| 2006 |
| 6 | EE | Da-Wei Wang,
Churn-Jung Liau,
Yi-Ting Chiang,
Tsan-sheng Hsu:
Information Theoretical Analysis of Two-Party Secret Computation.
DBSec 2006: 310-317 |
| 2005 |
| 5 | EE | Yi-Ting Chiang,
Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu:
Secrecy of Two-Party Secure Computation.
DBSec 2005: 114-123 |
| 4 | EE | Yi-Ting Chiang,
Ching-Chi Lin,
Hsueh-I Lu:
Orderly Spanning Trees with Applications.
SIAM J. Comput. 34(4): 924-945 (2005) |
| 2002 |
| 3 | EE | Yi-Ting Chiang,
Yu-Cheng Chiang,
Tsan-sheng Hsu,
Churn-Jung Liau,
Da-Wei Wang:
How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases.
Rough Sets and Current Trends in Computing 2002: 226-233 |
| 2001 |
| 2 | EE | Yi-Ting Chiang,
Ching-Chi Lin,
Hsueh-I Lu:
Orderly spanning trees with applications to graph encoding and graph drawing.
SODA 2001: 506-515 |
| 1 | EE | Yi-Ting Chiang,
Ching-Chi Lin,
Hsueh-I Lu:
Orderly Spanning Trees with Applications
CoRR cs.DS/0102006: (2001) |