| 2008 |
| 63 | | Tzong-Chen Wu,
Chin-Laung Lei,
Vincent Rijmen,
Der-Tsai Lee:
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
Springer 2008 |
| 62 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client.
AINA Workshops 2008: 416-421 |
| 61 | EE | Yu-Shian Chen,
I-Lun Lin,
Chin-Laung Lei,
Yen-Hua Liao:
Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters.
DCOSS 2008: 99-111 |
| 60 | EE | Yu-Chun Chang,
Kuan-Ta Chen,
Chen-Chi Wu,
Chin-Laung Lei:
Inferring Speech Activity from Encrypted Skype Traffic.
GLOBECOM 2008: 2143-2147 |
| 59 | EE | Chen-Chi Wu,
Kuan-Ta Chen,
Yu-Chun Chang,
Chin-Laung Lei:
Detecting VoIP Traffic Based on Human Conversation Patterns.
IPTComm 2008: 280-295 |
| 58 | EE | Li Chen,
Chia-Chang Hsu,
Chin-Laung Lei:
A location-ID sensitive key establishment scheme in static wireless sensor networks.
Mobility Conference 2008: 102 |
| 57 | EE | Jiunn-Jye Lee,
Hann-Huei Chiou,
Yu-Sheng Yang,
Yu-Cheng Su,
Chin-Laung Lei:
A sector-based routing model over structured peer-to-peer networks.
Mobility Conference 2008: 103 |
| 56 | EE | Te-Yuan Huang,
Kuan-Ta Chen,
Polly Huang,
Chin-Laung Lei:
A Generalizable Methodology for Quantifying User Satisfaction.
IEICE Transactions 91-B(5): 1260-1268 (2008) |
| 2007 |
| 55 | EE | Chun-Ying Huang,
Chin-Laung Lei:
Bounding Peer-to-Peer Upload Traffic in Client Networks.
DSN 2007: 759-769 |
| 54 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chin-Laung Lei:
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem.
EUC Workshops 2007: 728-744 |
| 53 | EE | Jiunn-Jye Lee,
Chun-Ying Huang,
Li-Yuan Lee,
Chin-Laung Lei:
Design and Implementation of Secure Communication Channels over UPnP Networks.
MUE 2007: 307-312 |
| 52 | EE | Ren-Chiun Wang,
Wen-Shenq Juang,
Chen-Chi Wu,
Chin-Laung Lei:
A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments.
MUE 2007: 313-318 |
| 51 | EE | Chun-Ying Huang,
Yun-Peng Chiu,
Kuan-Ta Chen,
Chin-Laung Lei:
Secure multicast in dynamic environments.
Computer Networks 51(10): 2805-2817 (2007) |
| 2006 |
| 50 | EE | Chun-Ying Huang,
Yun-Peng Chiu,
Kuan-Ta Chen,
Chin-Laung Lei:
A distributed key assignment protocol for secure multicast based on proxy cryptography.
ASIACCS 2006: 359 |
| 49 | EE | Kuan-Ta Chen,
Jhih-Wei Jiang,
Polly Huang,
Hao-Hua Chu,
Chin-Laung Lei,
Wen-Chin Chen:
Identifying MMORPG bots: a traffic analysis approach.
Advances in Computer Entertainment Technology 2006: 4 |
| 48 | EE | Kuan-Ta Chen,
Chun-Ying Huang,
Polly Huang,
Chin-Laung Lei:
An empirical evaluation of TCP performance in online games.
Advances in Computer Entertainment Technology 2006: 5 |
| 47 | EE | Chun-Ying Huang,
Kuan-Ta Chen,
Chin-Laung Lei:
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.
DSN 2006: 403-412 |
| 46 | EE | Kuan-Ta Chen,
Chin-Laung Lei:
Design Implications of Social Interaction in Online Games.
ICEC 2006: 318-321 |
| 45 | EE | Yu-Shian Chen,
Chin-Laung Lei,
Yun-Peng Chiu,
Chun-Ying Huang:
Confessible Threshold Ring Signatures.
ICSNC 2006: 25 |
| 44 | EE | Chien-Hua Chiu,
Chin-Yen Lee,
Pan-Lung Tsai,
Chun-Ying Huang,
Chin-Laung Lei:
Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering.
ICSNC 2006: 7 |
| 43 | EE | Kuan-Ta Chen,
Polly Huang,
Guo-Shiuan Wang,
Chun-Ying Huang,
Chin-Laung Lei:
On the Sensitivity of Online Game Playing Time to Network QoS.
INFOCOM 2006 |
| 42 | EE | Kuan-Ta Chen,
Chin-Laung Lei:
Network game design: hints and implications of player interaction.
NETGAMES 2006: 17 |
| 41 | EE | Kuan-Ta Chen,
Chun-Ying Huang,
Polly Huang,
Chin-Laung Lei:
Quantifying Skype user satisfaction.
SIGCOMM 2006: 399-410 |
| 40 | EE | Kuan-Ta Chen,
Polly Huang,
Chin-Laung Lei:
How sensitive are online gamers to network quality?
Commun. ACM 49(11): 34-38 (2006) |
| 39 | EE | Pan-Lung Tsai,
Chin-Laung Lei:
Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters.
Computer Communications 29(16): 3170-3181 (2006) |
| 38 | EE | Kuan-Ta Chen,
Polly Huang,
Chin-Laung Lei:
Game traffic analysis: An MMORPG perspective.
Computer Networks 50(16): 3002-3023 (2006) |
| 2005 |
| 37 | EE | Chi-Lan Chang,
Yun-Peng Chiu,
Chin-Laung Lei:
Automatic Generation of Conflict-Free IPsec Policies.
FORTE 2005: 233-246 |
| 36 | EE | Pan-Lung Tsai,
Chun-Ying Huang,
Yun-Yin Huang,
Chia-Chang Hsu,
Chin-Laung Lei:
A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs.
HiPC 2005: 432-443 |
| 35 | EE | Yun-Peng Chiu,
Chin-Laung Lei,
Chun-Ying Huang:
Secure Multicast Using Proxy Encryption.
ICICS 2005: 280-290 |
| 34 | EE | Jiunn-Jye Lee,
Chin-Laung Lei:
An On-Line Page-Structure Approximation Scheme for Web Proxies.
ICPADS (2) 2005: 669-673 |
| 33 | EE | Kuan-Ta Chen,
Polly Huang,
Chun-Ying Huang,
Chin-Laung Lei:
The impact of network variabilities on TCP clocking schemes.
INFOCOM 2005: 2770-2775 |
| 32 | EE | Chun-Ying Huang,
Yun-Peng Chiu,
Kuan-Ta Chen,
Hann-Huei Chiou,
Chin-Laung Lei:
Secure Content Delivery using Key Composition.
LCN 2005: 484-485 |
| 31 | EE | Kuan-Ta Chen,
Polly Huang,
Chun-Ying Huang,
Chin-Laung Lei:
Game traffic analysis: an MMORPG perspective.
NOSSDAV 2005: 19-24 |
| 30 | EE | Jen-Hao Kuo,
Siong-Ui Te,
Pang-Ting Liao,
Chun-Ying Huang,
Pan-Lung Tsai,
Chin-Laung Lei,
Sy-Yen Kuo,
Yennun Huang,
Zsehong Tsai:
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing.
PRDC 2005: 133-139 |
| 2004 |
| 29 | | Pan-Lung Tsai,
Chin-Laung Lei:
A Session Migration Scheme for Smart Web Services in Mobile Computing.
International Conference on Internet Computing 2004: 846-852 |
| 28 | | Pei-Ling Yu,
Pan-Lung Tsai,
Chin-Laung Lei:
A Content-Protection Scheme for Multi-Layered Reselling Structure.
SEC 2004: 339-350 |
| 27 | EE | Chin-Laung Lei,
Pei-Ling Yu,
Pan-Lung Tsai,
Ming-Hwa Chan:
An efficient and anonymous buyer-seller watermarking protocol.
IEEE Transactions on Image Processing 13(12): 1618-1626 (2004) |
| 2002 |
| 26 | EE | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Distributed and On-Line Routing on Tori.
Algorithmica 32(4): 562-593 (2002) |
| 25 | EE | Wen-Shenq Juang,
Chin-Laung Lei,
Horng-Twu Liaw:
A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting.
Comput. J. 45(6): 672-682 (2002) |
| 24 | EE | Chin-Laung Lei,
Wen-Shenq Juang,
Pei-Ling Yu:
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm.
J. Inf. Sci. Eng. 18(1): 23-39 (2002) |
| 23 | EE | Chun-I Fan,
Chin-Laung Lei:
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash.
J. Inf. Sci. Eng. 18(1): 47-58 (2002) |
| 22 | EE | Chun-I Fan,
Chin-Laung Lei:
An unlinkably divisible and intention attachable ticket scheme for runoff elections.
J. Network and Computer Applications 25(2): 93-107 (2002) |
| 2001 |
| 21 | | Wen-Shenq Juang,
Chin-Laung Lei,
Horng-Twu Liaw:
Fair blind threshold signatures based on discrete logarithm.
Comput. Syst. Sci. Eng. 16(6): 371-379 (2001) |
| 20 | EE | Yuen-Chang Sun,
Ming-Lin Kao,
Chin-Laung Lei:
A Fully Distributed Approach to Repositories of Reusable Software Components.
J. Inf. Sci. Eng. 17(1): 147-158 (2001) |
| 2000 |
| 19 | EE | Hann-Huei Chiou,
Alexander I-Chi Lai,
Chin-Laung Lei:
Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems.
ICDCS 2000: 654-661 |
| 1999 |
| 18 | EE | Wen-Shenq Juang,
Chin-Laung Lei,
C.-Y. Chang:
Anonymous channel and authentication in wireless communications.
Computer Communications 22(15-16): 1502-1511 (1999) |
| 1998 |
| 17 | EE | Alexander I-Chi Lai,
Chin-Laung Lei:
Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting.
CANPC 1998: 119-131 |
| 16 | EE | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Competitive Analysis of On-Line Disk Scheduling.
Theory Comput. Syst. 31(5): 491-506 (1998) |
| 1997 |
| 15 | EE | Chun-I Fan,
Chin-Laung Lei:
Secure Rewarding Schemes.
HICSS (3) 1997: 571-580 |
| 14 | | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Competitive Source Routing on Tori and Meshes.
ISAAC 1997: 82-91 |
| 13 | EE | Alexander I-Chi Lai,
Chin-Laung Lei:
A High Performance Dynamic Token-Based Distributed Synchronization Algorithm.
ISPAN 1997: 150-156 |
| 1996 |
| 12 | | Chun-I Fan,
Chin-Laung Lei:
A Multi-Recastable Ticket Scheme for Electronic Elections.
ASIACRYPT 1996: 116-124 |
| 11 | | Wen-Shenq Juang,
Chin-Laung Lei:
Blind Threshold Signatures Based on Discrete Logarithm.
ASIAN 1996: 172-181 |
| 10 | EE | Alexander I-Chi Lai,
Chin-Laung Lei:
Data Prefetching for Distributed Shared Memory Systems.
HICSS (1) 1996: 102-110 |
| 9 | | Tzuoo-Hawn Yeh,
Cheng-Ming Kuo,
Chin-Laung Lei,
Hsu-Chun Yen:
Competitive Analysis of On-Line Disk Scheduling.
ISAAC 1996: 356-365 |
| 8 | EE | Wen-Shenq Juang,
Chin-Laung Lei:
A collision-free secret ballot protocol for computerized general elections.
Computers & Security 15(4): 339-348 (1996) |
| 1993 |
| 7 | | Horng-Twu Liaw,
Chin-Laung Lei:
An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control.
BIT 33(1): 46-56 (1993) |
| 6 | EE | Chin-Laung Lei,
Horng-Twu Liaw:
Efficient Parallel Algorithms for Finding the Majority Element.
J. Inf. Sci. Eng. 9(2): 319-334 (1993) |
| 1992 |
| 5 | EE | Chin-Laung Lei,
Horng-Twu Liaw:
A parallel algorithm for finding congruent regions.
Computers & Graphics 16(3): 289-294 (1992) |
| 1987 |
| 4 | | E. Allen Emerson,
Chin-Laung Lei:
Modalities for Model Checking: Branching Time Logic Strikes Back.
Sci. Comput. Program. 8(3): 275-306 (1987) |
| 1986 |
| 3 | | E. Allen Emerson,
Chin-Laung Lei:
Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract)
LICS 1986: 267-278 |
| 2 | | E. Allen Emerson,
Chin-Laung Lei:
Temporal Reasoning Under Generalized Fairness Constraints.
STACS 1986: 21-36 |
| 1985 |
| 1 | | E. Allen Emerson,
Chin-Laung Lei:
Modalities for Model Checking: Branching Time Strikes Back.
POPL 1985: 84-96 |