2006 |
6 | EE | Da-Wei Wang,
Churn-Jung Liau,
Yi-Ting Chiang,
Tsan-sheng Hsu:
Information Theoretical Analysis of Two-Party Secret Computation.
DBSec 2006: 310-317 |
2005 |
5 | EE | Yi-Ting Chiang,
Da-Wei Wang,
Churn-Jung Liau,
Tsan-sheng Hsu:
Secrecy of Two-Party Secure Computation.
DBSec 2005: 114-123 |
4 | EE | Yi-Ting Chiang,
Ching-Chi Lin,
Hsueh-I Lu:
Orderly Spanning Trees with Applications.
SIAM J. Comput. 34(4): 924-945 (2005) |
2002 |
3 | EE | Yi-Ting Chiang,
Yu-Cheng Chiang,
Tsan-sheng Hsu,
Churn-Jung Liau,
Da-Wei Wang:
How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases.
Rough Sets and Current Trends in Computing 2002: 226-233 |
2001 |
2 | EE | Yi-Ting Chiang,
Ching-Chi Lin,
Hsueh-I Lu:
Orderly spanning trees with applications to graph encoding and graph drawing.
SODA 2001: 506-515 |
1 | EE | Yi-Ting Chiang,
Ching-Chi Lin,
Hsueh-I Lu:
Orderly Spanning Trees with Applications
CoRR cs.DS/0102006: (2001) |