dblp.uni-trier.dewww.uni-trier.de

Chi-Sung Laih

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
48EEYu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen: Defending On-Line Web Application Security with User-Behavior Surveillance. ARES 2008: 410-415
47EEYa-Ting Carolyn Yang, Wan-Chi Wu, Pei-Yun Chung, Chi-Sung Laih, Jia-Rong Wen, Chi-San Lin, Jian-Bin Gao: The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan. ICWL 2008: 87-98
46EEPei-Te Chen, Chi-Sung Laih: IDSIC: an intrusion detection system with identification capability. Int. J. Inf. Sec. 7(3): 185-197 (2008)
2007
45EEYu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih: Generating Attack Scenarios with Causal Relationship. GrC 2007: 368-373
44EEWu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih: Fast Multicomputation with Asynchronous Strategy. IEEE Trans. Computers 56(2): 234-242 (2007)
2006
43EEMing-Yang Chen, Ching-Nung Yang, Chi-Sung Laih: Authorized Tracking and Tracing for RFID Tags. EUC Workshops 2006: 435-444
42 Chi-Sung Laih, Chun-Ju Fu, Wen-Chung Kuo: Design a Secure and Practical Metering Scheme. International Conference on Internet Computing 2006: 443-447
41EEShyh-Yih Wang, Chi-Sung Laih: Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Dependable Sec. Comput. 3(1): 91-100 (2006)
2005
40EEWu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih: Fast Multi-computations with Integer Similarity Strategy. Public Key Cryptography 2005: 138-153
39EEPei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier: Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. SADFE 2005: 120-134
38EEI-Chuan Chang Bor-Wen Hsu, Chi-Sung Laih: A DCT Quantization-Based Image Authentication System for Digital Forensics. SADFE 2005: 223-235
37EEWu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih: Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation. Applied Mathematics and Computation 167(1): 108-117 (2005)
36EEShyh-Yih Wang, Chi-Sung Laih: Cryptanalyses of two key assignment schemes based on polynomial interpolations. Computers & Security 24(2): 134-138 (2005)
35EEShyh-Yih Wang, Chi-Sung Laih: Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. Journal of Systems and Software 75(1-2): 189-192 (2005)
2004
34EEShee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih: Design of AES Based on Dual Cipher and Composite Field. CT-RSA 2004: 25-38
33EEChi-Sung Laih, K. Y. Chen: Generating visible RSA public keys for PKI. Int. J. Inf. Sec. 2(2): 103-109 (2004)
2003
32 Chi-Sung Laih: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings Springer 2003
31EEChen-Chi Lin, Chi-Sung Laih: The GPKI developing status of Taiwan and some major Asia countries. Computer Communications 26(16): 1884-1892 (2003)
30EEChi-Sung Laih, Shin Yan Chiou: Cryptanalysis of an optimized protocol for mobile network authentication and security. Inf. Process. Lett. 85(6): 339-341 (2003)
29EEChen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang: New Audio Secret Sharing Schemes With Time Division Technique. J. Inf. Sci. Eng. 19(4): 605-614 (2003)
2002
28EEHung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih: On the Design of RSA With Short Secret Exponent. J. Inf. Sci. Eng. 18(1): 1-18 (2002)
2000
27 Ching-Nung Yang, Chi-Sung Laih: New Colored Visual Secret Sharing Schemes. Des. Codes Cryptography 20(3): 325-336 (2000)
1999
26 Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih: On the Design of RSA with Short Secret Exponent. ASIACRYPT 1999: 150-164
25EEChi-Sung Laih, Fu-Kuan Tu: Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. ICPP Workshops 1999: 167-
24EEWen-Chung Kuo, Chi-Sung Laih, M. J. Gau: On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes. J. Inf. Sci. Eng. 15(5): 701-713 (1999)
1998
23 Ching-Nung Yang, Chi-Sung Laih: DCm Codes for Constructing t-EC/AUED Codes. IEEE Trans. Computers 47(4): 492 (1998)
1997
22EEYung-Cheng Lee, Chi-Sung Laih: On the Key Recovery of the Key Escrow System. ACSAC 1997: 216-220
21 Chi-Sung Laih, M. J. Gau: Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. IEEE Trans. Computers 46(4): 511 (1997)
20EEChing-Nung Yang, Chi-Sung Laih: A Note on Error-Correcting Codes for Authentication and Subliminal Channels. Inf. Process. Lett. 62(3): 141-143 (1997)
1996
19 Chi-Sung Laih, Ching-Nung Yang: On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. IEEE Trans. Computers 45(1): 103-108 (1996)
18EEChi-Sung Laih, Sung-Ming Yen: Multi-Signature for Specified Group of Verifiers. J. Inf. Sci. Eng. 12(1): 143-152 (1996)
1995
17 Chi-Sung Laih, Wen-Chung Kuo: Cryptanalysis of the Enhanced ElGamal's Signature Scheme. Cryptography: Policy and Algorithms 1995: 228-231
16 Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih: Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Computer Communications 18(1): 45-47 (1995)
15 Sung-Ming Yen, Chi-Sung Laih: Improved Digital Signature Algorithm. IEEE Trans. Computers 44(5): 729-730 (1995)
14 Sung-Ming Yen, Chi-Sung Laih: Improved Digital Signature Suitable for Batch Verification. IEEE Trans. Computers 44(7): 957-959 (1995)
13EEChi-Sung Laih, Fu-Kuan Tu, Wen-Chung Tai: On the Security of the Lucas Function. Inf. Process. Lett. 53(5): 243-247 (1995)
1994
12EEChi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang: Authentication and protection of public keys. Computers & Security 13(7): 581-585 (1994)
1993
11 Chi-Sung Laih, Sung-Ming Yen: On the Design of Conference Key Distribution Systems for the Broadcasting Networks. INFOCOM 1993: 1406-1413
1992
10 Chi-Sung Laih, Sung-Ming Yen: Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. AUSCRYPT 1992: 219-230
9 Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen: On Verifiable Implicit Asking Protocols for RSA Computation. AUSCRYPT 1992: 296-307
8 Sung-Ming Yen, Chi-Sung Laih: The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. AUSCRYPT 1992: 447-456
7EEChi-Sung Laih: Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle. J. Inf. Sci. Eng. 8(4): 633-640 (1992)
1991
6 Chi-Sung Laih, Lein Harn: Generalized Threshold Cryptosystems. ASIACRYPT 1991: 159-166
5 Chi-Sung Laih, Sung-Ming Yen, Lein Harn: Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. ASIACRYPT 1991: 450-459
1989
4EEChi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang: Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. CRYPTO 1989: 286-298
3EELein Harn, David Huang, Chi-Sung Laih: Password Authentication Based On Public-Key Distribution Cryptosystem. ICDE 1989: 332-338
2 Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen: A New Scheme for ID-Based Cryptosystems and Signature. INFOCOM 1989: 998-1002
1EEChi-Sung Laih, Lein Harn, Jau-Yien Lee: On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. IEEE Trans. Software Eng. 15(9): 1135-1137 (1989)

Coauthor Index

1Chin-Chen Chang [12] [16]
2Chia-Mei Chen [48]
3Chien-Hung Chen [45]
4Chin-Hsing Chen [2]
5K. Y. Chen [33]
6Ming-Yang Chen [43]
7Pei-Te Chen [39] [46]
8Tsuhan Chen [48]
9Yu-Chin Cheng [45] [48]
10Chung-Chih Chiang [45]
11Shin Yan Chiou [30]
12Wen-Hong Chiou [12]
13Pei-Yun Chung [47]
14Marc Dacier [39]
15Chun-Ju Fu [42]
16Jian-Bin Gao [47]
17M. J. Gau [21] [24]
18Dah-Jyh Guan [37] [40] [44]
19Lein Harn [1] [2] [3] [4] [5] [6]
20I-Chuan Chang Bor-Wen Hsu [38]
21David Huang [3]
22Tzonelih Hwang [4]
23Hideki Imai [9]
24Wen-Chung Kuo [17] [24] [42]
25Gu Hsin Lai [48]
26Jau-Yien Lee [1] [2] [4]
27Yung-Cheng Lee [22]
28Chen-Chi Lin [29] [31]
29Chi-San Lin [47]
30Shih-Chuan Lu [34]
31Tsutomu Matsumoto [9]
32Fabien Pouget [39]
33Hung-Min Sun [26] [28]
34Wen-Chung Tai [13]
35Fu-Kuan Tu [13] [25]
36Jun-Wei Wang [45]
37Shyh-Yih Wang [35] [36] [41]
38Jia-Rong Wen [47]
39Shee-Yau Wu [34]
40Tzong-Chen Wu [16]
41Wan-Chi Wu [47]
42Ching-Nung Yang [19] [20] [23] [27] [29] [43]
43Wu-Chuan Yang [26] [28] [37] [40] [44]
44Ya-Ting Carolyn Yang [47]
45Sung-Ming Yen [5] [8] [9] [10] [11] [14] [15] [18]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)