2008 | ||
---|---|---|
48 | EE | Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen: Defending On-Line Web Application Security with User-Behavior Surveillance. ARES 2008: 410-415 |
47 | EE | Ya-Ting Carolyn Yang, Wan-Chi Wu, Pei-Yun Chung, Chi-Sung Laih, Jia-Rong Wen, Chi-San Lin, Jian-Bin Gao: The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan. ICWL 2008: 87-98 |
46 | EE | Pei-Te Chen, Chi-Sung Laih: IDSIC: an intrusion detection system with identification capability. Int. J. Inf. Sec. 7(3): 185-197 (2008) |
2007 | ||
45 | EE | Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih: Generating Attack Scenarios with Causal Relationship. GrC 2007: 368-373 |
44 | EE | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih: Fast Multicomputation with Asynchronous Strategy. IEEE Trans. Computers 56(2): 234-242 (2007) |
2006 | ||
43 | EE | Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih: Authorized Tracking and Tracing for RFID Tags. EUC Workshops 2006: 435-444 |
42 | Chi-Sung Laih, Chun-Ju Fu, Wen-Chung Kuo: Design a Secure and Practical Metering Scheme. International Conference on Internet Computing 2006: 443-447 | |
41 | EE | Shyh-Yih Wang, Chi-Sung Laih: Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Dependable Sec. Comput. 3(1): 91-100 (2006) |
2005 | ||
40 | EE | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih: Fast Multi-computations with Integer Similarity Strategy. Public Key Cryptography 2005: 138-153 |
39 | EE | Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier: Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. SADFE 2005: 120-134 |
38 | EE | I-Chuan Chang Bor-Wen Hsu, Chi-Sung Laih: A DCT Quantization-Based Image Authentication System for Digital Forensics. SADFE 2005: 223-235 |
37 | EE | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih: Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation. Applied Mathematics and Computation 167(1): 108-117 (2005) |
36 | EE | Shyh-Yih Wang, Chi-Sung Laih: Cryptanalyses of two key assignment schemes based on polynomial interpolations. Computers & Security 24(2): 134-138 (2005) |
35 | EE | Shyh-Yih Wang, Chi-Sung Laih: Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. Journal of Systems and Software 75(1-2): 189-192 (2005) |
2004 | ||
34 | EE | Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih: Design of AES Based on Dual Cipher and Composite Field. CT-RSA 2004: 25-38 |
33 | EE | Chi-Sung Laih, K. Y. Chen: Generating visible RSA public keys for PKI. Int. J. Inf. Sec. 2(2): 103-109 (2004) |
2003 | ||
32 | Chi-Sung Laih: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings Springer 2003 | |
31 | EE | Chen-Chi Lin, Chi-Sung Laih: The GPKI developing status of Taiwan and some major Asia countries. Computer Communications 26(16): 1884-1892 (2003) |
30 | EE | Chi-Sung Laih, Shin Yan Chiou: Cryptanalysis of an optimized protocol for mobile network authentication and security. Inf. Process. Lett. 85(6): 339-341 (2003) |
29 | EE | Chen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang: New Audio Secret Sharing Schemes With Time Division Technique. J. Inf. Sci. Eng. 19(4): 605-614 (2003) |
2002 | ||
28 | EE | Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih: On the Design of RSA With Short Secret Exponent. J. Inf. Sci. Eng. 18(1): 1-18 (2002) |
2000 | ||
27 | Ching-Nung Yang, Chi-Sung Laih: New Colored Visual Secret Sharing Schemes. Des. Codes Cryptography 20(3): 325-336 (2000) | |
1999 | ||
26 | Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih: On the Design of RSA with Short Secret Exponent. ASIACRYPT 1999: 150-164 | |
25 | EE | Chi-Sung Laih, Fu-Kuan Tu: Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. ICPP Workshops 1999: 167- |
24 | EE | Wen-Chung Kuo, Chi-Sung Laih, M. J. Gau: On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes. J. Inf. Sci. Eng. 15(5): 701-713 (1999) |
1998 | ||
23 | Ching-Nung Yang, Chi-Sung Laih: DCm Codes for Constructing t-EC/AUED Codes. IEEE Trans. Computers 47(4): 492 (1998) | |
1997 | ||
22 | EE | Yung-Cheng Lee, Chi-Sung Laih: On the Key Recovery of the Key Escrow System. ACSAC 1997: 216-220 |
21 | Chi-Sung Laih, M. J. Gau: Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. IEEE Trans. Computers 46(4): 511 (1997) | |
20 | EE | Ching-Nung Yang, Chi-Sung Laih: A Note on Error-Correcting Codes for Authentication and Subliminal Channels. Inf. Process. Lett. 62(3): 141-143 (1997) |
1996 | ||
19 | Chi-Sung Laih, Ching-Nung Yang: On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. IEEE Trans. Computers 45(1): 103-108 (1996) | |
18 | EE | Chi-Sung Laih, Sung-Ming Yen: Multi-Signature for Specified Group of Verifiers. J. Inf. Sci. Eng. 12(1): 143-152 (1996) |
1995 | ||
17 | Chi-Sung Laih, Wen-Chung Kuo: Cryptanalysis of the Enhanced ElGamal's Signature Scheme. Cryptography: Policy and Algorithms 1995: 228-231 | |
16 | Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih: Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Computer Communications 18(1): 45-47 (1995) | |
15 | Sung-Ming Yen, Chi-Sung Laih: Improved Digital Signature Algorithm. IEEE Trans. Computers 44(5): 729-730 (1995) | |
14 | Sung-Ming Yen, Chi-Sung Laih: Improved Digital Signature Suitable for Batch Verification. IEEE Trans. Computers 44(7): 957-959 (1995) | |
13 | EE | Chi-Sung Laih, Fu-Kuan Tu, Wen-Chung Tai: On the Security of the Lucas Function. Inf. Process. Lett. 53(5): 243-247 (1995) |
1994 | ||
12 | EE | Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang: Authentication and protection of public keys. Computers & Security 13(7): 581-585 (1994) |
1993 | ||
11 | Chi-Sung Laih, Sung-Ming Yen: On the Design of Conference Key Distribution Systems for the Broadcasting Networks. INFOCOM 1993: 1406-1413 | |
1992 | ||
10 | Chi-Sung Laih, Sung-Ming Yen: Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. AUSCRYPT 1992: 219-230 | |
9 | Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen: On Verifiable Implicit Asking Protocols for RSA Computation. AUSCRYPT 1992: 296-307 | |
8 | Sung-Ming Yen, Chi-Sung Laih: The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. AUSCRYPT 1992: 447-456 | |
7 | EE | Chi-Sung Laih: Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle. J. Inf. Sci. Eng. 8(4): 633-640 (1992) |
1991 | ||
6 | Chi-Sung Laih, Lein Harn: Generalized Threshold Cryptosystems. ASIACRYPT 1991: 159-166 | |
5 | Chi-Sung Laih, Sung-Ming Yen, Lein Harn: Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. ASIACRYPT 1991: 450-459 | |
1989 | ||
4 | EE | Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang: Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. CRYPTO 1989: 286-298 |
3 | EE | Lein Harn, David Huang, Chi-Sung Laih: Password Authentication Based On Public-Key Distribution Cryptosystem. ICDE 1989: 332-338 |
2 | Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen: A New Scheme for ID-Based Cryptosystems and Signature. INFOCOM 1989: 998-1002 | |
1 | EE | Chi-Sung Laih, Lein Harn, Jau-Yien Lee: On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. IEEE Trans. Software Eng. 15(9): 1135-1137 (1989) |