The SCEAS System
Navigation Menu

Search the dblp DataBase


Yi-Ting Chiang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
    Secrecy of Two-Party Secure Computation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:114-123 [Conf]
  2. Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu
    Information Theoretical Analysis of Two-Party Secret Computation. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:310-317 [Conf]
  3. Yi-Ting Chiang, Yu-Cheng Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
    How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases. [Citation Graph (0, 0)][DBLP]
    Rough Sets and Current Trends in Computing, 2002, pp:226-233 [Conf]
  4. Yi-Ting Chiang, Ching-Chi Lin, Hsueh-I Lu
    Orderly spanning trees with applications to graph encoding and graph drawing. [Citation Graph (0, 0)][DBLP]
    SODA, 2001, pp:506-515 [Conf]
  5. Yi-Ting Chiang, Ching-Chi Lin, Hsueh-I Lu
    Orderly Spanning Trees with Applications [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  6. Yi-Ting Chiang, Ching-Chi Lin, Hsueh-I Lu
    Orderly Spanning Trees with Applications. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 2005, v:34, n:4, pp:924-945 [Journal]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002