| 2007 |
| 9 | EE | Chun-Li Lin,
Ching-Po Hung:
Masquerade on One-Time Password Authentication Scheme.
FGCN (1) 2007: 279-283 |
| 8 | EE | Yu-Chuan Liu,
Hsiang-An Wen,
Chun-Li Lin,
Tzonelih Hwang:
Proxy-protected signature secure against the undelegated proxy signature attack.
Computers & Electrical Engineering 33(3): 177-185 (2007) |
| 2006 |
| 7 | EE | Hsiang-An Wen,
Chun-Li Lin,
Tzonelih Hwang:
Provably secure authenticated key exchange protocols for low power computing clients.
Computers & Security 25(2): 106-113 (2006) |
| 6 | EE | Chun-Li Lin,
Ching-Po Hung:
Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR).
IEICE Transactions 89-B(12): 3425-3427 (2006) |
| 2004 |
| 5 | EE | Tian-Fu Lee,
Tzonelih Hwang,
Chun-Li Lin:
Enhanced three-party encrypted key exchange without server public keys.
Computers & Security 23(7): 571-577 (2004) |
| 2003 |
| 4 | EE | Chun-Li Lin,
Huey-Er Lee,
Chau-Hsiang Wang,
Keng-Hua Chang:
Integration of CT, CAD system and finite element method to investigate interfacial stresses of resin-bonded prosthesis.
Computer Methods and Programs in Biomedicine 72(1): 55-64 (2003) |
| 3 | | Chun-Li Lin,
Tzonelih Hwang:
A password authentication scheme with secure password updating.
Computers & Security 22(1): 68-72 (2003) |
| 2001 |
| 2 | | Chun-Li Lin,
Hung-Min Sun,
Tzonelih Hwang:
Efficient and Practical DHEKE Protocols.
Operating Systems Review 35(1): 41-47 (2001) |
| 2000 |
| 1 | | Chun-Li Lin,
Hung-Min Sun,
Tzonelih Hwang:
Three-party Encrypted Key Exchange: Attacks and A Solution.
Operating Systems Review 34(4): 12-20 (2000) |