![]() |
| 2007 | ||
|---|---|---|
| 3 | EE | Yi-Chih Hsieh, Yung-Cheng Lee, Ta-Cheng Chen: An IA Based Approach for the Optimal Design of Traffic-Monitor Systems. ICANNGA (1) 2007: 526-535 |
| 2005 | ||
| 2 | Yung-Cheng Lee, Wen-Chung Kuo: Attack and Improvement on the Lee-Chiu Remote Authentication Schem. DMS 2005: 357-360 | |
| 1997 | ||
| 1 | EE | Yung-Cheng Lee, Chi-Sung Laih: On the Key Recovery of the Key Escrow System. ACSAC 1997: 216-220 |
| 1 | Ta-Cheng Chen | [3] |
| 2 | Yi-Chih Hsieh | [3] |
| 3 | Wen-Chung Kuo | [2] |
| 4 | Chi-Sung Laih | [1] |