English  |  正體中文  |  简体中文  |  2818675  
???header.visitor??? :  28215966    ???header.onlineuser??? :  720
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

"chin laung lei"???jsp.browse.items-by-author.description???

???jsp.browse.items-by-author.back???
???jsp.browse.items-by-author.order1??? ???jsp.browse.items-by-author.order2???

Showing items 1-25 of 225  (9 Page(s) Totally)
1 2 3 4 5 6 7 8 9 > >>
View [10|25|50] records per page

Institution Date Title Author
臺大學術典藏 2021-11-21T23:19:41Z Joint Feature Disentanglement and Hallucination for Few-Shot Image Classification Lin, Chia Ching; Chu, Hsin Li; Wang, Yu Chiang Frank; CHIN-LAUNG LEI
臺大學術典藏 2021-09-21T23:19:36Z How to design a secure anonymous authentication and key agreement protocol for multi-server environments and prove its security Chuang, Yun Hsin; CHIN-LAUNG LEI; Shiu, Hung Jr
臺大學術典藏 2021-09-21T23:19:36Z PUF Based Authenticated Key Exchange Protocol for IoT without Verifiers and Explicit CRPs Chuang, Yun Hsin; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:06Z Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:06Z An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey Chuang, Y.-H.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:06Z An improved key-agreement protocol for channels with small error rate Guan, A.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z POSTER: Construct macOS Cyber Range for Red/Blue Teams Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networks Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:28Z Modalities for Model Checking: Branching Time Strikes Back. Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:27Z Firework search for location aided routing enhancement in mobile ad-hoc networks Hsu, C.-C.;Lei, C.-L.; Hsu, C.-C.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:27Z Identifying MMORPG bots: A traffic analysis approach Chen, K.-T.;Jiang, J.-W.;Huang, P.;Chu, H.-H.;Lei, C.-L.;Chen, W.-C.; Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; Chen, W.-C.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:26Z Effect of network quality on player departure behavior in online games Chen, K.-T.;Huang, P.;Lei, C.-L.; Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:25Z An efficient password authentication scheme based on a unit circle Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:24Z Modalities for Model Checking: Branching Time Logic Strikes Back. Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:24Z A dynamic cryptographic key assignment scheme in a tree structure Liaw, H.T.;Wang, S.J.;Lei, C.L.; Liaw, H.T.; Wang, S.J.; Lei, C.L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:22Z Uncovering Internal Threats Based on Open-Source Intelligence Tsai, M.-H.;Wang, M.-H.;Yang, W.-C.;Lei, C.-L.; Tsai, M.-H.; Wang, M.-H.; Yang, W.-C.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:22Z An optimal algorithm to assign cryptographic keys in a tree structure for access control Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:21Z Temporal Reasoning Under Generalized Fairness Constraints. Emerson, E. Allen;Lei, Chin-Laung; Emerson, E. Allen; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:20Z Understanding Potential MicrotaskWorkers for Paid Crowdsourcing. Wang, Ming-Hung;Chen, Kuan-Ta;Wang, Shuo-Yang;Lei, Chin-Laung; Wang, Ming-Hung; Chen, Kuan-Ta; Wang, Shuo-Yang; Lei, Chin-Laung; CHIN-LAUNG LEI
臺大學術典藏 2019-10-31T07:46:53Z Look at Me! Correcting Eye Gaze in Live Video Communication CHIN-LAUNG LEI;Kuan-Ta Chen;Chin-Laung Lei;Yu-Shuen Wang;Chih-Fan Hsu; Chih-Fan Hsu; Yu-Shuen Wang; Chin-Laung Lei; Kuan-Ta Chen; CHIN-LAUNG LEI
臺大學術典藏 2019-10-31T07:46:52Z Efficient Key Agreement Protocol for Smart Sensors CHIN-LAUNG LEI;Chin-Laung Lei;Albert Guan; Albert Guan; Chin-Laung Lei; CHIN-LAUNG LEI
臺大學術典藏 2019-10-31T07:46:50Z Audit-Free Cloud Storage via Deniable Attribute-based Encryption CHIN-LAUNG LEI;Chin-Luang Lei;Po-Wen Chi; Po-Wen Chi; Chin-Luang Lei; CHIN-LAUNG LEI
臺大學術典藏 2019-10-31T07:46:46Z Enhanced Tame-based Key Predistribution Scheme for Sensor Networks CHIN-LAUNG LEI;Chien-Hua Chiu;Yu-Shian Chen;Ying-I Ko;Chin-Laung Lei;Yen-Hwa Liao; Yen-Hwa Liao; Chin-Laung Lei; Ying-I Ko; Yu-Shian Chen; Chien-Hua Chiu; CHIN-LAUNG LEI

Showing items 1-25 of 225  (9 Page(s) Totally)
1 2 3 4 5 6 7 8 9 > >>
View [10|25|50] records per page