Showing results 1 to 20 of 58
next >
Issue Date | Title | Author(s) | Text |
- | (18th IEEE International Conference on Advanced Information Networking and Applications:p133-p138)A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy | C. C. Chang; I. C. Lin; H. M. Tsai | |
- | (18th IEEE International Conference on Advanced Information Networking and Applications:p376-p379)A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies | C. C. Chang; I. C. Lin; H. M. Tsai; H. H. Wang | |
- | (2002 International Conference on Information Security:p082-p088)A Credit Card-based Mobile Payment System | K. F. Hwang; I. C. Lin; C. C. Chang | - |
- | (2003 IEEE International Conference on Natural Language Processing and Knowledge Engineering:p506-p511)An Efficient Placement of Chinese Phonetic Symbols for an Intellectual Chinese Phonetic Symbol Input System in Mobile Phones Using Genetic Algorithm | C. C. Chang; K. J. Shih; I. C. Lin | - |
- | (2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1367-p1370)A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical Organization | I. C. Lin; C. C. Chang | |
- | (2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1537-p1540)An Efficient Proxy Signature for Realizing Generalized Proxy Signature Policy | C. C. Chang; I. C. Lin; J. H. Yang | |
- | (24th International Computer Software and Applications Conference:p113-p115)Security Enhancement for the Simple Authentication Key Agreement Algorithm | I. C. Lin; M. S. Hwang; C. C. Chang | |
- | (2nd international conference on Scalable information systems:p69)A Broadcast-Encryption-Based Key Management Scheme for Dynamic Multicast Communications | C. C. Chang; Y. W. Su; I. C. Lin | |
- | (ACM Operating Systems review,38(3):052-057)An Improvement of Delegated Multisignature Scheme with Document Decomposition | C. C. Chang; I. C. Lin | |
- | (ACM Operating Systems Review,38(3):091-100)Remarks on Fingerprint-based Remote User Authentication Scheme Using Smart Cards | C. C. Chang; I. C. Lin | |
- | (Cancer Biol. Ther.,07(5):777-782)Nuclear Krüppel-like factor 4 expression is associated with human skin squamous cell carcinoma progression and metastasis | Y. J. Chen; C. Y. Wu; C. C. Chang; C. J. Ma; M. C. Li; C. M. Chen | - |
- | (Computer Standards and Interfaces,25(2):131-139)Security Enhancement for the Anonymous Secure E-Voting over a Network | I. C. Lin; M. S. Hwang; C. C. Chang | |
- | (Computer Standards and Interfaces,25(5):501-513)The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture | C. C. Chang; I. C. Lin | |
- | (Computer Standards and Interfaces,27(4):407-413)A Novel ID-based Multisignature Scheme without Reblocking and Predetermined Signing Order | C. C. Chang; I. C. Lin; K. Y. Lam | - |
- | (Computer Vision and Image Understanding,107(3):183-194)A New Steganographic Method for Color and Grayscale Image Hiding | Y. H. Yu; C. C. Chang; I. C. Lin | |
- | (Computing and Informatics,24(5):529-541)A (t,n) Threshold Secret Sharing System with Efficient Identification of Cheaters | I. C. Lin; C. C. Chang | - |
- | (Designs, Codes, and Cryptography,36(1):053-067)The General Pay-Word:A Micro-payment Scheme Based on n-dimension One-way Hash Chain | I. C. Lin; M. S. Hwang; C. C. Chang | |
- | (Eurasip Journal on Applied Signal Processing, 2004(13):1965-1972)A New Repeating Color Watermarking Scheme Based on Human Visual Model | C. S. Tsai; C. C. Chang | |
- | (Fundamenta Informaticae, 58(2):167-178)An Improvement to Image Segment Based on Human Visual System for Object-Based Coding | C. S. Tsai; C. C. Chang | - |
- | (Fundamenta Informaticae, 58(2):179-188)A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Reducing Blocking Effect | C. S. Tsai; C. C. Chang | - |