dblp.uni-trier.dewww.uni-trier.de

Chu-Hsing Lin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
47EEChu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu: Counteract SYN flooding using second chance packet filtering. ICUIMC 2009: 216-220
2008
46EEChu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou: Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks. AINA Workshops 2008: 1272-1277
45EEChu-Hsing Lin, Chih-Hsiong Shih, Jung-Chun Liu, Mao-Hua Cheng, Yan-Wei Lee: Energy efficiency measurement for multimedia audio decoding on embedded systems. ICUIMC 2008: 404-408
44EEChu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou: I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. MUE 2008: 102-107
43EEChu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee: A Robust Watermark Scheme for Copyright Protection. MUE 2008: 132-137
42EEChu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang: Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. MUE 2008: 176-181
41EEChu-Hsing Lin, Jui-Ling Yu, Jung-Chun Liu, Chia-Jen Lee: Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. MUE 2008: 402-406
40EEChu-Hsing Lin, Fuu-Cheng Jiang, Jen-Chieh Chang, Frode Eika Sandnes: Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks. PDCAT 2008: 342-349
39EEChu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han: On the Security of the Full-Band Image Watermark for Copyright Protection. SUTC 2008: 74-80
38EEChu-Hsing Lin, Yu-Ying Lin, Frode Eika Sandnes: Integrity Protection of Binary Text Document Images Based on Image Topologies. IJPRAI 22(8): 1599-1620 (2008)
2007
37EEJung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Chieh Chang: Robust Multi-scale Full-Band Image Watermarking for Copyright Protection. IEA/AIE 2007: 176-184
36EEChu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao: Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices. MUE 2007: 120-125
35EEChin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen: A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967
2006
34EEJue-Sam Chou, Yalin Chen, Chu-Hsing Lin: An improvement of an efficient user identification scheme based on ID-based cryptosystem. SUTC (1) 2006: 558-561
33EEChin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang: A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. UIC 2006: 816-825
2005
32EEChu-Hsing Lin, Wei Lee: Efficient Secret Sharing with Access Structures in a Hierarchy. AINA 2005: 123-126
31EEChu-Hsing Lin, Wei Lee, Chien-Sheng Chen: Dynamic Key Generations for Secret Sharing in Access Structures. AINA 2005: 127-130
30EEChu-Hsing Lin, Hsiu-Hsia Lin: Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. AINA 2005: 135-138
29EEChia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang: An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. AINA 2005: 249-252
28EEChi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen: Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. AINA 2005: 261-264
27EEChu-Hsing Lin, Wei Lee, Yi-Kang Ho: An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. AINA 2005: 399-402
26EEChu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin, Yi-Yi Lai: On the security of ID-based password authentication scheme using smart cards and fingerprints. ITRE 2005: 230-232
25EEChu-Hsing Lin, Ruei-Hau Hsu, Lein Harn: Improved DSA variant for batch verification. Applied Mathematics and Computation 169(1): 75-81 (2005)
2004
24EEChing-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Supervising Secret-Key Agreements in a Level-Based Hierarchy. AINA (1) 2004: 309-314
23EEChing-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: Using IC Cards to Remotely Login Passwords without Verification Tables. AINA (1) 2004: 321-326
22EEChin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang: Secret Sharing with Access Structures in a Hierarchy. AINA (2) 2004: 31-34
21 Chu-Hsing Lin, Yi-Yi Lai: A fingerprint-based user authentication scheme for multimedia systems. ICME 2004: 935-938
20EEJue-Sam Chou, Chu-Hsing Lin, Ting-Ying Lee: A Novel Hierarchical Key Management Scheme Based on Quadratic Residues. ISPA 2004: 858-865
2003
19EEChing-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Signature Schemes Based on Two Hard Problems Simultaneously. AINA 2003: 557-560
18EEChin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin: Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. AINA 2003: 807-811
2002
17EEChu-Hsing Lin, Chen-Yu Lee: A Software Protection System for Internet Commerce. IEEE Pacific Rim Conference on Multimedia 2002: 1033-1040
16 Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: A New Micro-Payment System Using General Payword Chain. Electronic Commerce Research 2(1-2): 159-168 (2002)
2001
15 Chu-Hsing Lin: Hierarchical key assignment without public-key cryptography. Computers & Security 20(7): 612-619 (2001)
2000
14EEYi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang: Dynamic GOST. J. Inf. Sci. Eng. 16(6): 857-861 (2000)
1999
13 Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan: One-Way Hash Functions With Changeable Parameters. Inf. Sci. 118(1-4): 223-239 (1999)
1998
12EEChing-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Threshold signature schemes with traceable signers in group communications. Computer Communications 21(8): 771-776 (1998)
11EEChu-Hsing Lin, Tien-Chi Lee: A confused document encrypting scheme and its implementation. Computers & Security 17(6): 543-551 (1998)
1997
10EEChu-Hsing Lin: Dynamic key management schemes for access control in a hierarchy. Computer Communications 20(15): 1381-1385 (1997)
1996
9 Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang: A group-oriented (t, n) undeniable signature scheme without trusted center. ACISP 1996: 266-274
1995
8 Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: New Public-Key Cipher System Based Upon the Diophantine Equations. IEEE Trans. Computers 44(1): 13-19 (1995)
1994
7EEChu-Hsing Lin, Chin-Chen Chang: Method for constructing a group-oriented cipher system. Computer Communications 17(11): 805-808 (1994)
1992
6 Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A Record-Oriented Cryptosystem for Database Sharing (Short Note). Comput. J. 35(6): 658-660 (1992)
5EEChin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee: Hierarchy representations based on arithmetic coding for dynamic information protection systems. Inf. Sci. 64(1-2): 35-48 (1992)
4 Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A conference key broadcasting system using sealed locks. Inf. Syst. 17(4): 323-328 (1992)
1991
3 Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee: Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991)
1990
2 Chin-Chen Chang, Chu-Hsing Lin: A Reciprocal Confluence Tree Unit and Its Applications. BIT 30(1): 27-33 (1990)
1EEChu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang: A Dynamic Access Control Mechanism in Information Protection Systems. J. Inf. Sci. Eng. 6(1): 25-35 (1990)

Coauthor Index

1Chin-Chen Chang [1] [2] [3] [4] [5] [6] [7] [8] [9] [12] [16] [18] [19] [22] [23] [24] [28] [29] [33] [35]
2Jen-Chieh Chang [33] [37] [40]
3Chien-Sheng Chen [31]
4Chien-Yuan Chen [35]
5Kuo-Lun Chen [28] [33]
6Yalin Chen [34]
7Mao-Hua Cheng [45]
8Jue-Sam Chou [20] [34]
9Mei-Chun Chou [44] [46]
10Pei-Chen Han [39]
11Lein Harn [25]
12Yi-Kang Ho [27]
13Tsu-Miin Hsieh [13]
14Ruei-Hau Hsu [25]
15Wei-Cheng Hsu [47]
16Chi-Hsiung Huang [28]
17Hsun-Chi Huang [42]
18Yen-Lin Huang [44] [46]
19Pai-Cheng Hwang [22]
20Fuu-Cheng Jiang [40] [47]
21Li-Ching Kuo [37]
22Ying-Tse Kuo [18]
23Wei-Shen Lai [44] [46] [47]
24Yi-Yi Lai [21] [26]
25Chen-Yu Lee [17]
26Chia-Jen Lee [41]
27Chia-Yin Lee [28] [29]
28Richard C. T. Lee (Richard Chia-Tung Lee) [1] [3] [4] [5] [6] [8]
29Tien-Chi Lee [11]
30Ting-Ying Lee [20]
31Wei Lee [22] [27] [31] [32]
32Wei-Yuah Lee [47]
33Yan-Wei Lee [43] [45]
34Chun-Wei Liao [36]
35Hsiu-Hsia Lin [26] [30]
36Tri-Show Lin [26]
37Yu-Ying Lin [38]
38Jung-Chun Liu [36] [37] [39] [41] [42] [43] [45]
39Frode Eika Sandnes [38] [40]
40Chih-Hsiong Shih [43] [45]
41Ssu-Heng Tuan [13]
42Chan-Chi Wang [14]
43Ching-Te Wang [9] [12] [16] [19] [23] [24]
44Tzong-Chen Wu [3]
45Tsung-Che Yang [42]
46Yi-Shiung Yeh [13] [14]
47Jui-Ling Yu [41]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)