Browsing by Author I. C. Lin

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 63  next >
DateTitleAuthor(s)File
2004(18th IEEE International Conference on Advanced Information Networking and Applications:p133-p138)A Dynamic Mechanism for Determining Relationships in a Partially Ordered User HierarchyC. C. Chang; I. C. Lin; H. M. Tsai; 國立中興大學資訊管理學系
2004(18th IEEE International Conference on Advanced Information Networking and Applications:p376-p379)A Key Assignment Scheme for Controlling Access in Partially Ordered User HierarchiesC. C. Chang; I. C. Lin; H. M. Tsai; H. H. Wang; 國立中興大學資訊管理學系
2002(2002 International Conference on Information Security:p082-p088)A Credit Card-based Mobile Payment SystemK. F. Hwang; I. C. Lin; C. C. Chang; 國立中興大學資訊管理學系-
2003(2003 IEEE International Conference on Natural Language Processing and Knowledge Engineering:p506-p511)An Efficient Placement of Chinese Phonetic Symbols for an Intellectual Chinese Phonetic Symbol Input System in Mobile Phones Using Genetic AlgorithmC. C. Chang; K. J. Shih; I. C. Lin; 國立中興大學資訊管理學系-
2008(2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1367-p1370)A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical OrganizationI. C. Lin; C. C. Chang; 國立中興大學資訊管理學系
2008(2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1537-p1540)An Efficient Proxy Signature for Realizing Generalized Proxy Signature PolicyC. C. Chang; I. C. Lin; J. H. Yang; 國立中興大學資訊管理學系
2000(24th International Computer Software and Applications Conference:p113-p115)Security Enhancement for the Simple Authentication Key Agreement AlgorithmI. C. Lin; M. S. Hwang; C. C. Chang; 國立中興大學資訊管理學系
2007(2nd international conference on Scalable information systems:p69)A Broadcast-Encryption-Based Key Management Scheme for Dynamic Multicast CommunicationsC. C. Chang; Y. W. Su; I. C. Lin; 國立中興大學資訊管理學系
2006(9th Joint Conference on Information Sciences:p674-p677)A secure and efficient scheme for authenticating remote users using smart cardI. C. Lin; Y. B. Lin; C. M. Wang; 國立中興大學資訊管理學系
2006(9th Joint Conference on Information Sciences:p697-p700)An Improvement on Secure E-mail Protocols Providing Perfect Forward SecrecyI. C. Lin; Y. B. Lin; C. M. Wang; 國立中興大學資訊管理學系
2004(ACM Operating Systems review,38(3):052-057)An Improvement of Delegated Multisignature Scheme with Document DecompositionC. C. Chang; I. C. Lin; 國立中興大學資訊管理學系
2004(ACM Operating Systems Review,38(3):091-100)Remarks on Fingerprint-based Remote User Authentication Scheme Using Smart CardsC. C. Chang; I. C. Lin; 國立中興大學資訊管理學系
2003(Computer Standards and Interfaces,25(2):131-139)Security Enhancement for the Anonymous Secure E-Voting over a NetworkI. C. Lin; M. S. Hwang; C. C. Chang; 國立中興大學資訊管理學系
2003(Computer Standards and Interfaces,25(5):501-513)The strategy of reducing the location update traffic using forwarding pointers in virtual layer architectureC. C. Chang; I. C. Lin; 國立中興大學資訊管理學系
2004(Computer Standards and Interfaces,26(5):423-433)Efficient Access Control and Key Management Schemes for Mobile AgentsI. C. Lin; H. H. Ou; M. S. Hwang; 國立中興大學資訊管理學系
2005(Computer Standards and Interfaces,27(4):407-413)A Novel ID-based Multisignature Scheme without Reblocking and Predetermined Signing OrderC. C. Chang; I. C. Lin; K. Y. Lam; 國立中興大學資訊管理學系-
2009(Computer Standards and Interfaces,31:458-464)Hiding Data in Spatial Domain Images with Distortion ToleranceI. C. Lin; Y. B. Lin; C. M. Wang; 國立中興大學資訊管理學系
2007(Computer Vision and Image Understanding,107(3):183-194)A New Steganographic Method for Color and Grayscale Image HidingY. H. Yu; C. C. Chang; I. C. Lin; 國立中興大學資訊管理學系
2005(Computing and Informatics,24(5):529-541)A (t,n) Threshold Secret Sharing System with Efficient Identification of CheatersI. C. Lin; C. C. Chang; 國立中興大學資訊管理學系-
2002(Data & Knowledge Engineering,40(2):155-162)Adding Timestamps to the Secure Electronic Auction ProtocolM. S. Hwang; E. J. L. Lu; I. C. Lin; 國立中興大學資訊管理學系