2009 |
34 | EE | Chin-Chen Chang,
Yi-Fang Cheng,
Iuon-Chang Lin:
A novel key management scheme for dynamic multicast communications.
Int. J. Communication Systems 22(1): 53-66 (2009) |
2008 |
33 | EE | Jen-Bang Feng,
Iuon-Chang Lin,
Yen-Ping Chu:
Halftone image resampling by interpolation and error-diffusion.
ICUIMC 2008: 409-413 |
32 | EE | Iuon-Chang Lin:
A neural network system for authenticating remote users in multi-server architecture.
Int. J. Communication Systems 21(4): 435-445 (2008) |
31 | EE | Chia-Chi Wu,
Chin-Chen Chang,
Iuon-Chang Lin:
New Sealed-Bid Electronic Auction with Fairness, Security and Efficiency.
J. Comput. Sci. Technol. 23(2): 253-264 (2008) |
2007 |
30 | EE | Chin-Chen Chang,
Yu-Wei Su,
Iuon-Chang Lin:
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress.
Infoscale 2007: 69 |
29 | EE | Chin-Chen Chang,
Yi-Fang Cheng,
Iuon-Chang Lin:
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control.
Inscrypt 2007: 457-462 |
28 | EE | Yuan-Hui Yu,
Chin-Chen Chang,
Iuon-Chang Lin:
A new steganographic method for color and grayscale image hiding.
Computer Vision and Image Understanding 107(3): 183-194 (2007) |
27 | EE | Iuon-Chang Lin,
Chin-Chen Chang:
Security enhancement for digital signature schemes with fault tolerance in RSA.
Inf. Sci. 177(19): 4031-4039 (2007) |
2006 |
26 | EE | Iuon-Chang Lin,
Chin-Chen Chang:
An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem.
ATC 2006: 601-610 |
25 | EE | Iuon-Chang Lin,
Yang-Bin Lin,
Chung-Ming Wang:
A Secure and Efficient Scheme for Authenticating Remote Users using Smart Card.
JCIS 2006 |
24 | EE | Iuon-Chang Lin,
Yang-Bin Lin,
Chung-Ming Wang:
An Improvement on Secure E-mail Protocols Providing Perfect Forward Secrecy.
JCIS 2006 |
23 | EE | Ching-Yun Chang,
Iuon-Chang Lin:
An Efficient Progressive Image Transmission Scheme for Chinese Calligraphy.
IJPRAI 20(7): 1077-1092 (2006) |
22 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
A new solution for assigning cryptographic keys to control access in mobile agent environments.
Wireless Communications and Mobile Computing 6: 137-146 (2006) |
2005 |
21 | | Iuon-Chang Lin,
Chin-Chen Chang:
A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters.
Computers and Artificial Intelligence 24(5): (2005) |
20 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Chin-Chen Chang:
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain.
Des. Codes Cryptography 36(1): 53-67 (2005) |
19 | EE | Chin-Chen Chang,
Iuon-Chang Lin,
Hui-Min Tsai:
A dynamic mechanism for determining relationships in a partially ordered user hierarchy.
IJHPCN 3(5/6): 378-384 (2005) |
18 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach.
Informatica, Lith. Acad. Sci. 16(1): 37-44 (2005) |
17 | EE | Iuon-Chang Lin,
Hsia-Hung Ou,
Min-Shiang Hwang:
A user authentication system using back-propagation network.
Neural Computing and Applications 14(3): 243-249 (2005) |
2004 |
16 | EE | Chin-Chen Chang,
Iuon-Chang Lin,
Hui-Min Tsai:
A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy.
AINA (1) 2004: 133-138 |
15 | EE | Chin-Chen Chang,
Iuon-Chang Lin,
Hui-Min Tsai,
Hsiao-Hsi Wang:
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies.
AINA (2) 2004: 376-379 |
14 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
An improvement of delegated multisignature scheme with document decomposition.
Operating Systems Review 38(4): 52-57 (2004) |
13 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Remarks on fingerprint-based remote user authentication scheme using smart cards.
Operating Systems Review 38(4): 91-96 (2004) |
12 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Novel full-search schemes for speeding up image coding using vector quantization.
Real-Time Imaging 10(2): 95-102 (2004) |
2003 |
11 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Li-Hua Li:
A new remote user authentication scheme for multi-server architecture.
Future Generation Comp. Syst. 19(1): 13-22 (2003) |
10 | EE | Iuon-Chang Lin,
Min-Shiang Hwang,
Chin-Chen Chang:
A new key assignment scheme for enforcing complicated access control policies in hierarchy.
Future Generation Comp. Syst. 19(4): 457-462 (2003) |
9 | EE | Min-Shiang Hwang,
Eric Jui-Lin Lu,
Iuon-Chang Lin:
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem.
IEEE Trans. Knowl. Data Eng. 15(6): 1552-1560 (2003) |
8 | EE | Chin-Chen Chang,
Timothy K. Shih,
Iuon-Chang Lin:
Guessing by neighbors: an efficient reconstruction method for transmitting image progressively.
The Visual Computer 19(5): 342-353 (2003) |
2002 |
7 | | Chin-Chen Chang,
Iuon-Chang Lin,
Timothy K. Shih:
An Efficient Edge Detection Technique for Chinese Calligraphy.
JCIS 2002: 960-963 |
6 | EE | Min-Shiang Hwang,
Eric Jui-Lin Lu,
Iuon-Chang Lin:
Adding timestamps to the secure electronic auction protocol.
Data Knowl. Eng. 40(2): 155-162 (2002) |
2001 |
5 | EE | Chin-Chen Chang,
Iuon-Chang Lin:
Cryptanalysis of the Improved User Efficient Blind Signatures.
ICICS 2001: 42-46 |
4 | EE | Min-Shiang Hwang,
Iuon-Chang Lin,
Li-Hua Li:
A simple micro-payment scheme.
Journal of Systems and Software 55(3): 221-229 (2001) |
2000 |
3 | EE | Iuon-Chang Lin,
Chin-Chen Chang,
Min-Shiang Hwang:
Security Enhancement for the "Simple Authentication Key Agreement Algorithm".
COMPSAC 2000: 113-115 |
2 | EE | Min-Shiang Hwang,
Iuon-Chang Lin,
Kuo-Feng Hwang:
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures.
Informatica, Lith. Acad. Sci. 11(1): 15-19 (2000) |
1 | EE | Min-Shiang Hwang,
Iuon-Chang Lin,
Eric Jui-Lin Lu:
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci. 11(2): 137-144 (2000) |