Search the dblp DataBase
Chu-Hsing Lin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chu-Hsing Lin , Ching-Te Wang , Chin-Chen Chang A group-oriented (t, n) undeniable signature scheme without trusted center. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:266-274 [Conf ] Chin-Chen Chang , Ying-Tse Kuo , Chu-Hsing Lin Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:807-811 [Conf ] Chin-Chen Chang , Chu-Hsing Lin , Wei Lee , Pai-Cheng Hwang Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:31-34 [Conf ] Chi-Hsiung Huang , Chia-Yin Lee , Chu-Hsing Lin , Chin-Chen Chang , Kuo-Lun Chen Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:261-264 [Conf ] Chia-Yin Lee , Chu-Hsing Lin , Chin-Chen Chang An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:249-252 [Conf ] Chu-Hsing Lin , Wei Lee Efficient Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:123-126 [Conf ] Chu-Hsing Lin , Hsiu-Hsia Li Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:135-138 [Conf ] Chu-Hsing Lin , Wei Lee , Chien-Sheng Chen Dynamic Key Generations for Secret Sharing in Access Structures. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:127-130 [Conf ] Chu-Hsing Lin , Wei Lee , Yi-Kang Ho An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:399-402 [Conf ] Ching-Te Wang , Chin-Chen Chang , Chu-Hsing Lin Using IC Cards to Remotely Login Passwords without Verification Tables. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:321-326 [Conf ] Ching-Te Wang , Chu-Hsing Lin , Chin-Chen Chang Signature Schemes Based on Two Hard Problems Simultaneously. [Citation Graph (0, 0)][DBLP ] AINA, 2003, pp:557-560 [Conf ] Ching-Te Wang , Chu-Hsing Lin , Chin-Chen Chang Supervising Secret-Key Agreements in a Level-Based Hierarchy. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:309-314 [Conf ] Chu-Hsing Lin , Yi-Yi Lai A fingerprint-based user authentication scheme for multimedia systems. [Citation Graph (0, 0)][DBLP ] ICME, 2004, pp:935-938 [Conf ] Jue-Sam Chou , Chu-Hsing Lin , Ting-Ying Lee A Novel Hierarchical Key Management Scheme Based on Quadratic Residues. [Citation Graph (0, 0)][DBLP ] ISPA, 2004, pp:858-865 [Conf ] Chu-Hsing Lin , Chen-Yu Lee A Software Protection System for Internet Commerce. [Citation Graph (0, 0)][DBLP ] IEEE Pacific Rim Conference on Multimedia, 2002, pp:1033-1040 [Conf ] Jue-Sam Chou , Yalin Chen , Chu-Hsing Lin An improvement of an efficient user identification scheme based on ID-based cryptosystem. [Citation Graph (0, 0)][DBLP ] SUTC (1), 2006, pp:558-561 [Conf ] Chin-Chen Chang , Kuo-Lun Chen , Chu-Hsing Lin , Jen-Chieh Chang A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:816-825 [Conf ] Chu-Hsing Lin , Jung-Chun Liu , Chun-Wei Liao Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:120-125 [Conf ] Chin-Chen Chang , Chu-Hsing Lin , Chien-Yuan Chen A Conference Key Distribution Scheme Using Interpolating Polynomials. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:963-967 [Conf ] Chin-Chen Chang , Chu-Hsing Lin A Reciprocal Confluence Tree Unit and Its Applications. [Citation Graph (0, 0)][DBLP ] BIT, 1990, v:30, n:1, pp:27-33 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Richard C. T. Lee A Record-Oriented Cryptosystem for Database Sharing (Short Note). [Citation Graph (0, 0)][DBLP ] Comput. J., 1992, v:35, n:6, pp:658-660 [Journal ] Chu-Hsing Lin Dynamic key management schemes for access control in a hierarchy. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:15, pp:1381-1385 [Journal ] Chu-Hsing Lin , Chin-Chen Chang Method for constructing a group-oriented cipher system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1994, v:17, n:11, pp:805-808 [Journal ] Ching-Te Wang , Chu-Hsing Lin , Chin-Chen Chang Threshold signature schemes with traceable signers in group communications. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1998, v:21, n:8, pp:771-776 [Journal ] Chu-Hsing Lin Hierarchical key assignment without public-key cryptography. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2001, v:20, n:7, pp:612-619 [Journal ] Chu-Hsing Lin , Tien-Chi Lee A confused document encrypting scheme and its implementation. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1998, v:17, n:6, pp:543-551 [Journal ] Ching-Te Wang , Chin-Chen Chang , Chu-Hsing Lin A New Micro-Payment System Using General Payword Chain. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2002, v:2, n:1-2, pp:159-168 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Richard C. T. Lee A conference key broadcasting system using sealed locks. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1992, v:17, n:4, pp:323-328 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Tzong-Chen Wu , Richard C. T. Lee Password authentication using Newton's interpolating polynomials. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1991, v:16, n:1, pp:97-102 [Journal ] Chin-Chen Chang , Chu-Hsing Lin , Richard C. T. Lee Hierarchy representations based on arithmetic coding for dynamic information protection systems. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1992, v:64, n:1-2, pp:35-48 [Journal ] Tsu-Miin Hsieh , Yi-Shiung Yeh , Chu-Hsing Lin , Ssu-Heng Tuan One-Way Hash Functions With Changeable Parameters. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1999, v:118, n:1-4, pp:223-239 [Journal ] Chu-Hsing Lin , Richard C. T. Lee , Chin-Chen Chang A Dynamic Access Control Mechanism in Information Protection Systems. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1990, v:6, n:1, pp:25-35 [Journal ] Yi-Shiung Yeh , Chu-Hsing Lin , Chan-Chi Wang Dynamic GOST. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2000, v:16, n:6, pp:857-861 [Journal ] Chu-Hsing Lin , Chin-Chen Chang , Richard C. T. Lee New Public-Key Cipher System Based Upon the Diophantine Equations. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:1, pp:13-19 [Journal ] Jung-Chun Liu , Chu-Hsing Lin , Li-Ching Kuo , Jen-Chieh Chang Robust Multi-scale Full-Band Image Watermarking for Copyright Protection. [Citation Graph (0, 0)][DBLP ] IEA/AIE, 2007, pp:176-184 [Conf ] Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks. [Citation Graph (, )][DBLP ] Detection Method Based on Reverse Proxy against Web Flooding Attacks. [Citation Graph (, )][DBLP ] Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks. [Citation Graph (, )][DBLP ] On the Security of the Full-Band Image Watermark for Copyright Protection. [Citation Graph (, )][DBLP ] A Robust Watermark Scheme for Copyright Protection. [Citation Graph (, )][DBLP ] Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. [Citation Graph (, )][DBLP ] Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. [Citation Graph (, )][DBLP ] I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP ] Binary Documents Recovery Based on Skeleton Extraction. [Citation Graph (, )][DBLP ] On the security of ID-based password authentication scheme using smart cards and fingerprints. [Citation Graph (, )][DBLP ] Energy efficiency measurement for multimedia audio decoding on embedded systems. [Citation Graph (, )][DBLP ] Counteract SYN flooding using second chance packet filtering. [Citation Graph (, )][DBLP ] Access Log Generator for Analyzing Malicious Website Browsing Behaviors. [Citation Graph (, )][DBLP ] Safeguard Intranet Using Embedded and Distributed Firewall System. [Citation Graph (, )][DBLP ] Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET. [Citation Graph (, )][DBLP ] Energy Analysis of Multimedia Video Streaming on Mobile Devices. [Citation Graph (, )][DBLP ] Search in 0.311secs, Finished in 0.312secs