dblp.uni-trier.dewww.uni-trier.de

Chun-Li Lin

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
9EEChun-Li Lin, Ching-Po Hung: Masquerade on One-Time Password Authentication Scheme. FGCN (1) 2007: 279-283
8EEYu-Chuan Liu, Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang: Proxy-protected signature secure against the undelegated proxy signature attack. Computers & Electrical Engineering 33(3): 177-185 (2007)
2006
7EEHsiang-An Wen, Chun-Li Lin, Tzonelih Hwang: Provably secure authenticated key exchange protocols for low power computing clients. Computers & Security 25(2): 106-113 (2006)
6EEChun-Li Lin, Ching-Po Hung: Impersonation Attack on Two-Gene-Relation Password Authentication Protocol (2GR). IEICE Transactions 89-B(12): 3425-3427 (2006)
2004
5EETian-Fu Lee, Tzonelih Hwang, Chun-Li Lin: Enhanced three-party encrypted key exchange without server public keys. Computers & Security 23(7): 571-577 (2004)
2003
4EEChun-Li Lin, Huey-Er Lee, Chau-Hsiang Wang, Keng-Hua Chang: Integration of CT, CAD system and finite element method to investigate interfacial stresses of resin-bonded prosthesis. Computer Methods and Programs in Biomedicine 72(1): 55-64 (2003)
3 Chun-Li Lin, Tzonelih Hwang: A password authentication scheme with secure password updating. Computers & Security 22(1): 68-72 (2003)
2001
2 Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang: Efficient and Practical DHEKE Protocols. Operating Systems Review 35(1): 41-47 (2001)
2000
1 Chun-Li Lin, Hung-Min Sun, Tzonelih Hwang: Three-party Encrypted Key Exchange: Attacks and A Solution. Operating Systems Review 34(4): 12-20 (2000)

Coauthor Index

1Keng-Hua Chang [4]
2Ching-Po Hung [6] [9]
3Tzonelih Hwang [1] [2] [3] [5] [7] [8]
4Huey-Er Lee [4]
5Tian-Fu Lee [5]
6Yu-Chuan Liu [8]
7Hung-Min Sun [1] [2]
8Chau-Hsiang Wang [4]
9Hsiang-An Wen [7] [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)