2009 |
47 | EE | Chu-Hsing Lin,
Fuu-Cheng Jiang,
Wei-Shen Lai,
Wei-Yuah Lee,
Wei-Cheng Hsu:
Counteract SYN flooding using second chance packet filtering.
ICUIMC 2009: 216-220 |
2008 |
46 | EE | Chu-Hsing Lin,
Wei-Shen Lai,
Yen-Lin Huang,
Mei-Chun Chou:
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks.
AINA Workshops 2008: 1272-1277 |
45 | EE | Chu-Hsing Lin,
Chih-Hsiong Shih,
Jung-Chun Liu,
Mao-Hua Cheng,
Yan-Wei Lee:
Energy efficiency measurement for multimedia audio decoding on embedded systems.
ICUIMC 2008: 404-408 |
44 | EE | Chu-Hsing Lin,
Wei-Shen Lai,
Yen-Lin Huang,
Mei-Chun Chou:
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks.
MUE 2008: 102-107 |
43 | EE | Chu-Hsing Lin,
Jung-Chun Liu,
Chih-Hsiong Shih,
Yan-Wei Lee:
A Robust Watermark Scheme for Copyright Protection.
MUE 2008: 132-137 |
42 | EE | Chu-Hsing Lin,
Jung-Chun Liu,
Hsun-Chi Huang,
Tsung-Che Yang:
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks.
MUE 2008: 176-181 |
41 | EE | Chu-Hsing Lin,
Jui-Ling Yu,
Jung-Chun Liu,
Chia-Jen Lee:
Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems.
MUE 2008: 402-406 |
40 | EE | Chu-Hsing Lin,
Fuu-Cheng Jiang,
Jen-Chieh Chang,
Frode Eika Sandnes:
Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks.
PDCAT 2008: 342-349 |
39 | EE | Chu-Hsing Lin,
Jung-Chun Liu,
Pei-Chen Han:
On the Security of the Full-Band Image Watermark for Copyright Protection.
SUTC 2008: 74-80 |
38 | EE | Chu-Hsing Lin,
Yu-Ying Lin,
Frode Eika Sandnes:
Integrity Protection of Binary Text Document Images Based on Image Topologies.
IJPRAI 22(8): 1599-1620 (2008) |
2007 |
37 | EE | Jung-Chun Liu,
Chu-Hsing Lin,
Li-Ching Kuo,
Jen-Chieh Chang:
Robust Multi-scale Full-Band Image Watermarking for Copyright Protection.
IEA/AIE 2007: 176-184 |
36 | EE | Chu-Hsing Lin,
Jung-Chun Liu,
Chun-Wei Liao:
Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices.
MUE 2007: 120-125 |
35 | EE | Chin-Chen Chang,
Chu-Hsing Lin,
Chien-Yuan Chen:
A Conference Key Distribution Scheme Using Interpolating Polynomials.
MUE 2007: 963-967 |
2006 |
34 | EE | Jue-Sam Chou,
Yalin Chen,
Chu-Hsing Lin:
An improvement of an efficient user identification scheme based on ID-based cryptosystem.
SUTC (1) 2006: 558-561 |
33 | EE | Chin-Chen Chang,
Kuo-Lun Chen,
Chu-Hsing Lin,
Jen-Chieh Chang:
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks.
UIC 2006: 816-825 |
2005 |
32 | EE | Chu-Hsing Lin,
Wei Lee:
Efficient Secret Sharing with Access Structures in a Hierarchy.
AINA 2005: 123-126 |
31 | EE | Chu-Hsing Lin,
Wei Lee,
Chien-Sheng Chen:
Dynamic Key Generations for Secret Sharing in Access Structures.
AINA 2005: 127-130 |
30 | EE | Chu-Hsing Lin,
Hsiu-Hsia Lin:
Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing.
AINA 2005: 135-138 |
29 | EE | Chia-Yin Lee,
Chu-Hsing Lin,
Chin-Chen Chang:
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication.
AINA 2005: 249-252 |
28 | EE | Chi-Hsiung Huang,
Chia-Yin Lee,
Chu-Hsing Lin,
Chin-Chen Chang,
Kuo-Lun Chen:
Authenticated Encryption Schemes with Message Linkage for Threshold Signatures.
AINA 2005: 261-264 |
27 | EE | Chu-Hsing Lin,
Wei Lee,
Yi-Kang Ho:
An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions.
AINA 2005: 399-402 |
26 | EE | Chu-Hsing Lin,
Tri-Show Lin,
Hsiu-Hsia Lin,
Yi-Yi Lai:
On the security of ID-based password authentication scheme using smart cards and fingerprints.
ITRE 2005: 230-232 |
25 | EE | Chu-Hsing Lin,
Ruei-Hau Hsu,
Lein Harn:
Improved DSA variant for batch verification.
Applied Mathematics and Computation 169(1): 75-81 (2005) |
2004 |
24 | EE | Ching-Te Wang,
Chu-Hsing Lin,
Chin-Chen Chang:
Supervising Secret-Key Agreements in a Level-Based Hierarchy.
AINA (1) 2004: 309-314 |
23 | EE | Ching-Te Wang,
Chin-Chen Chang,
Chu-Hsing Lin:
Using IC Cards to Remotely Login Passwords without Verification Tables.
AINA (1) 2004: 321-326 |
22 | EE | Chin-Chen Chang,
Chu-Hsing Lin,
Wei Lee,
Pai-Cheng Hwang:
Secret Sharing with Access Structures in a Hierarchy.
AINA (2) 2004: 31-34 |
21 | | Chu-Hsing Lin,
Yi-Yi Lai:
A fingerprint-based user authentication scheme for multimedia systems.
ICME 2004: 935-938 |
20 | EE | Jue-Sam Chou,
Chu-Hsing Lin,
Ting-Ying Lee:
A Novel Hierarchical Key Management Scheme Based on Quadratic Residues.
ISPA 2004: 858-865 |
2003 |
19 | EE | Ching-Te Wang,
Chu-Hsing Lin,
Chin-Chen Chang:
Signature Schemes Based on Two Hard Problems Simultaneously.
AINA 2003: 557-560 |
18 | EE | Chin-Chen Chang,
Ying-Tse Kuo,
Chu-Hsing Lin:
Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements.
AINA 2003: 807-811 |
2002 |
17 | EE | Chu-Hsing Lin,
Chen-Yu Lee:
A Software Protection System for Internet Commerce.
IEEE Pacific Rim Conference on Multimedia 2002: 1033-1040 |
16 | | Ching-Te Wang,
Chin-Chen Chang,
Chu-Hsing Lin:
A New Micro-Payment System Using General Payword Chain.
Electronic Commerce Research 2(1-2): 159-168 (2002) |
2001 |
15 | | Chu-Hsing Lin:
Hierarchical key assignment without public-key cryptography.
Computers & Security 20(7): 612-619 (2001) |
2000 |
14 | EE | Yi-Shiung Yeh,
Chu-Hsing Lin,
Chan-Chi Wang:
Dynamic GOST.
J. Inf. Sci. Eng. 16(6): 857-861 (2000) |
1999 |
13 | | Tsu-Miin Hsieh,
Yi-Shiung Yeh,
Chu-Hsing Lin,
Ssu-Heng Tuan:
One-Way Hash Functions With Changeable Parameters.
Inf. Sci. 118(1-4): 223-239 (1999) |
1998 |
12 | EE | Ching-Te Wang,
Chu-Hsing Lin,
Chin-Chen Chang:
Threshold signature schemes with traceable signers in group communications.
Computer Communications 21(8): 771-776 (1998) |
11 | EE | Chu-Hsing Lin,
Tien-Chi Lee:
A confused document encrypting scheme and its implementation.
Computers & Security 17(6): 543-551 (1998) |
1997 |
10 | EE | Chu-Hsing Lin:
Dynamic key management schemes for access control in a hierarchy.
Computer Communications 20(15): 1381-1385 (1997) |
1996 |
9 | | Chu-Hsing Lin,
Ching-Te Wang,
Chin-Chen Chang:
A group-oriented (t, n) undeniable signature scheme without trusted center.
ACISP 1996: 266-274 |
1995 |
8 | | Chu-Hsing Lin,
Chin-Chen Chang,
Richard C. T. Lee:
New Public-Key Cipher System Based Upon the Diophantine Equations.
IEEE Trans. Computers 44(1): 13-19 (1995) |
1994 |
7 | EE | Chu-Hsing Lin,
Chin-Chen Chang:
Method for constructing a group-oriented cipher system.
Computer Communications 17(11): 805-808 (1994) |
1992 |
6 | | Chu-Hsing Lin,
Chin-Chen Chang,
Richard C. T. Lee:
A Record-Oriented Cryptosystem for Database Sharing (Short Note).
Comput. J. 35(6): 658-660 (1992) |
5 | EE | Chin-Chen Chang,
Chu-Hsing Lin,
Richard C. T. Lee:
Hierarchy representations based on arithmetic coding for dynamic information protection systems.
Inf. Sci. 64(1-2): 35-48 (1992) |
4 | | Chu-Hsing Lin,
Chin-Chen Chang,
Richard C. T. Lee:
A conference key broadcasting system using sealed locks.
Inf. Syst. 17(4): 323-328 (1992) |
1991 |
3 | | Chu-Hsing Lin,
Chin-Chen Chang,
Tzong-Chen Wu,
Richard C. T. Lee:
Password authentication using Newton's interpolating polynomials.
Inf. Syst. 16(1): 97-102 (1991) |
1990 |
2 | | Chin-Chen Chang,
Chu-Hsing Lin:
A Reciprocal Confluence Tree Unit and Its Applications.
BIT 30(1): 27-33 (1990) |
1 | EE | Chu-Hsing Lin,
Richard C. T. Lee,
Chin-Chen Chang:
A Dynamic Access Control Mechanism in Information Protection Systems.
J. Inf. Sci. Eng. 6(1): 25-35 (1990) |