and Software 27(1): 45-54 (1994)
64EETzong-Chen Wu, Chin-Chen Chang: Application of geometric hashing to iconic database retrieval. Pattern Recognition Letters 15(9): 871-876 (1994)
1993
63EEJ. Liang, Chin-Chen Chang: Similarity Retrieval on Pictorial Databases Based upon Module Operation. DASFAA 1993: 19-26
62EEDaniel J. Buehrer, Chin-Chen Chang: Application of a Reciprocal Confluence Tree Unit to Similar-Picture Retrieval. SSD 1993: 437-442
61 J. K. Jan, Chin-Chen Chang: A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files. BIT 33(3): 382-389 (1993)
60 Chin-Chen Chang, Huey-Cheue Kowng, Tzong-Chen Wu: A Refinement of a Compression-Oriented Addressing Scheme. BIT 33(4): 530-535 (1993)
59 Chin-Chen Chang, Horng-Chin Lee: A New Generalized Group-Oriented Cryptoscheme Without Trusted Centers. IEEE Journal on Selected Areas in Communications 11(5): 725-729 (1993)
58 Chin-Chen Chang, Tzong-Chen Wu: Controlling the Access Requests in an Information Protection System. Inf. Process. Manage. 29(1): 61-68 (1993)
57 C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee: Optimal MMI file systems for orthogonal range retrieval. Inf. Syst. 18(1): 37-54 (1993)
56 Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang: Algebraic operations on encryped relational databases. Inf. Syst. 18(1): 55-62 (1993)
55EEC. Y. Chen, Chin-Chen Chang: An object-oriented similarity retrieval algorithm for iconic image databases. Pattern Recognition Letters 14(6): 465-470 (1993)
54EEChin-Chen Chang, Tzong-Chen Wu: A hashing-oriented nearest neighbor searching scheme. Pattern Recognition Letters 14(8): 625-630 (1993)
1992
53 Chin-Chen Chang, Tzong-Chen Wu, C. P. Chen: The Design of a Conference Key Distribution System. AUSCRYPT 1992: 459-466
52 Chin-Chen Chang, Daniel J. Buehrer: De-Clustering Image Databases. Future Databases 1992: 142-145
51 Chin-Chen Chang, Horng-Chin Lee: A Solution to Generalized Group Oriented Cryptography. SEC 1992: 265-275
50 Chin-Chen Chang, H. Y. Chen, C. Y. Chen: Symbolic Gray Code As A Data Allocation Scheme For Two-Disc Systems. Comput. J. 35(3): 299-305 (1992)
49 Chin-Chen Chang, H. F. Lin, C. Y. Chen: Optimality Properties of the Disc Modulo Allocation Method for k-ary Multiple Key Hashing Files. Comput. J. 35(4): 390-394 (1992)
48 Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A Record-Oriented Cryptosystem for Database Sharing (Short Note). Comput. J. 35(6): 658-660 (1992)
47 Chin-Chen Chang, Tzong-Chen Wu: Retrieving the Most Similar Symbolic Pictures from Pictorial Databases. Inf. Process. Manage. 28(5): 581-588 (1992)
46EEChin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee: Hierarchy representations based on arithmetic coding for dynamic information protection systems. Inf. Sci. 64(1-2): 35-48 (1992)
45 Chin-Chen Chang, Ren-Junn Hwang, Tzong-Chen Wu: Crypographic key assignment scheme for access control in a hierarchy. Inf. Syst. 17(3): 243-247 (1992)
44 Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A conference key broadcasting system using sealed locks. Inf. Syst. 17(4): 323-328 (1992)
43 C. Y. Chen, Chin-Chen Chang: On GDM allocation for partial range queries. Inf. Syst. 17(5): 381-394 (1992)
42EEJen Nan Chen, Chin-Chen Chang: A Chinese Character Retrieval Scheme Using Shuang Pinyin. J. Inf. Sci. Eng. 8(3): 487-507 (1992)
1991
41 Chin-Chen Chang, C. Y. Chen, J. K. Jan: On the Design of a Machine-Independent Perfect Hashing Scheme. Comput. J. 34(5): 469-474 (1991)
40EEJ. K. Jan, Chin-Chen Chang, S. J. Wang: A dynamic key-lock-pair access control scheme. Computers & Security 10(2): 129-139 (1991)
39EEChin-Chen Chang, C. Y. Chen: A note on allocating k-ary multiple key hashing files among multiple disks. Inf. Sci. 55(1-3): 69-76 (1991)
38 Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee: Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991)
37 C. Y. Chen, Chin-Chen Chang, Richard C. T. Lee: On the design of multiple key hashing files for concurrent orthogonal range retrieval between two disks. Inf. Syst. 16(6): 613-625 (1991)
36EEChin-Chen Chang: A Composite Perfect Hashing Scheme for Large Letter-Oriented Key Sets. J. Inf. Sci. Eng. 7(2): 173-186 (1991)
35EEChin-Chen Chang: Spatial Match Retrieval of Symbolic Pictures. J. Inf. Sci. Eng. 7(3): 405-422 (1991)
34EEChin-Chen Chang, S. M. Hwang, Daniel J. Buehrer: A shape recognition scheme based on relative distances of feature points from the centroid. Pattern Recognition 24(11): 1053-1063 (1991)
33EEChin-Chen Chang, Suh-Yin Lee: Retrieval of similar pictures on pictorial databases. Pattern Recognition 24(7): 675-680 (1991)
32 Chin-Chen Chang, Tzong-Chen Wu: A Letter-oriented Perfect Hashing Scheme Based upon Sparse Table Compression. Softw., Pract. Exper. 21(1): 35-49 (1991)
1990
31 Chin-Chen Chang, Chu-Hsing Lin: A Reciprocal Confluence Tree Unit and Its Applications. BIT 30(1): 27-33 (1990)
30EEChu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang: A Dynamic Access Control Mechanism in Information Protection Systems. J. Inf. Sci. Eng. 6(1): 25-35 (1990)
29EEChin-Chen Chang, Ling-Hua Wu: A New Password Authentication Scheme. J. Inf. Sci. Eng. 6(2): 139-147 (1990)
1989
28EEChin-Chen Chang, D. F. Leu: Multikey Sorting as a File Organization Scheme When Queries Are Not Equally Likely. DASFAA 1989: 219-224
1988
27EEChin-Chen Chang, C. Y. Chen: Orthogonal Range Retrieval Using Bucket Address Hashing. SSDBM 1988: 133-140
26 Chin-Chen Chang: Application of Principal Component Analysis to Multi-Disk Concurrent Accessing. BIT 28(2): 205-214 (1988)
25 Chin-Chen Chang, C. Y. Chen: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files. Comput. J. 31(6): 565-566 (1988)
24 Chin-Chen Chang, C. H. Chang: An Ordered Minimal Perfect Hashing Scheme with Single Parameter. Inf. Process. Lett. 27(2): 79-83 (1988)
1987
23 Chin-Chen Chang, C. Y. Chen: Performance of Two-Disk Partition Data Allocations. BIT 27(3): 306-314 (1987)
22 Chin-Chen Chang: An Information Protection Scheme Based Upon Number Theory. Comput. J. 30(3): 249-253 (1987)
21 Chin-Chen Chang, C. Y. Chen: Performance Analysis of the Generalised Disc Modulo Allocation method for Multiple Key Hashing Files on Multi-Disc Systems. Comput. J. 30(6): 535-540 (1987)
20EEChin-Chen Chang, C. Y. Chen: Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System. J. Inf. Sci. Eng. 3(2): 151-176 (1987)
19EEChin-Chen Chang, C. Y. Chen: Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval. J. Inf. Sci. Eng. 3(2): 177-188 (1987)
1986
18EEChin-Chen Chang, J. C. Shieh: On the Design of Ordered Minimal Perfect Hashing Functions. ICDE 1986: 112-115
17EEM. T. Fang, Richard C. T. Lee, Chin-Chen Chang: The Idea of De-Clustering and its Applications. VLDB 1986: 181-188
16 Chin-Chen Chang: On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems. BIT 26(4): 410-417 (1986)
15 Chin-Chen Chang, Richard C. T. Lee: A Letter-Oriented Minimal Perfect Hashing Scheme. Comput. J. 29(3): 277-281 (1986)
14EEChin-Chen Chang: Letter-oriented reciprocal hashing scheme. Inf. Sci. 38(3): 243-255 (1986)
13EEChin-Chen Chang: A scheme for constructing ordered minimal perfect hashing functions. Inf. Sci. 39(2): 187-195 (1986)
1985
12 Chin-Chen Chang, Jaw-Ji Shen: Consecutive Retrieval Organization as a File Allocation Scheme on Multiple Disk Systems. FODO 1985: 113-124
11 Chin-Chen Chang, L. S. Lian: On Strict Optimality Property of Allocating Binary Cartesian Product Files on Multiple Disk Systems. FODO 1985: 159-175
10 Chin-Chen Chang, J. C. Shieh: On the Complexity of File Allocation Problem. FODO 1985: 177-181
9 Chin-Chen Chang: Database Research and Development in Taiwan. FODO 1985: 603-605
8 Chin-Chen Chang: The Study of a Letter Oriented Minimal Perfect Hashing Scheme. FODO 1985: 91-99
7 Clement T. Yu, Chin-Chen Chang, Marjorie Templeton, David Brill, Eric Lund: Query Processing in a Fragmented Relational Distributed System: Mermaid. IEEE Trans. Software Eng. 11(8): 795-810 (1985)
1984
6 Chin-Chen Chang, M. W. Du, Richard C. T. Lee: Performance Analyses of Cartesian Product Files and Random Files. IEEE Trans. Software Eng. 10(1): 88-99 (1984)
5EEChin-Chen Chang: An ordered minimal perfect hashing scheme based upon Euler's theorem. Inf. Sci. 32(3): 165-172 (1984)
4EEChin-Chen Chang: Optimal information retrieval when queries are not random. Inf. Sci. 34(3): 199-223 (1984)
1983
3EEChin-Chen Chang, M. W. Du, Richard C. T. Lee: The hierarchical ordering in multiattribute files. Inf. Sci. 31(1): 41-75 (1983)
1982
2 Chin-Chen Chang, Richard C. T. Lee, M. W. Du: Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries. IEEE Trans. Software Eng. 8(3): 235-249 (1982)
1980
1EEChin-Chen Chang, Richard C. T. Lee, David Hung-Chang Du: Some Properties of Cartesian Product Files. SIGMOD Conference 1980: 157-168

Coauthor Index

1David Brill [7]
2Daniel J. Buehrer [34] [52] [62] [65] [69] [72] [80] [90]
3Chao-Wen Chan [145] [192] [205] [221] [293] [309] [370] [390] [440]
4Chi-Shiang Chan [155] [186] [199] [200] [219] [282] [284] [328] [335] [338] [391] [395] [429]
5Yung-Kuan Chan [126] [148] [158] [162] [179] [184] [267] [296]
6C. H. Chang [24]
7Gerard J. Chang [112]
8Jen-Chieh Chang [363]
9Kai-Jie Chang [434]
10Pen-Yi Chang [408]
11Ruey-Feng Chang [91]
12Shih-Chang Chang [488]
13Ya-Fen Chang [210] [228] [231] [232] [252] [262] [272] [273] [288] [292] [294] [310] [314] [315] [348] [366] [374] [393] [394] [402] [418]
14Yung-Chen Chang [378] [380]
15S. Wesley Changchien [185]
16Ben M. Chen [454] [455] [457] [480] [481]
17C. P. Chen [53]
18C. Y. Chen [19] [20] [21] [23] [25] [27] [37] [39] [41] [43] [49] [50] [55] [57] [76] [98] [100] [105] [111]
19Chang-Chu Chen [318] [417] [465]
20Chien-Yuan Chen [85] [93] [131] [237] [427]
21Chiuyuan Chen [88] [112]
22Guei-Mei Chen [226] [354]
23Guu-In Chen [151]
24H. Y. Chen [50]
25I-Yen Chen [190]
26Jen Nan Chen [42]
27Jiann-Jone Chen [344]
28Kuo-Lun Chen [247] [330] [363]
29Kuo-Nan Chen [487]
30Lin-Li Chen [150]
31Tung-Shou Chen [110] [118] [133] [138] [139] [142] [143] [144] [149] [150] [161] [168] [174] [176] [214] [384]
32Wen Chen [456] [457]
33Yan-Ren Chen [245]
34Yaw-Wen Chen [69]
35Yi-Hui Chen [379] [428] [432] [460] [461] [469] [479]
36Yongjun Chen [454] [457]
37Yuh-Jiun Chen [78] [81]
38Zhigang Chen [454] [455]
39Ting-Fang Cheng [420] [477]
40Yi-Fang Cheng [433] [483]
41Cheng-Chin Chiang [396]
42Chi-Lung Chiang [187] [194] [327]
43Wen-Hong Chiou [71]
44Yen-Chang Chiu [486]
45Annie Y. H. Chou [79] [94]
46Henry Chou [356]
47Jer-Sheng Chou [138]
48Yung-Chen Chou [278] [298] [300] [302] [377] [387] [409] [424] [432] [438] [468] [470] [475] [478] [484]
49Jun-Chou Chuang [164] [174] [213] [240] [249] [308] [357] [375]
50Chi-Yien Chung [202]
51Lou-Zo Chung [176]
52Pei-Fang Chung [137]
53David Hung-Chang Du [1]
54M. W. Du [2] [3] [6]
55Ding-Zhou Duan [157] [167] [170] [171]
56Yi-Hsuan Fan [338] [391] [422] [446] [447]
57M. T. Fang [17]
58Chin-Chuan Han [344]
59Woan-Jing Horng [80]
60Hsien-Chu Hsia [161] [384]
61Ju Yuan Hsiao [141] [155] [156] [187] [188] [194] [195] [199] [219] [327]
62Chih-Ping Hsieh [188]
63Jun-Wei Hsieh [157]
64Yi-Pei Hsieh [411] [449] [450] [472]
65Yih-Shin Hu [213] [240] [336] [441]
66Yu-Chen Hu [163] [177] [178] [203] [223] [271] [277] [352] [354] [355] [357] [399] [423]
67Chi-Hsiung Huang [330]
68Hui-Feng Huang [191] [209] [217] [234] [294] [311] [316] [320] [329] [346] [372] [389] [426] [471]
69Pai-Cheng Huang [125] [132]
70Wen-Hung Huang [398]
71Yea-Shuan Huang [190]
72Yu-Lin Huang [489]
73Kuo-Lung Hung [152] [173] [175] [197] [214] [218] [388] [442]
74Kuo-Feng Hwang [135] [146] [159] [166] [172] [180] [201] [291] [309]
75Min-Shiang Hwang [118] [135] [147] [149] [172] [180] [204] [285] [291]
76Pai-Cheng Hwang [261]
77Ren-Junn Hwang [45] [117] [124] [128] [129] [215] [235] [266] [268]
78S. M. Hwang [34]
79Shin-Jia Hwang [65] [87] [95] [101] [109]
80Tzonelih Hwang [73]
81J. K. Jan [40] [41] [61] [72]
82Jinn-ke Jan [381] [431] [485]
83Ji-Han Jiang [97] [139]
84Qing-Zhen Jiang [444]
85Chia-Lin Kao [232]
86The Duc Kieu [470] [475] [478]
87Ming-Yung Ko [73]
88Huey-Cheue Kowng [60]
89Ching-Lin Kuo [91]
90Jui-Yi Kuo [228] [317] [331]
91Yen-Ting Kuo [459]
92Ying-Tse Kuo [220]
93Yeu-Pong Lai [211] [229] [295] [324] [333] [359] [360]
94Yueh-Yi Lai [312]
95Chi-Sung Laih [71] [86]
96Hoai Bac Le [474]
97T. Hoang Ngan Le [474]
98Chia-Yin Lee [330] [332] [486]
99Chin-Feng Lee [77] [99] [115] [119] [134] [464] [476] [487] [489]
100Horng-Chin Lee [51] [59]
101Jung-San Lee [253] [288] [299] [317] [318] [321] [348] [358] [400] [408] [420] [445] [477] [482]
102Richard C. T. Lee (Richard Chia-Tung Lee) [1] [2] [3] [6] [15] [17] [30] [37] [38] [44] [46] [48] [57] [67] [76] [83] [98] [100] [105] [111]
103Suh-Yin Lee [33]
104Tian-Fu Lee [127]
105Wei Lee [261]
106Wei-Bin Lee [92] [96] [108] [113] [122] [123] [125] [128] [130] [132]
107Wen-Tsai Lee [91]
108D. F. Leu [28]
109Jyh-Jong Leu [125] [127]
110Kuan-Ming Li [379] [468]
111Yu-Chiang Li [257] [299] [313] [323] [337] [398] [421] [425] [473]
112L. S. Lian [11]
113J. Liang [63] [67] [82]
114Chia-Te Liao [339]
115Chia-Chen Lin [270] [281] [297] [306] [319] [322] [350] [352] [353] [376] [383] [386] [397] [405] [413] [441] [448] [452] [461] [469] [474] [479]
116Chia-Hsuan Lin [449] [461]
117Chih-Yang Lin [236] [258] [281] [289] [304] [345] [349] [351] [356] [401] [403] [409] [411] [415] [430] [436] [446] [466] [472]
118Chu-Hsing Lin [30] [31] [38] [44] [46] [48] [74] [83] [102] [121] [181] [220] [222] [261] [264] [265] [330] [332] [363] [427]
119D. C. Lin [89] [98] [100]
120H. F. Lin [49] [105] [111]
121Hsiau Wen Lin [382]
122Hui-Chuan Lin [365]
123Iuon-Chang Lin [147] [160] [183] [196] [204] [224] [227] [230] [260] [269] [275] [279] [285] [286] [334] [392] [404] [419] [433] [435] [458] [483]
124Keng-Chu Lin [369] [401]
125Min-Hui Lin [177] [178] [226] [233] [243] [245] [248] [255] [259] [326]
126Ming-Fen Lin [157] [167] [170] [171]
127Pei-Yu Lin [236] [254] [308] [402] [439] [453] [467]
128Yi Lin [143] [146]
129Feng-Yi Liou [66]
130Chen-Duo Liu [312]
131Cheng-Yi Liu [216] [451]
132Li-Jen Liu [450]
133Yi-Long Liu [263]
134Der-Chyuan Lou [103] [106] [107] [116]
135Po-Wen Lu [195] [307]
136Tzu-Chuen Lu [185] [263] [283] [301] [305] [325] [336] [342] [343] [368] [385] [406] [416] [422] [438] [463]
137Eric Lund [7]
138Ron McFadyen [67]
139Jun Ni [455]
140Ya-Ping Pan [186]
141Chung-Mou Pengwu [251]
142Jao-Ji Shen [70]
143Jau-Ji Shen [184] [298] [302] [378] [380] [387]
144Jaw-Ji Shen [12]
145J. C. Shieh [10] [18]
146Kai-Jung Shih [278]
147Timothy K. Shih [183] [196] [382]
148Zen-Chung Shih [114] [120]
149Fun-Chou Shiue [133]
150Jian Shu [481]
151Yu-Wei Su [393] [435]
152Yuan-Yuan Su [189]
153Wei-Liang Tai [297] [326] [350] [374] [383] [405] [413] [447] [448]
154Wen-Kai Tai [312] [344] [396] [451] [459]
155Charlie Irawan Tan [396]
156Marjorie Templeton [7]
157Chwei-Shyong Tsai [136] [144] [154] [168] [207] [208]
158Hao-Chuan Tsai [428]
159Hui-Min Tsai [84] [260] [269] [279]
160Piyu Tsai [163] [223] [243] [248] [270]
161Yu-Ting Tsai [444]
162Chun-Sen Tseng [306] [335] [405] [415]
163Hsien-Wen Tseng [198] [212] [225] [238] [239] [246] [256] [274] [276] [341] [462]
164Chih-Chiang Tsou [410] [424]
165Sun-Min Tsu [85]
166Chih-Hung Wang [290] [362]
167Ching-Te Wang [102] [121] [181] [222] [264] [265]
168Chung-Chuan Wang [381] [431] [485]
169Hsiao-Hsi Wang [260]
170Kuo-Hua Wang [464]
171Kuo-Hui Wang [489]
172S. J. Wang [40]
173Yi-Ren Wang [476]
174Yu-Zheng Wang [304] [345] [423] [436] [466]
175Shr-Ching Weng [444]
176Chia-Chi Wu [361] [373] [443] [458]
177Hsien-Chu Wu [169] [206] [242] [287] [365] [367] [414]
178Ling-Hua Wu [29]
179Ming-Ni Wu [182] [259] [322] [353] [386] [397] [452]
180Tzong-Chen Wu [32] [38] [45] [47] [53] [54] [56] [58] [60] [64] [68] [70] [75] [86] [107] [153]
181Wen-Bin Wu [104] [371]
182Wen-Chuan Wu [280] [300] [303] [314] [364] [399] [410] [412] [437] [460]
183Jun-Bin Ya [416]
184Jen-Ho Yang [237] [290] [362]
185Mau-Tsuen Yang [396]
186Shang-Ru Yang [443]
187Shu-Kai Yang [157] [167] [170] [171]
188Wei-Pang Yang [78] [79] [81] [87] [93] [94] [95]
189Jieh-Shan Yeh [313] [323] [371] [381] [421] [425] [473]
190Jun-Bin Yeh [301] [319] [337]
191Jyh-Chiang Yeh [141] [156]
192Yi-Shiung Yeh [56]
193Clement T. Yu [7]
194Fei Yu [454] [455] [456] [457] [480] [481]
195Tai-Xing Yu [165] [193]
196Ting-Wei Yu [367]
197Yuan-Hui Yu [241] [244] [271] [277] [278] [347] [419]
198Guangxue Yue [456] [480] [481]
199Jiexian Zeng [456]
200Ya-Lun Zeng [396]
201Jun Zhang [480]
202Xinpeng Zhang [431]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)