English  |  正體中文  |  简体中文  |  2822924  
???header.visitor??? :  30072679    ???header.onlineuser??? :  1236
???header.sponsordeclaration???
 
臺灣學術機構典藏系統 (Taiwan Academic Institutional Repository, TAIR)
???ui.leftmenu.abouttair???

???ui.leftmenu.bartitle???

???index.news???

???ui.leftmenu.copyrighttitle???

???ui.leftmenu.link???

"lei c l"???jsp.browse.items-by-author.description???

???jsp.browse.items-by-author.back???
???jsp.browse.items-by-author.order1??? ???jsp.browse.items-by-author.order2???

Showing items 1-25 of 79  (4 Page(s) Totally)
1 2 3 4 > >>
View [10|25|50] records per page

Institution Date Title Author
臺大學術典藏 2021-03-04T06:45:06Z Assessing the Profitability of Timely Opening Range Breakout on Index Futures Markets Tsai, Y.-C.; Wu, M.-E.; Syu, J.-H.; Lei, C.-L.; Wu, C.-S.; Ho, J.-M.; Wang, C.-J.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:06Z An independent three-factor mutual authentication and key agreement scheme with privacy preserving for multiserver environment and a survey Chuang, Y.-H.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:06Z An improved key-agreement protocol for channels with small error rate Guan, A.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z POSTER: Construct macOS Cyber Range for Red/Blue Teams Chen, Y.-H.; Lin, Y.-D.; Chen, C.-K.; Lei, C.-L.; Huang, C.-Y.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines Chuang, Y.-H.; Lei, C.-L.; Shiu, H.-J.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z Privacy protection for telecare medicine information systems with multiple servers using a biometric-based authenticated key agreement scheme Lei, C.-L.; Chuang, Y.-H.; CHIN-LAUNG LEI
臺大學術典藏 2021-03-04T06:45:05Z MigrateSDN: Efficient approach to integrate OpenFlow networks with STP-enabled networks Chi, P.-W.; Wang, M.-H.; Guo, J.-W.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:27Z Firework search for location aided routing enhancement in mobile ad-hoc networks Hsu, C.-C.;Lei, C.-L.; Hsu, C.-C.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:27Z Identifying MMORPG bots: A traffic analysis approach Chen, K.-T.;Jiang, J.-W.;Huang, P.;Chu, H.-H.;Lei, C.-L.;Chen, W.-C.; Chen, K.-T.; Jiang, J.-W.; Huang, P.; Chu, H.-H.; Lei, C.-L.; Chen, W.-C.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:26Z Effect of network quality on player departure behavior in online games Chen, K.-T.;Huang, P.;Lei, C.-L.; Chen, K.-T.; Huang, P.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:25Z An efficient password authentication scheme based on a unit circle Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:24Z A dynamic cryptographic key assignment scheme in a tree structure Liaw, H.T.;Wang, S.J.;Lei, C.L.; Liaw, H.T.; Wang, S.J.; Lei, C.L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:22Z Uncovering Internal Threats Based on Open-Source Intelligence Tsai, M.-H.;Wang, M.-H.;Yang, W.-C.;Lei, C.-L.; Tsai, M.-H.; Wang, M.-H.; Yang, W.-C.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2020-06-11T06:51:22Z An optimal algorithm to assign cryptographic keys in a tree structure for access control Liaw, H.-T.;Lei, C.-L.; Liaw, H.-T.; Lei, C.-L.; CHIN-LAUNG LEI
臺大學術典藏 2018-09-10T07:27:19Z Tame pool-based pairwise key predistribution for large-scale sensor networks Liao, Y.-H.;Lei, C.-L.;Wang, A.-N.;Tsai, W.-C.; Liao, Y.-H.; Lei, C.-L.; Wang, A.-N.; Tsai, W.-C.; CHIN-LAUNG LEI; AI-NUNG WANG
國立臺灣科技大學 2012 Computational procedure of optimal inventory model involving controllable backorder discounts and variable lead time with defective Units Tsou, H.-H.;Lee, W.-C.;Wu, J.-W.;Lei, C.-L.
國立政治大學 2009 Tame pool-based pairwise key predistribution for large-scale sensor networks Liao, Y.-H.;Lei, C.-L. ; Tsai, Wen Chi; 蔡紋琦
淡江大學 2008-09 Computational procedure for assessing lifetime performance index of products for a one-parameter exponential lifetime model with the upper record values Wu, J. W.; Lee, H. M.; Lei, C. L.
國立臺灣大學 2005-06 The Security of Mobile E-Commerce Lei, C. L.; Fan, Chun-I
國立臺灣大學 2004 Divisible blind signatures based on hash chains Fan, C. I.; Lei, C. L.
國立臺灣大學 2001 Smart Card Payment Today and Tomorrow Lei, C. L.; Yin, C. E.
國立臺灣大學 2001 Fairness in E-cash Systems Chen, H. J.; Lei, C. L.; Yu, P. L.
國立臺灣大學 2001 Cryptanalysis on improved user efficient blind signatures Fan, C.-I.; Lei, C.-L.
國立臺灣大學 1999 Partially blind threshold signatures based on discrete logarithm Juang, W. -S.; Lei, C. -L.
國立臺灣大學 1999 Anonymous channel and authentication in wireless communications Juang, W. -S.; Lei, C. -L.; Chang, C. -Y.

Showing items 1-25 of 79  (4 Page(s) Totally)
1 2 3 4 > >>
View [10|25|50] records per page