臺大學術典藏 |
2018-09-10T08:46:17Z |
World of Warcraft Avatar History Dataset
|
Yeng-Ting Lee; Kuan-Ta Chen; Yun-Maw Cheng; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:46:17Z |
Understanding the Performance of Thin-Client Gaming
|
Yu-Chun Chang; Kuan-Ta Chen; Po-Han Tseng; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:46:17Z |
Security Threats in Advanced Metering Infrastructure
|
He-Ming Ruan; Yu-Sheng Yang; I-An Fan; Christine Peijinn Chai; Chun-Ying Huang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:46:16Z |
Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key
|
Ren-Chiun Wang; Wen-Shenq Juang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:46:16Z |
DevilTyper: A Game for CAPTCHA Usability Evaluation
|
Chien-Ju Ho;Chen-Chi Wu;Kuan-Ta Chen;Chin-Laung Lei; Chien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:08Z |
What can the temporal social behavior tell us? An estimation of vertex-betweenness using dynamic social information
|
Jing-Kai Lou,;Shou-de Lin,;Kuan-Ta Chen,;Chin-Laung Lei; Jing-Kai Lou,; Shou-de Lin,; Kuan-Ta Chen,; Chin-Laung Lei; CHIN-LAUNG LEI; SHOU-DE LIN |
臺大學術典藏 |
2018-09-10T08:18:08Z |
A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc Networks
|
Chia-Chang Hsu;Chin-Laung Lei; Chia-Chang Hsu; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:08Z |
DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests
|
Chien-Ju Ho;Chen-Chi Wu;Kuan-Ta Chen;Chin-Laung Lei; Chien-Ju Ho; Chen-Chi Wu; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:07Z |
Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings
|
Wen-Shenq Juang;Chin-Laung Lei;Horng-Twu Liaw;Wei-Ken Nien; Wen-Shenq Juang; Chin-Laung Lei; Horng-Twu Liaw; Wei-Ken Nien; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:07Z |
Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment
|
Kuan-Ta Chen;Chi-Jui Chang;Chen-Chi Wu;Yu-Chun Chang;Chin-Laung Lei; Kuan-Ta Chen; Chi-Jui Chang; Chen-Chi Wu; Yu-Chun Chang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:07Z |
Smart Card-based Secure Web Services in the Three-party Setting
|
Ren-Chiun Wang;Wen-Shenq Juang;Chin-Laung Lei; Ren-Chiun Wang; Wen-Shenq Juang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:07Z |
Filtering False Messages En-route in Wireless Multi-hop Networks
|
Yu-Shian Chen;Chin-Laung Lei; Yu-Shian Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:07Z |
Generic Framework Intimating Conventional Anonymous Auctions
|
Yu-Shian Chen;Chin-Laung Lei; Yu-Shian Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:07Z |
Radar Chart: Scanning for High QoE in QoS Dimensions
|
Yu-Chun Chang;Chi-Jui Chang;Kuan-Ta Chen;Chin-Laung Lei; Yu-Chun Chang; Chi-Jui Chang; Kuan-Ta Chen; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:07Z |
Online Game QoE Evaluation using Paired Comparisons
|
Yu-Chun Chang;Kuan-Ta Chen;Chen-Chi Wu;Chien-Ju Ho;Chin-Laung Lei; Yu-Chun Chang; Kuan-Ta Chen; Chen-Chi Wu; Chien-Ju Ho; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T08:18:06Z |
A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems
|
Ren-Chiun Wang;Wen-Shenq Juang;Chin-Laung Lei; Ren-Chiun Wang; Wen-Shenq Juang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T07:42:16Z |
Identifying MMORPG Bots: A Traffic Analysis Approach (Extended)
|
Chen, Wen-Chin; POLLY HUANG; CHIN-LAUNG LEI; Chen, Kuan-Ta;Jiang, Jhih-Wei;Huang, Polly;Chu, Hao-Hua;Lei, Chin-Laung;Chen, Wen-Chin; Chen, Kuan-Ta; Jiang, Jhih-Wei; Huang, Polly; Chu, Hao-Hua; Lei, Chin-Laung; Chen, Wen-Chin |
臺大學術典藏 |
2018-09-10T07:42:16Z |
On the Challenges and Designs of Transport Protocols for MMORPGs
|
Chen-Chi Wu;Kuan-Ta Chen;Chih-Ming Chen;Polly Huang;Chin-Laung Lei; Chen-Chi Wu; Kuan-Ta Chen; Chih-Ming Chen; Polly Huang; Chin-Laung Lei; CHIN-LAUNG LEI; POLLY HUANG |
臺大學術典藏 |
2018-09-10T07:41:43Z |
Computer and Network Security in Practice Applying to High-tech Society
|
Shiuh-Jeng Wang;Chung-Huang Yang;Chin-Laung Lei; Shiuh-Jeng Wang; Chung-Huang Yang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T07:41:42Z |
A crowdsourceable QoE evaluation framework for multimedia content
|
Kuan-Ta Chen;Chen-Chi Wu;Yu-Chun Chang;Chin-Laung Lei; Kuan-Ta Chen; Chen-Chi Wu; Yu-Chun Chang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T07:41:42Z |
A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems
|
Ren-Chiun Wang;Wen-Shenq Juang;Chin-Laung Lei; Ren-Chiun Wang; Wen-Shenq Juang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T07:41:42Z |
A Robust Grid-based Key Predistribution Scheme for Sensor Networks
|
Yen-Hua Liao;Chin-Laung Lei;Wen-Chi Tsai; Yen-Hua Liao; Chin-Laung Lei; Wen-Chi Tsai; CHIN-LAUNG LEI; AI-NUNG WANG |
臺大學術典藏 |
2018-09-10T07:41:41Z |
A Security Enhancement for Two User Identification Schemes with Anonymity against Active Attacks
|
Ren-Chiun Wang;Wen-Shenq Juang;Chin-Laung Lei; Ren-Chiun Wang; Wen-Shenq Juang; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T07:41:41Z |
A Prevention Approach to Scrambling Attack in WiMAX Networks
|
Powen Chi;Chin-Laung Lei; Powen Chi; Chin-Laung Lei; CHIN-LAUNG LEI |
臺大學術典藏 |
2018-09-10T07:41:41Z |
An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger
|
Chen-Chi Wu;Kuan-Ta Chen;Yu-Chun Chang;Chin-Laung Lei; Chen-Chi Wu; Kuan-Ta Chen; Yu-Chun Chang; Chin-Laung Lei; CHIN-LAUNG LEI |