2008 | ||
---|---|---|
63 | Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Springer 2008 | |
62 | EE | Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei: An Anonymous and Deniable Conversation for a Thin Client. AINA Workshops 2008: 416-421 |
61 | EE | Yu-Shian Chen, I-Lun Lin, Chin-Laung Lei, Yen-Hua Liao: Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters. DCOSS 2008: 99-111 |
60 | EE | Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chin-Laung Lei: Inferring Speech Activity from Encrypted Skype Traffic. GLOBECOM 2008: 2143-2147 |
59 | EE | Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Laung Lei: Detecting VoIP Traffic Based on Human Conversation Patterns. IPTComm 2008: 280-295 |
58 | EE | Li Chen, Chia-Chang Hsu, Chin-Laung Lei: A location-ID sensitive key establishment scheme in static wireless sensor networks. Mobility Conference 2008: 102 |
57 | EE | Jiunn-Jye Lee, Hann-Huei Chiou, Yu-Sheng Yang, Yu-Cheng Su, Chin-Laung Lei: A sector-based routing model over structured peer-to-peer networks. Mobility Conference 2008: 103 |
56 | EE | Te-Yuan Huang, Kuan-Ta Chen, Polly Huang, Chin-Laung Lei: A Generalizable Methodology for Quantifying User Satisfaction. IEICE Transactions 91-B(5): 1260-1268 (2008) |
2007 | ||
55 | EE | Chun-Ying Huang, Chin-Laung Lei: Bounding Peer-to-Peer Upload Traffic in Client Networks. DSN 2007: 759-769 |
54 | EE | Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei: A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. EUC Workshops 2007: 728-744 |
53 | EE | Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei: Design and Implementation of Secure Communication Channels over UPnP Networks. MUE 2007: 307-312 |
52 | EE | Ren-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei: A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. MUE 2007: 313-318 |
51 | EE | Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei: Secure multicast in dynamic environments. Computer Networks 51(10): 2805-2817 (2007) |
2006 | ||
50 | EE | Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei: A distributed key assignment protocol for secure multicast based on proxy cryptography. ASIACCS 2006: 359 |
49 | EE | Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Chin-Laung Lei, Wen-Chin Chen: Identifying MMORPG bots: a traffic analysis approach. Advances in Computer Entertainment Technology 2006: 4 |
48 | EE | Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei: An empirical evaluation of TCP performance in online games. Advances in Computer Entertainment Technology 2006: 5 |
47 | EE | Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei: Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. DSN 2006: 403-412 |
46 | EE | Kuan-Ta Chen, Chin-Laung Lei: Design Implications of Social Interaction in Online Games. ICEC 2006: 318-321 |
45 | EE | Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang: Confessible Threshold Ring Signatures. ICSNC 2006: 25 |
44 | EE | Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei: Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. ICSNC 2006: 7 |
43 | EE | Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, Chin-Laung Lei: On the Sensitivity of Online Game Playing Time to Network QoS. INFOCOM 2006 |
42 | EE | Kuan-Ta Chen, Chin-Laung Lei: Network game design: hints and implications of player interaction. NETGAMES 2006: 17 |
41 | EE | Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei: Quantifying Skype user satisfaction. SIGCOMM 2006: 399-410 |
40 | EE | Kuan-Ta Chen, Polly Huang, Chin-Laung Lei: How sensitive are online gamers to network quality? Commun. ACM 49(11): 34-38 (2006) |
39 | EE | Pan-Lung Tsai, Chin-Laung Lei: Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters. Computer Communications 29(16): 3170-3181 (2006) |
38 | EE | Kuan-Ta Chen, Polly Huang, Chin-Laung Lei: Game traffic analysis: An MMORPG perspective. Computer Networks 50(16): 3002-3023 (2006) |
2005 | ||
37 | EE | Chi-Lan Chang, Yun-Peng Chiu, Chin-Laung Lei: Automatic Generation of Conflict-Free IPsec Policies. FORTE 2005: 233-246 |
36 | EE | Pan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, Chin-Laung Lei: A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs. HiPC 2005: 432-443 |
35 | EE | Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang: Secure Multicast Using Proxy Encryption. ICICS 2005: 280-290 |
34 | EE | Jiunn-Jye Lee, Chin-Laung Lei: An On-Line Page-Structure Approximation Scheme for Web Proxies. ICPADS (2) 2005: 669-673 |
33 | EE | Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei: The impact of network variabilities on TCP clocking schemes. INFOCOM 2005: 2770-2775 |
32 | EE | Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei: Secure Content Delivery using Key Composition. LCN 2005: 484-485 |
31 | EE | Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei: Game traffic analysis: an MMORPG perspective. NOSSDAV 2005: 19-24 |
30 | EE | Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai: An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. PRDC 2005: 133-139 |
2004 | ||
29 | Pan-Lung Tsai, Chin-Laung Lei: A Session Migration Scheme for Smart Web Services in Mobile Computing. International Conference on Internet Computing 2004: 846-852 | |
28 | Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei: A Content-Protection Scheme for Multi-Layered Reselling Structure. SEC 2004: 339-350 | |
27 | EE | Chin-Laung Lei, Pei-Ling Yu, Pan-Lung Tsai, Ming-Hwa Chan: An efficient and anonymous buyer-seller watermarking protocol. IEEE Transactions on Image Processing 13(12): 1618-1626 (2004) |
2002 | ||
26 | EE | Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Distributed and On-Line Routing on Tori. Algorithmica 32(4): 562-593 (2002) |
25 | EE | Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw: A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. Comput. J. 45(6): 672-682 (2002) |
24 | EE | Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu: Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. J. Inf. Sci. Eng. 18(1): 23-39 (2002) |
23 | EE | Chun-I Fan, Chin-Laung Lei: A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. J. Inf. Sci. Eng. 18(1): 47-58 (2002) |
22 | EE | Chun-I Fan, Chin-Laung Lei: An unlinkably divisible and intention attachable ticket scheme for runoff elections. J. Network and Computer Applications 25(2): 93-107 (2002) |
2001 | ||
21 | Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw: Fair blind threshold signatures based on discrete logarithm. Comput. Syst. Sci. Eng. 16(6): 371-379 (2001) | |
20 | EE | Yuen-Chang Sun, Ming-Lin Kao, Chin-Laung Lei: A Fully Distributed Approach to Repositories of Reusable Software Components. J. Inf. Sci. Eng. 17(1): 147-158 (2001) |
2000 | ||
19 | EE | Hann-Huei Chiou, Alexander I-Chi Lai, Chin-Laung Lei: Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems. ICDCS 2000: 654-661 |
1999 | ||
18 | EE | Wen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang: Anonymous channel and authentication in wireless communications. Computer Communications 22(15-16): 1502-1511 (1999) |
1998 | ||
17 | EE | Alexander I-Chi Lai, Chin-Laung Lei: Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting. CANPC 1998: 119-131 |
16 | EE | Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Competitive Analysis of On-Line Disk Scheduling. Theory Comput. Syst. 31(5): 491-506 (1998) |
1997 | ||
15 | EE | Chun-I Fan, Chin-Laung Lei: Secure Rewarding Schemes. HICSS (3) 1997: 571-580 |
14 | Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Competitive Source Routing on Tori and Meshes. ISAAC 1997: 82-91 | |
13 | EE | Alexander I-Chi Lai, Chin-Laung Lei: A High Performance Dynamic Token-Based Distributed Synchronization Algorithm. ISPAN 1997: 150-156 |
1996 | ||
12 | Chun-I Fan, Chin-Laung Lei: A Multi-Recastable Ticket Scheme for Electronic Elections. ASIACRYPT 1996: 116-124 | |
11 | Wen-Shenq Juang, Chin-Laung Lei: Blind Threshold Signatures Based on Discrete Logarithm. ASIAN 1996: 172-181 | |
10 | EE | Alexander I-Chi Lai, Chin-Laung Lei: Data Prefetching for Distributed Shared Memory Systems. HICSS (1) 1996: 102-110 |
9 | Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen: Competitive Analysis of On-Line Disk Scheduling. ISAAC 1996: 356-365 | |
8 | EE | Wen-Shenq Juang, Chin-Laung Lei: A collision-free secret ballot protocol for computerized general elections. Computers & Security 15(4): 339-348 (1996) |
1993 | ||
7 | Horng-Twu Liaw, Chin-Laung Lei: An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control. BIT 33(1): 46-56 (1993) | |
6 | EE | Chin-Laung Lei, Horng-Twu Liaw: Efficient Parallel Algorithms for Finding the Majority Element. J. Inf. Sci. Eng. 9(2): 319-334 (1993) |
1992 | ||
5 | EE | Chin-Laung Lei, Horng-Twu Liaw: A parallel algorithm for finding congruent regions. Computers & Graphics 16(3): 289-294 (1992) |
1987 | ||
4 | E. Allen Emerson, Chin-Laung Lei: Modalities for Model Checking: Branching Time Logic Strikes Back. Sci. Comput. Program. 8(3): 275-306 (1987) | |
1986 | ||
3 | E. Allen Emerson, Chin-Laung Lei: Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract) LICS 1986: 267-278 | |
2 | E. Allen Emerson, Chin-Laung Lei: Temporal Reasoning Under Generalized Fairness Constraints. STACS 1986: 21-36 | |
1985 | ||
1 | E. Allen Emerson, Chin-Laung Lei: Modalities for Model Checking: Branching Time Strikes Back. POPL 1985: 84-96 |