![]() | ![]() |
2007 | ||
---|---|---|
3 | EE | Yi-Chih Hsieh, Yung-Cheng Lee, Ta-Cheng Chen: An IA Based Approach for the Optimal Design of Traffic-Monitor Systems. ICANNGA (1) 2007: 526-535 |
2005 | ||
2 | Yung-Cheng Lee, Wen-Chung Kuo: Attack and Improvement on the Lee-Chiu Remote Authentication Schem. DMS 2005: 357-360 | |
1997 | ||
1 | EE | Yung-Cheng Lee, Chi-Sung Laih: On the Key Recovery of the Key Escrow System. ACSAC 1997: 216-220 |
1 | Ta-Cheng Chen | [3] |
2 | Yi-Chih Hsieh | [3] |
3 | Wen-Chung Kuo | [2] |
4 | Chi-Sung Laih | [1] |