2007 | ||
---|---|---|
9 | EE | Yeu-Pong Lai, Jui-Heng Tai: Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. NBiS 2007: 69-78 |
8 | EE | Yeu-Pong Lai, Po-Lun Hsia: Using the vulnerability information of computer systems to improve the network security. Computer Communications 30(9): 2032-2047 (2007) |
2006 | ||
7 | EE | Chin-Chen Chang, Yeu-Pong Lai: A division algorithm for residue numbers. Applied Mathematics and Computation 172(1): 368-378 (2006) |
6 | EE | Chin-Chen Chang, Yeu-Pong Lai: A parallel residue-to-binary conversion algorithm without trial division. Computers & Electrical Engineering 32(6): 454-467 (2006) |
2005 | ||
5 | EE | Yeu-Pong Lai, Chin-Chen Chang: A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. AINA 2005: 139-144 |
4 | EE | Chin-Chen Chang, Yeu-Pong Lai: A Parallel Modular Exponentiation Scheme for Transformed Exponents. APPT 2005: 443-452 |
3 | EE | Chin-Chen Chang, Yeu-Pong Lai: A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli. Applied Mathematics and Computation 161(1): 181-194 (2005) |
2004 | ||
2 | EE | Chin-Chen Chang, Yeu-Pong Lai: A convertible group signature scheme. Operating Systems Review 38(4): 58-65 (2004) |
2003 | ||
1 | Chin-Chen Chang, Yeu-Pong Lai: A flexible date-attachment scheme on e-cash. Computers & Security 22(2): 160-166 (2003) |
1 | Chin-Chen Chang | [1] [2] [3] [4] [5] [6] [7] |
2 | Po-Lun Hsia | [8] |
3 | Jui-Heng Tai | [9] |