2008 |
63 | | Tzong-Chen Wu,
Chin-Laung Lei,
Vincent Rijmen,
Der-Tsai Lee:
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
Springer 2008 |
62 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client.
AINA Workshops 2008: 416-421 |
61 | EE | Yu-Shian Chen,
I-Lun Lin,
Chin-Laung Lei,
Yen-Hua Liao:
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters.
DCOSS 2008: 99-111 |
60 | EE | Yu-Chun Chang,
Kuan-Ta Chen,
Chen-Chi Wu,
Chin-Laung Lei:
Inferring Speech Activity from Encrypted Skype Traffic.
GLOBECOM 2008: 2143-2147 |
59 | EE | Chen-Chi Wu,
Kuan-Ta Chen,
Yu-Chun Chang,
Chin-Laung Lei:
Detecting VoIP Traffic Based on Human Conversation Patterns.
IPTComm 2008: 280-295 |
58 | EE | Li Chen,
Chia-Chang Hsu,
Chin-Laung Lei:
A location-ID sensitive key establishment scheme in static wireless sensor networks.
Mobility Conference 2008: 102 |
57 | EE | Jiunn-Jye Lee,
Hann-Huei Chiou,
Yu-Sheng Yang,
Yu-Cheng Su,
Chin-Laung Lei:
A sector-based routing model over structured peer-to-peer networks.
Mobility Conference 2008: 103 |
56 | EE | Te-Yuan Huang,
Kuan-Ta Chen,
Polly Huang,
Chin-Laung Lei:
A Generalizable Methodology for Quantifying User Satisfaction.
IEICE Transactions 91-B(5): 1260-1268 (2008) |
2007 |
55 | EE | Chun-Ying Huang,
Chin-Laung Lei:
Bounding Peer-to-Peer Upload Traffic in Client Networks.
DSN 2007: 759-769 |
54 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chin-Laung Lei:
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.
EUC Workshops 2007: 728-744 |
53 | EE | Jiunn-Jye Lee,
Chun-Ying Huang,
Li-Yuan Lee,
Chin-Laung Lei:
Design and Implementation of Secure Communication Channels over UPnP Networks.
MUE 2007: 307-312 |
52 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chen-Chi Wu,
Chin-Laung Lei:
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
MUE 2007: 313-318 |
51 | EE | Chun-Ying Huang,
Yun-Peng Chiu,
Kuan-Ta Chen,
Chin-Laung Lei:
Secure multicast in dynamic environments.
Computer Networks 51(10): 2805-2817 (2007) |
2006 |
50 | EE | Chun-Ying Huang,
Yun-Peng Chiu,
Kuan-Ta Chen,
Chin-Laung Lei:
A distributed key assignment protocol for secure multicast based on proxy cryptography.
ASIACCS 2006: 359 |
49 | EE | Kuan-Ta Chen,
Jhih-Wei Jiang,
Polly Huang,
Hao-Hua Chu,
Chin-Laung Lei,
Wen-Chin Chen:
Identifying MMORPG bots: a traffic analysis approach.
Advances in Computer Entertainment Technology 2006: 4 |
48 | EE | Kuan-Ta Chen,
Chun-Ying Huang,
Polly Huang,
Chin-Laung Lei:
An empirical evaluation of TCP performance in online games.
Advances in Computer Entertainment Technology 2006: 5 |
47 | EE | Chun-Ying Huang,
Kuan-Ta Chen,
Chin-Laung Lei:
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.
DSN 2006: 403-412 |
46 | EE | Kuan-Ta Chen,
Chin-Laung Lei:
Design Implications of Social Interaction in Online Games.
ICEC 2006: 318-321 |
45 | EE | Yu-Shian Chen,
Chin-Laung Lei,
Yun-Peng Chiu,
Chun-Ying Huang:
Confessible Threshold Ring Signatures.
ICSNC 2006: 25 |
44 | EE | Chien-Hua Chiu,
Chin-Yen Lee,
Pan-Lung Tsai,
Chun-Ying Huang,
Chin-Laung Lei:
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
ICSNC 2006: 7 |
43 | EE | Kuan-Ta Chen,
Polly Huang,
Guo-Shiuan Wang,
Chun-Ying Huang,
Chin-Laung Lei:
On the Sensitivity of Online Game Playing Time to Network QoS.
INFOCOM 2006 |
42 | EE | Kuan-Ta Chen,
Chin-Laung Lei:
Network game design: hints and implications of player interaction.
NETGAMES 2006: 17 |
41 | EE | Kuan-Ta Chen,
Chun-Ying Huang,
Polly Huang,
Chin-Laung Lei:
Quantifying Skype user satisfaction.
SIGCOMM 2006: 399-410 |
40 | EE | Kuan-Ta Chen,
Polly Huang,
Chin-Laung Lei:
How sensitive are online gamers to network quality?
Commun. ACM 49(11): 34-38 (2006) |
39 | EE | Pan-Lung Tsai,
Chin-Laung Lei:
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters.
Computer Communications 29(16): 3170-3181 (2006) |
38 | EE | Kuan-Ta Chen,
Polly Huang,
Chin-Laung Lei:
Game traffic analysis: An MMORPG perspective.
Computer Networks 50(16): 3002-3023 (2006) |
2005 |
37 | EE | Chi-Lan Chang,
Yun-Peng Chiu,
Chin-Laung Lei:
Automatic Generation of Conflict-Free IPsec Policies.
FORTE 2005: 233-246 |
36 | EE | Pan-Lung Tsai,
Chun-Ying Huang,
Yun-Yin Huang,
Chia-Chang Hsu,
Chin-Laung Lei:
A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs.
HiPC 2005: 432-443 |
35 | EE | Yun-Peng Chiu,
Chin-Laung Lei,
Chun-Ying Huang:
Secure Multicast Using Proxy Encryption.
ICICS 2005: 280-290 |
34 | EE | Jiunn-Jye Lee,
Chin-Laung Lei:
An On-Line Page-Structure Approximation Scheme for Web Proxies.
ICPADS (2) 2005: 669-673 |
33 | EE | Kuan-Ta Chen,
Polly Huang,
Chun-Ying Huang,
Chin-Laung Lei:
The impact of network variabilities on TCP clocking schemes.
INFOCOM 2005: 2770-2775 |
32 | EE | Chun-Ying Huang,
Yun-Peng Chiu,
Kuan-Ta Chen,
Hann-Huei Chiou,
Chin-Laung Lei:
Secure Content Delivery using Key Composition.
LCN 2005: 484-485 |
31 | EE | Kuan-Ta Chen,
Polly Huang,
Chun-Ying Huang,
Chin-Laung Lei:
Game traffic analysis: an MMORPG perspective.
NOSSDAV 2005: 19-24 |
30 | EE | Jen-Hao Kuo,
Siong-Ui Te,
Pang-Ting Liao,
Chun-Ying Huang,
Pan-Lung Tsai,
Chin-Laung Lei,
Sy-Yen Kuo,
Yennun Huang,
Zsehong Tsai:
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
PRDC 2005: 133-139 |
2004 |
29 | | Pan-Lung Tsai,
Chin-Laung Lei:
A Session Migration Scheme for Smart Web Services in Mobile Computing.
International Conference on Internet Computing 2004: 846-852 |
28 | | Pei-Ling Yu,
Pan-Lung Tsai,
Chin-Laung Lei:
A Content-Protection Scheme for Multi-Layered Reselling Structure.
SEC 2004: 339-350 |
27 | EE | Chin-Laung Lei,
Pei-Ling Yu,
Pan-Lung Tsai,
Ming-Hwa Chan:
An efficient and anonymous buyer-seller watermarking protocol.
IEEE Transactions on Image Processing 13(12): 1618-1626 (2004) |
2002 |
26 | EE | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Distributed and On-Line Routing on Tori.
Algorithmica 32(4): 562-593 (2002) |
25 | EE | Wen-Shenq Juang,
Chin-Laung Lei,
Horng-Twu Liaw:
A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting.
Comput. J. 45(6): 672-682 (2002) |
24 | EE | Chin-Laung Lei,
Wen-Shenq Juang,
Pei-Ling Yu:
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm.
J. Inf. Sci. Eng. 18(1): 23-39 (2002) |
23 | EE | Chun-I Fan,
Chin-Laung Lei:
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash.
J. Inf. Sci. Eng. 18(1): 47-58 (2002) |
22 | EE | Chun-I Fan,
Chin-Laung Lei:
An unlinkably divisible and intention attachable ticket scheme for runoff elections.
J. Network and Computer Applications 25(2): 93-107 (2002) |
2001 |
21 | | Wen-Shenq Juang,
Chin-Laung Lei,
Horng-Twu Liaw:
Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng. 16(6): 371-379 (2001) |
20 | EE | Yuen-Chang Sun,
Ming-Lin Kao,
Chin-Laung Lei:
A Fully Distributed Approach to Repositories of Reusable Software Components.
J. Inf. Sci. Eng. 17(1): 147-158 (2001) |
2000 |
19 | EE | Hann-Huei Chiou,
Alexander I-Chi Lai,
Chin-Laung Lei:
Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems.
ICDCS 2000: 654-661 |
1999 |
18 | EE | Wen-Shenq Juang,
Chin-Laung Lei,
C.-Y. Chang:
Anonymous channel and authentication in wireless communications.
Computer Communications 22(15-16): 1502-1511 (1999) |
1998 |
17 | EE | Alexander I-Chi Lai,
Chin-Laung Lei:
Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting.
CANPC 1998: 119-131 |
16 | EE | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Competitive Analysis of On-Line Disk Scheduling.
Theory Comput. Syst. 31(5): 491-506 (1998) |
1997 |
15 | EE | Chun-I Fan,
Chin-Laung Lei:
Secure Rewarding Schemes.
HICSS (3) 1997: 571-580 |
14 | | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Competitive Source Routing on Tori and Meshes.
ISAAC 1997: 82-91 |
13 | EE | Alexander I-Chi Lai,
Chin-Laung Lei:
A High Performance Dynamic Token-Based Distributed Synchronization Algorithm.
ISPAN 1997: 150-156 |
1996 |
12 | | Chun-I Fan,
Chin-Laung Lei:
A Multi-Recastable Ticket Scheme for Electronic Elections.
ASIACRYPT 1996: 116-124 |
11 | | Wen-Shenq Juang,
Chin-Laung Lei:
Blind Threshold Signatures Based on Discrete Logarithm.
ASIAN 1996: 172-181 |
10 | EE | Alexander I-Chi Lai,
Chin-Laung Lei:
Data Prefetching for Distributed Shared Memory Systems.
HICSS (1) 1996: 102-110 |
9 | | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Competitive Analysis of On-Line Disk Scheduling.
ISAAC 1996: 356-365 |
8 | EE | Wen-Shenq Juang,
Chin-Laung Lei:
A collision-free secret ballot protocol for computerized general elections.
Computers & Security 15(4): 339-348 (1996) |
1993 |
7 | | Horng-Twu Liaw,
Chin-Laung Lei:
An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control.
BIT 33(1): 46-56 (1993) |
6 | EE | Chin-Laung Lei,
Horng-Twu Liaw:
Efficient Parallel Algorithms for Finding the Majority Element.
J. Inf. Sci. Eng. 9(2): 319-334 (1993) |
1992 |
5 | EE | Chin-Laung Lei,
Horng-Twu Liaw:
A parallel algorithm for finding congruent regions.
Computers & Graphics 16(3): 289-294 (1992) |
1987 |
4 | | E. Allen Emerson,
Chin-Laung Lei:
Modalities for Model Checking: Branching Time Logic Strikes Back.
Sci. Comput. Program. 8(3): 275-306 (1987) |
1986 |
3 | | E. Allen Emerson,
Chin-Laung Lei:
Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract)
LICS 1986: 267-278 |
2 | | E. Allen Emerson,
Chin-Laung Lei:
Temporal Reasoning Under Generalized Fairness Constraints.
STACS 1986: 21-36 |
1985 |
1 | | E. Allen Emerson,
Chin-Laung Lei:
Modalities for Model Checking: Branching Time Strikes Back.
POPL 1985: 84-96 |