The SCEAS System
Navigation Menu

Search the dblp DataBase


Chu-Hsing Lin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chu-Hsing Lin, Ching-Te Wang, Chin-Chen Chang
    A group-oriented (t, n) undeniable signature scheme without trusted center. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:266-274 [Conf]
  2. Chin-Chen Chang, Ying-Tse Kuo, Chu-Hsing Lin
    Fast Algorithms for Common-Multiplicand Multiplication and Exponentiation by Performing Complements. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:807-811 [Conf]
  3. Chin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang
    Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:31-34 [Conf]
  4. Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen
    Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:261-264 [Conf]
  5. Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
    An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:249-252 [Conf]
  6. Chu-Hsing Lin, Wei Lee
    Efficient Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:123-126 [Conf]
  7. Chu-Hsing Lin, Hsiu-Hsia Li
    Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:135-138 [Conf]
  8. Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
    Dynamic Key Generations for Secret Sharing in Access Structures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:127-130 [Conf]
  9. Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
    An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:399-402 [Conf]
  10. Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
    Using IC Cards to Remotely Login Passwords without Verification Tables. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:321-326 [Conf]
  11. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Signature Schemes Based on Two Hard Problems Simultaneously. [Citation Graph (0, 0)][DBLP]
    AINA, 2003, pp:557-560 [Conf]
  12. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Supervising Secret-Key Agreements in a Level-Based Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:309-314 [Conf]
  13. Chu-Hsing Lin, Yi-Yi Lai
    A fingerprint-based user authentication scheme for multimedia systems. [Citation Graph (0, 0)][DBLP]
    ICME, 2004, pp:935-938 [Conf]
  14. Jue-Sam Chou, Chu-Hsing Lin, Ting-Ying Lee
    A Novel Hierarchical Key Management Scheme Based on Quadratic Residues. [Citation Graph (0, 0)][DBLP]
    ISPA, 2004, pp:858-865 [Conf]
  15. Chu-Hsing Lin, Chen-Yu Lee
    A Software Protection System for Internet Commerce. [Citation Graph (0, 0)][DBLP]
    IEEE Pacific Rim Conference on Multimedia, 2002, pp:1033-1040 [Conf]
  16. Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin
    An improvement of an efficient user identification scheme based on ID-based cryptosystem. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:558-561 [Conf]
  17. Chin-Chen Chang, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang
    A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:816-825 [Conf]
  18. Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao
    Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:120-125 [Conf]
  19. Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
    A Conference Key Distribution Scheme Using Interpolating Polynomials. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:963-967 [Conf]
  20. Chin-Chen Chang, Chu-Hsing Lin
    A Reciprocal Confluence Tree Unit and Its Applications. [Citation Graph (0, 0)][DBLP]
    BIT, 1990, v:30, n:1, pp:27-33 [Journal]
  21. Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee
    A Record-Oriented Cryptosystem for Database Sharing (Short Note). [Citation Graph (0, 0)][DBLP]
    Comput. J., 1992, v:35, n:6, pp:658-660 [Journal]
  22. Chu-Hsing Lin
    Dynamic key management schemes for access control in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:15, pp:1381-1385 [Journal]
  23. Chu-Hsing Lin, Chin-Chen Chang
    Method for constructing a group-oriented cipher system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1994, v:17, n:11, pp:805-808 [Journal]
  24. Ching-Te Wang, Chu-Hsing Lin, Chin-Chen Chang
    Threshold signature schemes with traceable signers in group communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1998, v:21, n:8, pp:771-776 [Journal]
  25. Chu-Hsing Lin
    Hierarchical key assignment without public-key cryptography. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2001, v:20, n:7, pp:612-619 [Journal]
  26. Chu-Hsing Lin, Tien-Chi Lee
    A confused document encrypting scheme and its implementation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1998, v:17, n:6, pp:543-551 [Journal]
  27. Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
    A New Micro-Payment System Using General Payword Chain. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2002, v:2, n:1-2, pp:159-168 [Journal]
  28. Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee
    A conference key broadcasting system using sealed locks. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1992, v:17, n:4, pp:323-328 [Journal]
  29. Chu-Hsing Lin, Chin-Chen Chang, Tzong-Chen Wu, Richard C. T. Lee
    Password authentication using Newton's interpolating polynomials. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1991, v:16, n:1, pp:97-102 [Journal]
  30. Chin-Chen Chang, Chu-Hsing Lin, Richard C. T. Lee
    Hierarchy representations based on arithmetic coding for dynamic information protection systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1992, v:64, n:1-2, pp:35-48 [Journal]
  31. Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan
    One-Way Hash Functions With Changeable Parameters. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:118, n:1-4, pp:223-239 [Journal]
  32. Chu-Hsing Lin, Richard C. T. Lee, Chin-Chen Chang
    A Dynamic Access Control Mechanism in Information Protection Systems. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1990, v:6, n:1, pp:25-35 [Journal]
  33. Yi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang
    Dynamic GOST. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2000, v:16, n:6, pp:857-861 [Journal]
  34. Chu-Hsing Lin, Chin-Chen Chang, Richard C. T. Lee
    New Public-Key Cipher System Based Upon the Diophantine Equations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:1, pp:13-19 [Journal]
  35. Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo, Jen-Chieh Chang
    Robust Multi-scale Full-Band Image Watermarking for Copyright Protection. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2007, pp:176-184 [Conf]

  36. Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks. [Citation Graph (, )][DBLP]

  37. Detection Method Based on Reverse Proxy against Web Flooding Attacks. [Citation Graph (, )][DBLP]

  38. Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks. [Citation Graph (, )][DBLP]

  39. On the Security of the Full-Band Image Watermark for Copyright Protection. [Citation Graph (, )][DBLP]

  40. A Robust Watermark Scheme for Copyright Protection. [Citation Graph (, )][DBLP]

  41. Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. [Citation Graph (, )][DBLP]

  42. Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. [Citation Graph (, )][DBLP]

  43. I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]

  44. Binary Documents Recovery Based on Skeleton Extraction. [Citation Graph (, )][DBLP]

  45. On the security of ID-based password authentication scheme using smart cards and fingerprints. [Citation Graph (, )][DBLP]

  46. Energy efficiency measurement for multimedia audio decoding on embedded systems. [Citation Graph (, )][DBLP]

  47. Counteract SYN flooding using second chance packet filtering. [Citation Graph (, )][DBLP]

  48. Access Log Generator for Analyzing Malicious Website Browsing Behaviors. [Citation Graph (, )][DBLP]

  49. Safeguard Intranet Using Embedded and Distributed Firewall System. [Citation Graph (, )][DBLP]

  50. Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET. [Citation Graph (, )][DBLP]

  51. Energy Analysis of Multimedia Video Streaming on Mobile Devices. [Citation Graph (, )][DBLP]

Search in 0.017secs, Finished in 0.020secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002