| 臺大學術典藏 |
2018-09-10T06:02:17Z |
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
|
C. Y. Huang; K. T. Chen; C. L. Lei,; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:52Z |
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing,
|
J. Kuo; S.-U.Te; P.-T. Liao; C.-Y. Huang; P.-L. Tsai; C. L. Lei; S. Y. Kuo; Y,. Huang,; Z. Tsai; CHIN-LAUNG LEI; ZSEHONG TSAI |
| 臺大學術典藏 |
2018-09-10T05:26:50Z |
The Security of Mobile E-Commerce
|
C. L. Lei; Chun-I Fan; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Game Traffic Analysis: An MMORPG Perspective
|
K. T. Chen; P. Huang; C. Y. Huang; C. L. Lei,; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
An On-Line Page-Structure Approximation Scheme for Web Proxies
|
CHIN-LAUNG LEI; C. L. Lei; P. L. Tsai; J. J Lee |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Automatic Generation of Conflict-Free IPSec Policies
|
C. L. Chang; Y. P. Chiu; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Extending Cluster File Systems beyond Last Miles
|
H. H. Chiou; P. L. Tsai; J. J. Lee; H. F. Tung; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Secure Content Delivery using Key Composition
|
C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:48Z |
Secure Multicast Using Proxy Encryption
|
Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:48Z |
A CRT-Based Key Pre-distribution Scheme for Sensor Networks
|
C. L. Lei; P. W. Chi; Y. P. Chiu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
A Remote Control Scheme for Ubiquitous Personal Computing
|
P. L. Tsai; C. L. Lei; W. Y. Wang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
Roundly Router Stamping: Detect and Mitigate DDoS Attacks
|
C. Y. Huang,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
A Session Migration Scheme for Smart Web Services in Mobile Computing
|
P. L. Tsai; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
A Content-Protection Scheme for Multi-Layered Reselling Structures
|
P. L. Yu; P. L. Tsai; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:04Z |
An Efficient and Anonymous Buyer-Seller Watermarking Protocol
|
C. L. Lei; P. L. Yu; P. L. Tsai; M. H. Chan; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:35:19Z |
On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective
|
Y. M. Hsu; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:35:19Z |
User Efficient Fair Blind Signatures
|
P. L. Yu; C. L. Lei; H. J. Chen; C. Y. Huang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:08Z |
Mobile Agents for E-marketplaces in Wireless Networks
|
C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections
|
C. I. Fan; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
Distributed and On-Line Routing on Tori
|
T. H. Yeh; C. M. Kuo; C. L. Lei; H. C. Yen; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
A verifiable multi-authority secret election allowing abstention from voting
|
W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash
|
C. I. Fan,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
An Efficient Anonymous Buyer-Seller Watermarking Protocol
|
C. L. Lei; M. H. Chan; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos
|
C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
Fair Blind Threshold Signatures in Wallet with Observers
|
W. S. Juang; H. T. Liaw; C. L. Lei; P. C. Lin; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
A Computer Immune System using Mobile Agents
|
L. F. Chen; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
Comments on Improved User Efficient Blind Signatures
|
C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
A Proxy Deposit Protocol for E-Cash Systems
|
P. L. Yu; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
Fairness in E-cash Systems
|
H. J. Chen; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
Smart Card Payment Today and Tomorrow
|
C. L. Lei; C. E. Yin; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A Practical Anonymous Payment Scheme for Electronic Commerce
|
W. S. Juang; H. T. Liaw; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A User Efficient Fair E-cash Scheme without On-line Trusted Third Party
|
P. L. Yu; C. L. Lei; C. I. Fan; H. J. Chen; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A Fast Blind Signature Scheme
|
C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A User Efficient Fair E-cash Scheme with Anonymous Certificates
|
P. L. Yu,;C. L. Lei; P. L. Yu,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A User Efficient Fair E-cash Scheme with Anonymous Certificates
|
P. L. Yu,;C. L. Lei; P. L. Yu,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:15Z |
Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes
|
T. H. Yeh; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:15Z |
Fair Blind Threshold Signatures Based on Discrete Logarithms
|
W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:15Z |
Cryptanalysis on improved user efficient blind signatures
|
C. I. Fan; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2004-01 |
Divisible Blind Signatures based on Hash Chains
|
C. I. Fan; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2003-01 |
Design and Implementation of a Secure and High Performance Linux-Based Cluster File System
|
CHIN-LAUNG LEI; C. L. Lei |
| 臺大學術典藏 |
2001-01 |
A fully distributed approach to repositories of reusable software components
|
Y. C. Sun; C. L. Lei; M. L. Kuo; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2001-01 |
A Secure and Anonymous Multi-authorties E-cash Scheme
|
H. T. Liaw; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI; W. S. Juang |