| 臺大學術典藏 |
2018-09-10T15:00:18Z |
A Reversible Acoustic Data Hiding Method Based on Analog Modulation
|
H. J. Shiu;S. Y. Tang;C. H. Huang;R .C. T. Lee;C. L. Lei; H. J. Shiu; S. Y. Tang; C. H. Huang; R .C. T. Lee; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T15:00:18Z |
A Reversible Acoustic Data Hiding Method Based on Analog Modulation
|
H. J. Shiu;S. Y. Tang;C. H. Huang;R .C. T. Lee;C. L. Lei; H. J. Shiu; S. Y. Tang; C. H. Huang; R .C. T. Lee; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T07:41:40Z |
Provably Secure Blind Threshold Signatures Based on Discrete Logarithm
|
C. L. Lei; W. S. Juang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T07:41:40Z |
Skins as a Mechanism for Making Languages Syntactically Extensible
|
Y. C. Sun; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T07:41:40Z |
A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process
|
C. I. Fan; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T07:41:40Z |
Issues for Building Virtual Private Networks
|
C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T07:41:39Z |
Partially Blind Threshold Signatures Based on Discrete Logarithms
|
W. S. Juang; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T07:41:38Z |
Anonymous Channel and Authentication in Wireless Communications
|
W. S. Juang; C. L. Lei; C. Y. Chang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T06:35:01Z |
A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography
|
C. Y. Huang; Y. P. Chiu; K. T. Chen; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T06:02:17Z |
On the Sensitivity of Online Game Playing Time to Network QoS
|
K. T. Chen; P. Huang; C. Y. Huang; C. L. Lei; CHIN-LAUNG LEI; POLLY HUANG |
| 臺大學術典藏 |
2018-09-10T06:02:17Z |
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter
|
C. Y. Huang; K. T. Chen; C. L. Lei,; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:52Z |
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing,
|
J. Kuo; S.-U.Te; P.-T. Liao; C.-Y. Huang; P.-L. Tsai; C. L. Lei; S. Y. Kuo; Y,. Huang,; Z. Tsai; CHIN-LAUNG LEI; ZSEHONG TSAI |
| 臺大學術典藏 |
2018-09-10T05:26:50Z |
The Security of Mobile E-Commerce
|
C. L. Lei; Chun-I Fan; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Game Traffic Analysis: An MMORPG Perspective
|
K. T. Chen; P. Huang; C. Y. Huang; C. L. Lei,; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
An On-Line Page-Structure Approximation Scheme for Web Proxies
|
CHIN-LAUNG LEI; C. L. Lei; P. L. Tsai; J. J Lee |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Automatic Generation of Conflict-Free IPSec Policies
|
C. L. Chang; Y. P. Chiu; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Extending Cluster File Systems beyond Last Miles
|
H. H. Chiou; P. L. Tsai; J. J. Lee; H. F. Tung; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:49Z |
Secure Content Delivery using Key Composition
|
C. Y. Huang; Y. P. Chiu; K. T. Chen; H. H. Chiou; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:48Z |
Secure Multicast Using Proxy Encryption
|
Y. P. Chiu; C. L. Lei; C. Y. Huang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T05:26:48Z |
A CRT-Based Key Pre-distribution Scheme for Sensor Networks
|
C. L. Lei; P. W. Chi; Y. P. Chiu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
A Remote Control Scheme for Ubiquitous Personal Computing
|
P. L. Tsai; C. L. Lei; W. Y. Wang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
Roundly Router Stamping: Detect and Mitigate DDoS Attacks
|
C. Y. Huang,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
A Session Migration Scheme for Smart Web Services in Mobile Computing
|
P. L. Tsai; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:05Z |
A Content-Protection Scheme for Multi-Layered Reselling Structures
|
P. L. Yu; P. L. Tsai; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:59:04Z |
An Efficient and Anonymous Buyer-Seller Watermarking Protocol
|
C. L. Lei; P. L. Yu; P. L. Tsai; M. H. Chan; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:35:19Z |
On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective
|
Y. M. Hsu; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:35:19Z |
User Efficient Fair Blind Signatures
|
P. L. Yu; C. L. Lei; H. J. Chen; C. Y. Huang; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:08Z |
Mobile Agents for E-marketplaces in Wireless Networks
|
C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections
|
C. I. Fan; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
Distributed and On-Line Routing on Tori
|
T. H. Yeh; C. M. Kuo; C. L. Lei; H. C. Yen; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
A verifiable multi-authority secret election allowing abstention from voting
|
W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash
|
C. I. Fan,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
An Efficient Anonymous Buyer-Seller Watermarking Protocol
|
C. L. Lei; M. H. Chan; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T04:15:07Z |
Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos
|
C. L. Lei; Y. M. Hsu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
Fair Blind Threshold Signatures in Wallet with Observers
|
W. S. Juang; H. T. Liaw; C. L. Lei; P. C. Lin; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
A Computer Immune System using Mobile Agents
|
L. F. Chen; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
Comments on Improved User Efficient Blind Signatures
|
C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:17Z |
A Proxy Deposit Protocol for E-Cash Systems
|
P. L. Yu; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
Fairness in E-cash Systems
|
H. J. Chen; C. L. Lei; P. L. Yu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
Smart Card Payment Today and Tomorrow
|
C. L. Lei; C. E. Yin; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A Practical Anonymous Payment Scheme for Electronic Commerce
|
W. S. Juang; H. T. Liaw; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A User Efficient Fair E-cash Scheme without On-line Trusted Third Party
|
P. L. Yu; C. L. Lei; C. I. Fan; H. J. Chen; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A Fast Blind Signature Scheme
|
C. I. Fan; C. L. Lei; Y. P. Chiu; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A User Efficient Fair E-cash Scheme with Anonymous Certificates
|
P. L. Yu,;C. L. Lei; P. L. Yu,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:16Z |
A User Efficient Fair E-cash Scheme with Anonymous Certificates
|
P. L. Yu,;C. L. Lei; P. L. Yu,; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:15Z |
Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes
|
T. H. Yeh; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:15Z |
Fair Blind Threshold Signatures Based on Discrete Logarithms
|
W. S. Juang; C. L. Lei; H. T. Liaw; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2018-09-10T03:50:15Z |
Cryptanalysis on improved user efficient blind signatures
|
C. I. Fan; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2004-01 |
Divisible Blind Signatures based on Hash Chains
|
C. I. Fan; C. L. Lei; CHIN-LAUNG LEI |
| 臺大學術典藏 |
2003-01 |
Design and Implementation of a Secure and High Performance Linux-Based Cluster File System
|
CHIN-LAUNG LEI; C. L. Lei |