2007 |
9 | EE | Ching-Te Chiu,
Yu-Hao Hsu,
Min-Sheng Kao,
Hou-Cheng Tzeng,
Ming-Chang Du,
Ping-Ling Yang,
Ming-Hao Lu,
Fanta Chen,
Hung-Yu Lin,
Jen-Ming Wu,
Shuo-Hung Hsu,
Yarsun Hsu:
A Scalable Load Balanced Birkhoff-von Neumann Symmetric TDM Switch IC for High-Speed Networking Applications.
ISCAS 2007: 2754-2757 |
1995 |
8 | EE | Hung-Yu Lin,
Lein Harn:
Authentication Protocols for Personal Communication Systems.
SIGCOMM 1995: 256-261 |
7 | EE | Hung-Yu Lin,
Lein Harn:
Fair Reconstruction of a Secret.
Inf. Process. Lett. 55(1): 45-47 (1995) |
1992 |
6 | EE | Lein Harn,
Hung-Yu Lin,
Shoubao Yang:
A Software Authentication System for the Prevention of Computer Viruses.
ACM Conference on Computer Science 1992: 447-450 |
5 | EE | Lein Harn,
Hung-Yu Lin:
An l-Span Generalized Secret Sharing Scheme.
CRYPTO 1992: 558-565 |
4 | EE | Lein Harn,
Hung-Yu Lin,
Shoubao Yang:
A software authentication system for information integrity.
Computers & Security 11(8): 747-752 (1992) |
1991 |
3 | | Hung-Yu Lin,
Lein Harn:
A Generalized Secret Sharing Scheme With Cheater Detection.
ASIACRYPT 1991: 149-158 |
2 | | Lein Harn,
Hung-Yu Lin:
On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets.
ASIACRYPT 1991: 312-320 |
1990 |
1 | EE | Lein Harn,
Hung-Yu Lin:
A cryptographic key generation scheme for multilevel data security.
Computers & Security 9(6): 539-546 (1990) |