2008 |
48 | EE | Yu-Chin Cheng,
Chi-Sung Laih,
Gu Hsin Lai,
Chia-Mei Chen,
Tsuhan Chen:
Defending On-Line Web Application Security with User-Behavior Surveillance.
ARES 2008: 410-415 |
47 | EE | Ya-Ting Carolyn Yang,
Wan-Chi Wu,
Pei-Yun Chung,
Chi-Sung Laih,
Jia-Rong Wen,
Chi-San Lin,
Jian-Bin Gao:
The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan.
ICWL 2008: 87-98 |
46 | EE | Pei-Te Chen,
Chi-Sung Laih:
IDSIC: an intrusion detection system with identification capability.
Int. J. Inf. Sec. 7(3): 185-197 (2008) |
2007 |
45 | EE | Yu-Chin Cheng,
Chien-Hung Chen,
Chung-Chih Chiang,
Jun-Wei Wang,
Chi-Sung Laih:
Generating Attack Scenarios with Causal Relationship.
GrC 2007: 368-373 |
44 | EE | Wu-Chuan Yang,
Dah-Jyh Guan,
Chi-Sung Laih:
Fast Multicomputation with Asynchronous Strategy.
IEEE Trans. Computers 56(2): 234-242 (2007) |
2006 |
43 | EE | Ming-Yang Chen,
Ching-Nung Yang,
Chi-Sung Laih:
Authorized Tracking and Tracing for RFID Tags.
EUC Workshops 2006: 435-444 |
42 | | Chi-Sung Laih,
Chun-Ju Fu,
Wen-Chung Kuo:
Design a Secure and Practical Metering Scheme.
International Conference on Internet Computing 2006: 443-447 |
41 | EE | Shyh-Yih Wang,
Chi-Sung Laih:
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme.
IEEE Trans. Dependable Sec. Comput. 3(1): 91-100 (2006) |
2005 |
40 | EE | Wu-Chuan Yang,
Dah-Jyh Guan,
Chi-Sung Laih:
Fast Multi-computations with Integer Similarity Strategy.
Public Key Cryptography 2005: 138-153 |
39 | EE | Pei-Te Chen,
Chi-Sung Laih,
Fabien Pouget,
Marc Dacier:
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics.
SADFE 2005: 120-134 |
38 | EE | I-Chuan Chang Bor-Wen Hsu,
Chi-Sung Laih:
A DCT Quantization-Based Image Authentication System for Digital Forensics.
SADFE 2005: 223-235 |
37 | EE | Wu-Chuan Yang,
Dah-Jyh Guan,
Chi-Sung Laih:
Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation.
Applied Mathematics and Computation 167(1): 108-117 (2005) |
36 | EE | Shyh-Yih Wang,
Chi-Sung Laih:
Cryptanalyses of two key assignment schemes based on polynomial interpolations.
Computers & Security 24(2): 134-138 (2005) |
35 | EE | Shyh-Yih Wang,
Chi-Sung Laih:
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies.
Journal of Systems and Software 75(1-2): 189-192 (2005) |
2004 |
34 | EE | Shee-Yau Wu,
Shih-Chuan Lu,
Chi-Sung Laih:
Design of AES Based on Dual Cipher and Composite Field.
CT-RSA 2004: 25-38 |
33 | EE | Chi-Sung Laih,
K. Y. Chen:
Generating visible RSA public keys for PKI.
Int. J. Inf. Sec. 2(2): 103-109 (2004) |
2003 |
32 | | Chi-Sung Laih:
Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings
Springer 2003 |
31 | EE | Chen-Chi Lin,
Chi-Sung Laih:
The GPKI developing status of Taiwan and some major Asia countries.
Computer Communications 26(16): 1884-1892 (2003) |
30 | EE | Chi-Sung Laih,
Shin Yan Chiou:
Cryptanalysis of an optimized protocol for mobile network authentication and security.
Inf. Process. Lett. 85(6): 339-341 (2003) |
29 | EE | Chen-Chi Lin,
Chi-Sung Laih,
Ching-Nung Yang:
New Audio Secret Sharing Schemes With Time Division Technique.
J. Inf. Sci. Eng. 19(4): 605-614 (2003) |
2002 |
28 | EE | Hung-Min Sun,
Wu-Chuan Yang,
Chi-Sung Laih:
On the Design of RSA With Short Secret Exponent.
J. Inf. Sci. Eng. 18(1): 1-18 (2002) |
2000 |
27 | | Ching-Nung Yang,
Chi-Sung Laih:
New Colored Visual Secret Sharing Schemes.
Des. Codes Cryptography 20(3): 325-336 (2000) |
1999 |
26 | | Hung-Min Sun,
Wu-Chuan Yang,
Chi-Sung Laih:
On the Design of RSA with Short Secret Exponent.
ASIACRYPT 1999: 150-164 |
25 | EE | Chi-Sung Laih,
Fu-Kuan Tu:
Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes.
ICPP Workshops 1999: 167- |
24 | EE | Wen-Chung Kuo,
Chi-Sung Laih,
M. J. Gau:
On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes.
J. Inf. Sci. Eng. 15(5): 701-713 (1999) |
1998 |
23 | | Ching-Nung Yang,
Chi-Sung Laih:
DCm Codes for Constructing t-EC/AUED Codes.
IEEE Trans. Computers 47(4): 492 (1998) |
1997 |
22 | EE | Yung-Cheng Lee,
Chi-Sung Laih:
On the Key Recovery of the Key Escrow System.
ACSAC 1997: 216-220 |
21 | | Chi-Sung Laih,
M. J. Gau:
Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem.
IEEE Trans. Computers 46(4): 511 (1997) |
20 | EE | Ching-Nung Yang,
Chi-Sung Laih:
A Note on Error-Correcting Codes for Authentication and Subliminal Channels.
Inf. Process. Lett. 62(3): 141-143 (1997) |
1996 |
19 | | Chi-Sung Laih,
Ching-Nung Yang:
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes.
IEEE Trans. Computers 45(1): 103-108 (1996) |
18 | EE | Chi-Sung Laih,
Sung-Ming Yen:
Multi-Signature for Specified Group of Verifiers.
J. Inf. Sci. Eng. 12(1): 143-152 (1996) |
1995 |
17 | | Chi-Sung Laih,
Wen-Chung Kuo:
Cryptanalysis of the Enhanced ElGamal's Signature Scheme.
Cryptography: Policy and Algorithms 1995: 228-231 |
16 | | Chin-Chen Chang,
Tzong-Chen Wu,
Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Computer Communications 18(1): 45-47 (1995) |
15 | | Sung-Ming Yen,
Chi-Sung Laih:
Improved Digital Signature Algorithm.
IEEE Trans. Computers 44(5): 729-730 (1995) |
14 | | Sung-Ming Yen,
Chi-Sung Laih:
Improved Digital Signature Suitable for Batch Verification.
IEEE Trans. Computers 44(7): 957-959 (1995) |
13 | EE | Chi-Sung Laih,
Fu-Kuan Tu,
Wen-Chung Tai:
On the Security of the Lucas Function.
Inf. Process. Lett. 53(5): 243-247 (1995) |
1994 |
12 | EE | Chi-Sung Laih,
Wen-Hong Chiou,
Chin-Chen Chang:
Authentication and protection of public keys.
Computers & Security 13(7): 581-585 (1994) |
1993 |
11 | | Chi-Sung Laih,
Sung-Ming Yen:
On the Design of Conference Key Distribution Systems for the Broadcasting Networks.
INFOCOM 1993: 1406-1413 |
1992 |
10 | | Chi-Sung Laih,
Sung-Ming Yen:
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.
AUSCRYPT 1992: 219-230 |
9 | | Tsutomu Matsumoto,
Hideki Imai,
Chi-Sung Laih,
Sung-Ming Yen:
On Verifiable Implicit Asking Protocols for RSA Computation.
AUSCRYPT 1992: 296-307 |
8 | | Sung-Ming Yen,
Chi-Sung Laih:
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography.
AUSCRYPT 1992: 447-456 |
7 | EE | Chi-Sung Laih:
Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle.
J. Inf. Sci. Eng. 8(4): 633-640 (1992) |
1991 |
6 | | Chi-Sung Laih,
Lein Harn:
Generalized Threshold Cryptosystems.
ASIACRYPT 1991: 159-166 |
5 | | Chi-Sung Laih,
Sung-Ming Yen,
Lein Harn:
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
ASIACRYPT 1991: 450-459 |
1989 |
4 | EE | Chi-Sung Laih,
Lein Harn,
Jau-Yien Lee,
Tzonelih Hwang:
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
CRYPTO 1989: 286-298 |
3 | EE | Lein Harn,
David Huang,
Chi-Sung Laih:
Password Authentication Based On Public-Key Distribution Cryptosystem.
ICDE 1989: 332-338 |
2 | | Chi-Sung Laih,
Jau-Yien Lee,
Lein Harn,
Chin-Hsing Chen:
A New Scheme for ID-Based Cryptosystems and Signature.
INFOCOM 1989: 998-1002 |
1 | EE | Chi-Sung Laih,
Lein Harn,
Jau-Yien Lee:
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.
IEEE Trans. Software Eng. 15(9): 1135-1137 (1989) |