The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ching-Nung Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
    Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:433-447 [Conf]
  2. Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih
    Authorized Tracking and Tracing for RFID Tags. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:435-444 [Conf]
  3. Ching-Nung Yang, Tse-Shih Chen
    New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:19-28 [Conf]
  4. Ching-Nung Yang, Tse-Shih Chen
    New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation. [Citation Graph (0, 0)][DBLP]
    ICIAR, 2005, pp:1167-1174 [Conf]
  5. Ching-Nung Yang, Tse-Shih Chen
    Extended Visual Secret Sharing Schemes with High-Quality Shadow Images Using Gray Sub Pixels. [Citation Graph (0, 0)][DBLP]
    ICIAR, 2005, pp:1184-1191 [Conf]
  6. Ching-Nung Yang, Tse-Shih Chen
    Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions. [Citation Graph (0, 0)][DBLP]
    ICIAR (1), 2006, pp:468-479 [Conf]
  7. Ching-Nung Yang, Hsu-Tun Teng
    An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:45-48 [Conf]
  8. Ching-Nung Yang, Chi-Sung Laih
    New Colored Visual Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:20, n:3, pp:325-336 [Journal]
  9. Ching-Nung Yang, Chi-Sung Laih
    A Note on Error-Correcting Codes for Authentication and Subliminal Channels. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:62, n:3, pp:141-143 [Journal]
  10. Chen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang
    New Audio Secret Sharing Schemes With Time Division Technique. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2003, v:19, n:4, pp:605-614 [Journal]
  11. Ching-Nung Yang
    A Note on Efficient Color Visual Encryption. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:367-372 [Journal]
  12. Ching-Nung Yang
    Improvements on Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:381-391 [Journal]
  13. Ching-Nung Yang
    A Note on Efficient Color Visual Encryption. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:367-372 [Journal]
  14. Ching-Nung Yang
    Improvements on Audio and Optical Cryptography. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:381-391 [Journal]
  15. Ching-Nung Yang, Tse-Shih Chen
    Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2006, v:39, n:7, pp:1300-1314 [Journal]
  16. Ching-Nung Yang
    New visual secret sharing schemes using probabilistic method. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2004, v:25, n:4, pp:481-494 [Journal]
  17. Ching-Nung Yang, Tse-Shih Chen
    Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2005, v:26, n:2, pp:193-206 [Journal]
  18. Chi-Sung Laih, Ching-Nung Yang
    On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1996, v:45, n:1, pp:103-108 [Journal]
  19. Ching-Nung Yang, Dong-Jing Lee
    Some New Efficient Second-Order Spectral-Null Codes with Small Lookup Tables. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:7, pp:924-927 [Journal]
  20. Ching-Nung Yang, Chi-Sung Laih
    DCm Codes for Constructing t-EC/AUED Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:4, pp:492- [Journal]
  21. Ching-Nung Yang
    Design of efficient second-order spectral- codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:4, pp:1580-1584 [Journal]
  22. Ching-Nung Yang, Guo-Jau Chen
    A comment on "Systematic single asymmetric error-correcting Codes". [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:3, pp:1214-1217 [Journal]
  23. Ching-Nung Yang, Kun-Hsuan Yu, Rastislav Lukac
    User-Friendly Image Sharing in Multimedia Database Using Polynomials with Different Primes. [Citation Graph (0, 0)][DBLP]
    MMM (2), 2007, pp:443-452 [Conf]
  24. Ching-Nung Yang, Tse-Shih Chen, Kun-Hsuan Yu, Chung-Chun Wang
    Improvements of image sharing with steganography and authentication. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1070-1076 [Journal]

  25. An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. [Citation Graph (, )][DBLP]


  26. Micropayment schemes with ability to return changes. [Citation Graph (, )][DBLP]


  27. Improved tracing algorithm for random-error-resilient collusion-secure fingerprinting codes in P2P information systems. [Citation Graph (, )][DBLP]


  28. Visual Cryptography Schemes with Reversing. [Citation Graph (, )][DBLP]


Search in 0.047secs, Finished in 0.048secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002