2009 | ||
---|---|---|
47 | EE | Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu: Counteract SYN flooding using second chance packet filtering. ICUIMC 2009: 216-220 |
2008 | ||
46 | EE | Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou: Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks. AINA Workshops 2008: 1272-1277 |
45 | EE | Chu-Hsing Lin, Chih-Hsiong Shih, Jung-Chun Liu, Mao-Hua Cheng, Yan-Wei Lee: Energy efficiency measurement for multimedia audio decoding on embedded systems. ICUIMC 2008: 404-408 |
44 | EE | Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou: I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. MUE 2008: 102-107 |
43 | EE | Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee: A Robust Watermark Scheme for Copyright Protection. MUE 2008: 132-137 |
42 | EE | Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang: Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. MUE 2008: 176-181 |
41 | EE | Chu-Hsing Lin, Jui-Ling Yu, Jung-Chun Liu, Chia-Jen Lee: Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. MUE 2008: 402-406 |
40 | EE | Chu-Hsing Lin, Fuu-Cheng Jiang, Jen-Chieh Chang, Frode Eika Sandnes: Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks. PDCAT 2008: 342-349 |
39 | EE | Chu-Hsing Lin, Jung-Chun Liu, Pei-Chen Han: On the Security of the Full-Band Image Watermark for Copyright Protection. SUTC 2008: 74-80 |
38 | EE | Chu-Hsing Lin, Yu-Ying Lin, Frode Eika Sandnes: Integrity Protection of Binary Text Document Images Based on Image Topologies. IJPRAI 22(8): 1599-1620 (2008) |
2007 | ||
37 | EE | Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Chieh Chang: Robust Multi-scale Full-Band Image Watermarking for Copyright Protection. IEA/AIE 2007: 176-184 |
36 | EE | Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao: Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices. MUE 2007: 120-125 |
35 | EE | Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen: A Conference Key Distribution Scheme Using Interpolating Polynomials. MUE 2007: 963-967 |
2006 | ||
34 | EE | Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin: An improvement of an efficient user identification scheme based on ID-based cryptosystem. SUTC (1) 2006: 558-561 |
33 | EE | Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang: A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. UIC 2006: 816-825 |
2005 | ||
32 | EE | Chu-Hsing Lin, Wei Lee: Efficient Secret Sharing with Access Structures in a Hierarchy. AINA 2005: 123-126 |
31 | EE | Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen: Dynamic Key Generations for Secret Sharing in Access Structures. AINA 2005: 127-130 |
30 | EE | Chu-Hsing Lin, Hsiu-Hsia Lin: Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. AINA 2005: 135-138 |
29 | EE | Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang: An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. AINA 2005: 249-252 |
28 | EE | Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen: Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. AINA 2005: 261-264 |
27 | EE | Chu-Hsing Lin, Wei Lee, Yi-Kang Ho: An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. AINA 2005: 399-402 |
26 | EE | Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin, Yi-Yi Lai: On the security of ID-based password authentication scheme using smart cards and fingerprints. ITRE 2005: 230-232 |
25 | EE | Chu-Hsing Lin, Ruei-Hau Hsu, Lein Harn: Improved DSA variant for batch verification. Applied Mathematics and Computation 169(1): 75-81 (2005) |
2004 | ||
24 | EE | Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Supervising Secret-Key Agreements in a Level-Based Hierarchy. AINA (1) 2004: 309-314 |
23 | EE | Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: Using IC Cards to Remotely Login Passwords without Verification Tables. AINA (1) 2004: 321-326 |
22 | EE | Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang: Secret Sharing with Access Structures in a Hierarchy. AINA (2) 2004: 31-34 |
21 | Chu-Hsing Lin, Yi-Yi Lai: A fingerprint-based user authentication scheme for multimedia systems. ICME 2004: 935-938 | |
20 | EE | Jue-Sam Chou, Chu-Hsing Lin, Ting-Ying Lee: A Novel Hierarchical Key Management Scheme Based on Quadratic Residues. ISPA 2004: 858-865 |
2003 | ||
19 | EE | Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Signature Schemes Based on Two Hard Problems Simultaneously. AINA 2003: 557-560 |
18 | EE | Chin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin: Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. AINA 2003: 807-811 |
2002 | ||
17 | EE | Chu-Hsing Lin, Chen-Yu Lee: A Software Protection System for Internet Commerce. IEEE Pacific Rim Conference on Multimedia 2002: 1033-1040 |
16 | Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin: A New Micro-Payment System Using General Payword Chain. Electronic Commerce Research 2(1-2): 159-168 (2002) | |
2001 | ||
15 | Chu-Hsing Lin: Hierarchical key assignment without public-key cryptography. Computers & Security 20(7): 612-619 (2001) | |
2000 | ||
14 | EE | Yi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang: Dynamic GOST. J. Inf. Sci. Eng. 16(6): 857-861 (2000) |
1999 | ||
13 | Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan: One-Way Hash Functions With Changeable Parameters. Inf. Sci. 118(1-4): 223-239 (1999) | |
1998 | ||
12 | EE | Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang: Threshold signature schemes with traceable signers in group communications. Computer Communications 21(8): 771-776 (1998) |
11 | EE | Chu-Hsing Lin, Tien-Chi Lee: A confused document encrypting scheme and its implementation. Computers & Security 17(6): 543-551 (1998) |
1997 | ||
10 | EE | Chu-Hsing Lin: Dynamic key management schemes for access control in a hierarchy. Computer Communications 20(15): 1381-1385 (1997) |
1996 | ||
9 | Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang: A group-oriented (t, n) undeniable signature scheme without trusted center. ACISP 1996: 266-274 | |
1995 | ||
8 | Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: New Public-Key Cipher System Based Upon the Diophantine Equations. IEEE Trans. Computers 44(1): 13-19 (1995) | |
1994 | ||
7 | EE | Chu-Hsing Lin, Chin-Chen Chang: Method for constructing a group-oriented cipher system. Computer Communications 17(11): 805-808 (1994) |
1992 | ||
6 | Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A Record-Oriented Cryptosystem for Database Sharing (Short Note). Comput. J. 35(6): 658-660 (1992) | |
5 | EE | Chin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee: Hierarchy representations based on arithmetic coding for dynamic information protection systems. Inf. Sci. 64(1-2): 35-48 (1992) |
4 | Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee: A conference key broadcasting system using sealed locks. Inf. Syst. 17(4): 323-328 (1992) | |
1991 | ||
3 | Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee: Password authentication using Newton's interpolating polynomials. Inf. Syst. 16(1): 97-102 (1991) | |
1990 | ||
2 | Chin-Chen Chang, Chu-Hsing Lin: A Reciprocal Confluence Tree Unit and Its Applications. BIT 30(1): 27-33 (1990) | |
1 | EE | Chu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang: A Dynamic Access Control Mechanism in Information Protection Systems. J. Inf. Sci. Eng. 6(1): 25-35 (1990) |