dblp.uni-trier.dewww.uni-trier.de

Chin-Laung Lei

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
63 Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Springer 2008
62EERen-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei: An Anonymous and Deniable Conversation for a Thin Client. AINA Workshops 2008: 416-421
61EEYu-Shian Chen, I-Lun Lin, Chin-Laung Lei, Yen-Hua Liao: Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters. DCOSS 2008: 99-111
60EEYu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chin-Laung Lei: Inferring Speech Activity from Encrypted Skype Traffic. GLOBECOM 2008: 2143-2147
59EEChen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Laung Lei: Detecting VoIP Traffic Based on Human Conversation Patterns. IPTComm 2008: 280-295
58EELi Chen, Chia-Chang Hsu, Chin-Laung Lei: A location-ID sensitive key establishment scheme in static wireless sensor networks. Mobility Conference 2008: 102
57EEJiunn-Jye Lee, Hann-Huei Chiou, Yu-Sheng Yang, Yu-Cheng Su, Chin-Laung Lei: A sector-based routing model over structured peer-to-peer networks. Mobility Conference 2008: 103
56EETe-Yuan Huang, Kuan-Ta Chen, Polly Huang, Chin-Laung Lei: A Generalizable Methodology for Quantifying User Satisfaction. IEICE Transactions 91-B(5): 1260-1268 (2008)
2007
55EEChun-Ying Huang, Chin-Laung Lei: Bounding Peer-to-Peer Upload Traffic in Client Networks. DSN 2007: 759-769
54EERen-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei: A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. EUC Workshops 2007: 728-744
53EEJiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei: Design and Implementation of Secure Communication Channels over UPnP Networks. MUE 2007: 307-312
52EERen-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei: A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. MUE 2007: 313-318
51EEChun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei: Secure multicast in dynamic environments. Computer Networks 51(10): 2805-2817 (2007)
2006
50EEChun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei: A distributed key assignment protocol for secure multicast based on proxy cryptography. ASIACCS 2006: 359
49EEKuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei, Wen-Chin Chen: Identifying MMORPG bots: a traffic analysis approach. Advances in Computer Entertainment Technology 2006: 4
48EEKuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei: An empirical evaluation of TCP performance in online games. Advances in Computer Entertainment Technology 2006: 5
47EEChun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei: Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. DSN 2006: 403-412
46EEKuan-Ta Chen, Chin-Laung Lei: Design Implications of Social Interaction in Online Games. ICEC 2006: 318-321
45EEYu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang: Confessible Threshold Ring Signatures. ICSNC 2006: 25
44EEChien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei: Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. ICSNC 2006: 7
43EEKuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, Chin-Laung Lei: On the Sensitivity of Online Game Playing Time to Network QoS. INFOCOM 2006
42EEKuan-Ta Chen, Chin-Laung Lei: Network game design: hints and implications of player interaction. NETGAMES 2006: 17
41EEKuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei: Quantifying Skype user satisfaction. SIGCOMM 2006: 399-410
40EEKuan-Ta Chen, Polly Huang, Chin-Laung Lei: How sensitive are online gamers to network quality? Commun. ACM 49(11): 34-38 (2006)
39EEPan-Lung Tsai, Chin-Laung Lei: Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters. Computer Communications 29(16): 3170-3181 (2006)
38EEKuan-Ta Chen, Polly Huang, Chin-Laung Lei: Game traffic analysis: An MMORPG perspective. Computer Networks 50(16): 3002-3023 (2006)
2005
37EEChi-Lan Chang, Yun-Peng Chiu, Chin-Laung Lei: Automatic Generation of Conflict-Free IPsec Policies. FORTE 2005: 233-246
36EEPan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, Chin-Laung Lei: A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs. HiPC 2005: 432-443
35EEYun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang: Secure Multicast Using Proxy Encryption. ICICS 2005: 280-290
34EEJiunn-Jye Lee, Chin-Laung Lei: An On-Line Page-Structure Approximation Scheme for Web Proxies. ICPADS (2) 2005: 669-673
33EEKuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei: The impact of network variabilities on TCP clocking schemes. INFOCOM 2005: 2770-2775
32EEChun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei: Secure Content Delivery using Key Composition. LCN 2005: 484-485
31EEKuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei: Game traffic analysis: an MMORPG perspective. NOSSDAV 2005: 19-24
30EEJen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai: An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. PRDC 2005: 133-139
2004
29 Pan-Lung Tsai, Chin-Laung Lei: A Session Migration Scheme for Smart Web Services in Mobile Computing. International Conference on Internet Computing 2004: 846-852
28 Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei: A Content-Protection Scheme for Multi-Layered Reselling Structure. SEC 2004: 339-350
27EEChin-Laung Lei, Pei-Ling Yu, Pan-Lung Tsai, Ming-Hwa Chan: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13(12): 1618-1626 (2004)
2002
26EETzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Distributed and On-Line Routing on Tori. Algorithmica 32(4): 562-593 (2002)
25EEWen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw: A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. Comput. J. 45(6): 672-682 (2002)
24EEChin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu: Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. J. Inf. Sci. Eng. 18(1): 23-39 (2002)
23EEChun-I Fan, Chin-Laung Lei: A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. J. Inf. Sci. Eng. 18(1): 47-58 (2002)
22EEChun-I Fan, Chin-Laung Lei: An unlinkably divisible and intention attachable ticket scheme for runoff elections. J. Network and Computer Applications 25(2): 93-107 (2002)
2001
21 Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw: Fair blind threshold signatures based on discrete logarithm. Comput. Syst. Sci. Eng. 16(6): 371-379 (2001)
20EEYuen-Chang Sun, Ming-Lin Kao, Chin-Laung Lei: A Fully Distributed Approach to Repositories of Reusable Software Components. J. Inf. Sci. Eng. 17(1): 147-158 (2001)
2000
19EEHann-Huei Chiou, Alexander I-Chi Lai, Chin-Laung Lei: Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems. ICDCS 2000: 654-661
1999
18EEWen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang: Anonymous channel and authentication in wireless communications. Computer Communications 22(15-16): 1502-1511 (1999)
1998
17EEAlexander I-Chi Lai, Chin-Laung Lei: Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting. CANPC 1998: 119-131
16EETzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Competitive Analysis of On-Line Disk Scheduling. Theory Comput. Syst. 31(5): 491-506 (1998)
1997
15EEChun-I Fan, Chin-Laung Lei: Secure Rewarding Schemes. HICSS (3) 1997: 571-580
14 Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Competitive Source Routing on Tori and Meshes. ISAAC 1997: 82-91
13EEAlexander I-Chi Lai, Chin-Laung Lei: A High Performance Dynamic Token-Based Distributed Synchronization Algorithm. ISPAN 1997: 150-156
1996
12 Chun-I Fan, Chin-Laung Lei: A Multi-Recastable Ticket Scheme for Electronic Elections. ASIACRYPT 1996: 116-124
11 Wen-Shenq Juang, Chin-Laung Lei: Blind Threshold Signatures Based on Discrete Logarithm. ASIAN 1996: 172-181
10EEAlexander I-Chi Lai, Chin-Laung Lei: Data Prefetching for Distributed Shared Memory Systems. HICSS (1) 1996: 102-110
9 Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Competitive Analysis of On-Line Disk Scheduling. ISAAC 1996: 356-365
8EEWen-Shenq Juang, Chin-Laung Lei: A collision-free secret ballot protocol for computerized general elections. Computers & Security 15(4): 339-348 (1996)
1993
7 Horng-Twu Liaw, Chin-Laung Lei: An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control. BIT 33(1): 46-56 (1993)
6EEChin-Laung Lei, Horng-Twu Liaw: Efficient Parallel Algorithms for Finding the Majority Element. J. Inf. Sci. Eng. 9(2): 319-334 (1993)
1992
5EEChin-Laung Lei, Horng-Twu Liaw: A parallel algorithm for finding congruent regions. Computers & Graphics 16(3): 289-294 (1992)
1987
4 E. Allen Emerson, Chin-Laung Lei: Modalities for Model Checking: Branching Time Logic Strikes Back. Sci. Comput. Program. 8(3): 275-306 (1987)
1986
3 E. Allen Emerson, Chin-Laung Lei: Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract) LICS 1986: 267-278
2 E. Allen Emerson, Chin-Laung Lei: Temporal Reasoning Under Generalized Fairness Constraints. STACS 1986: 21-36
1985
1 E. Allen Emerson, Chin-Laung Lei: Modalities for Model Checking: Branching Time Strikes Back. POPL 1985: 84-96

Coauthor Index

1Ming-Hwa Chan [27]
2C.-Y. Chang [18]
3Chi-Lan Chang [37]
4Yu-Chun Chang [59] [60]
5Kuan-Ta Chen [31] [32] [33] [38] [40] [41] [42] [43] [46] [47] [48] [49] [50] [51] [56] [59] [60]
6Li Chen [58]
7Wen-Chin Chen [49]
8Yu-Shian Chen [45] [61]
9Hann-Huei Chiou [19] [32] [57]
10Chien-Hua Chiu [44]
11Yun-Peng Chiu [32] [35] [37] [45] [50] [51]
12Hao-Hua Chu [49]
13E. Allen Emerson [1] [2] [3] [4]
14Chun-I Fan [12] [15] [22] [23]
15Chia-Chang Hsu [36] [58]
16Chun-Ying Huang [30] [31] [32] [33] [35] [36] [41] [43] [44] [45] [47] [48] [50] [51] [53] [55]
17Polly Huang [31] [33] [38] [40] [41] [43] [48] [49] [56]
18Te-Yuan Huang [56]
19Yennun Huang [30]
20Yun-Yin Huang [36]
21Jhih-Wei Jiang [49]
22Wen-Shenq Juang [8] [11] [18] [21] [24] [25] [52] [54] [62]
23Ming-Lin Kao [20]
24Cheng-Ming Kuo [9] [14] [16] [26]
25Jen-Hao Kuo [30]
26Sy-Yen Kuo [30]
27Alexander I-Chi Lai [10] [13] [17] [19]
28Chin-Yen Lee [44]
29Der-Tsai Lee [63]
30Jiunn-Jye Lee [34] [53] [57]
31Li-Yuan Lee [53]
32Pang-Ting Liao [30]
33Yen-Hua Liao [61]
34Horng-Twu Liaw [5] [6] [7] [21] [25]
35I-Lun Lin [61]
36Vincent Rijmen [63]
37Yu-Cheng Su [57]
38Yuen-Chang Sun [20]
39Siong-Ui Te [30]
40Pan-Lung Tsai [27] [28] [29] [30] [36] [39] [44]
41Zsehong Tsai [30]
42Guo-Shiuan Wang [43]
43Ren-Chiun Wang [52] [54] [62]
44Chen-Chi Wu [52] [59] [60]
45Tzong-Chen Wu [63]
46Yu-Sheng Yang [57]
47Tzuoo-Hawn Yeh [9] [14] [16] [26]
48Hsu-Chun Yen [9] [14] [16] [26]
49Pei-Ling Yu [24] [27] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)