2008 |
13 | | Chu Jong,
Chung-Chih Li:
Multi-Lateral Constructive Learning Process with Hands-On Problem-Based Solving Technology.
FECS 2008: 416-421 |
12 | EE | Yang Xiao,
Chung-Chih Li,
Ming Lei,
Susan V. Vrbsky:
Secret Little Functions and Codebook for Protecting Users from Password Theft.
ICC 2008: 1525-1529 |
11 | EE | Ming Lei,
Yang Xiao,
Susan V. Vrbsky,
Chung-Chih Li,
Li Liu:
A Virtual Password Scheme to Protect Passwords.
ICC 2008: 1536-1540 |
10 | EE | Bo Sun,
Yang Xiao,
Chung-Chih Li,
Hsiao-Hwa Chen,
T. Andrew Yang:
Security co-existence of wireless sensor networks and RFID for pervasive computing.
Computer Communications 31(18): 4294-4303 (2008) |
9 | EE | Ming Lei,
Yang Xiao,
Susan V. Vrbsky,
Chung-Chih Li:
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing.
Computer Communications 31(18): 4367-4375 (2008) |
2007 |
8 | EE | Chung-Chih Li:
Speed-Up Theorems in Type-2 Computation.
CiE 2007: 478-487 |
7 | | Dehu Qi,
Chung-Chih Li:
Self-organizing map based web pages clustering using web logs.
SEDE 2007: 265-270 |
2006 |
6 | EE | Bo Sun,
Chung-Chih Li,
Yang Xiao:
A Lightweight Secure Solution for RFID.
GLOBECOM 2006 |
5 | EE | Bo Sun,
Chung-Chih Li,
Kui Wu,
Yang Xiao:
A lightweight secure protocol for wireless sensor networks.
Computer Communications 29(13-14): 2556-2568 (2006) |
2005 |
4 | | Chung-Chih Li,
Hikyoo Koh:
Canonical Sequence Directed Tactics Analyzer for Computer Go Games.
CIMCA/IAWTIC 2005: 1066-1071 |
3 | | Chung-Chih Li,
Bo Sun:
Using Linear Congruential Generators for Cryptographic Purposes.
Computers and Their Applications 2005: 13-19 |
2 | | Chung-Chih Li,
Hikyoo Koh:
Using Joseki for Tactics Deployment in Computer Go.
ICGA Journal 28(3): 154-158 (2005) |
2004 |
1 | | Chung-Chih Li:
Asymptotic Behaviors of Type-2 Algorithms and Induced Baire Topologies.
IFIP TCS 2004: 465-478 |