Browsing by Author I. C. Lin


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 63  next >
Issue DateTitleAuthor(s)Text
-(18th IEEE International Conference on Advanced Information Networking and Applications:p133-p138)A Dynamic Mechanism for Determining Relationships in a Partially Ordered User HierarchyC. C. Chang; I. C. Lin; H. M. Tsai
-(18th IEEE International Conference on Advanced Information Networking and Applications:p376-p379)A Key Assignment Scheme for Controlling Access in Partially Ordered User HierarchiesC. C. Chang; I. C. Lin; H. M. Tsai; H. H. Wang
-(2002 International Conference on Information Security:p082-p088)A Credit Card-based Mobile Payment SystemK. F. Hwang; I. C. Lin; C. C. Chang-
-(2003 IEEE International Conference on Natural Language Processing and Knowledge Engineering:p506-p511)An Efficient Placement of Chinese Phonetic Symbols for an Intellectual Chinese Phonetic Symbol Input System in Mobile Phones Using Genetic AlgorithmC. C. Chang; K. J. Shih; I. C. Lin-
-(2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1367-p1370)A Novel Digital Signature Scheme for Application of Document Review in a Linearly Hierarchical OrganizationI. C. Lin; C. C. Chang
-(2008 International Conference on Intelligent Information Hiding and Multimedia Signal:p1537-p1540)An Efficient Proxy Signature for Realizing Generalized Proxy Signature PolicyC. C. Chang; I. C. Lin; J. H. Yang
-(24th International Computer Software and Applications Conference:p113-p115)Security Enhancement for the Simple Authentication Key Agreement AlgorithmI. C. Lin; M. S. Hwang; C. C. Chang
-(2nd international conference on Scalable information systems:p69)A Broadcast-Encryption-Based Key Management Scheme for Dynamic Multicast CommunicationsC. C. Chang; Y. W. Su; I. C. Lin
-(9th Joint Conference on Information Sciences:p674-p677)A secure and efficient scheme for authenticating remote users using smart cardI. C. Lin; Y. B. Lin; C. M. Wang
-(9th Joint Conference on Information Sciences:p697-p700)An Improvement on Secure E-mail Protocols Providing Perfect Forward SecrecyI. C. Lin; Y. B. Lin; C. M. Wang
-(ACM Operating Systems review,38(3):052-057)An Improvement of Delegated Multisignature Scheme with Document DecompositionC. C. Chang; I. C. Lin
-(ACM Operating Systems Review,38(3):091-100)Remarks on Fingerprint-based Remote User Authentication Scheme Using Smart CardsC. C. Chang; I. C. Lin
-(Computer Standards and Interfaces,25(2):131-139)Security Enhancement for the Anonymous Secure E-Voting over a NetworkI. C. Lin; M. S. Hwang; C. C. Chang
-(Computer Standards and Interfaces,25(5):501-513)The strategy of reducing the location update traffic using forwarding pointers in virtual layer architectureC. C. Chang; I. C. Lin
-(Computer Standards and Interfaces,26(5):423-433)Efficient Access Control and Key Management Schemes for Mobile AgentsI. C. Lin; H. H. Ou; M. S. Hwang
-(Computer Standards and Interfaces,27(4):407-413)A Novel ID-based Multisignature Scheme without Reblocking and Predetermined Signing OrderC. C. Chang; I. C. Lin; K. Y. Lam-
-(Computer Standards and Interfaces,31:458-464)Hiding Data in Spatial Domain Images with Distortion ToleranceI. C. Lin; Y. B. Lin; C. M. Wang
-(Computer Vision and Image Understanding,107(3):183-194)A New Steganographic Method for Color and Grayscale Image HidingY. H. Yu; C. C. Chang; I. C. Lin
-(Computing and Informatics,24(5):529-541)A (t,n) Threshold Secret Sharing System with Efficient Identification of CheatersI. C. Lin; C. C. Chang-
-(Data & Knowledge Engineering,40(2):155-162)Adding Timestamps to the Secure Electronic Auction ProtocolM. S. Hwang; E. J. L. Lu; I. C. Lin