The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Der-Chyuan Lou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chang-Tsun Li, Der-Chyuan Lou, Tsung-Hsu Chen
    Image Authentication and Integrity Verification via Content-Based Watermarks and a Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICIP, 2000, pp:- [Conf]
  2. Der-Chyuan Lou, Jiang-Lung Liu
    Steganographic Method for Secure Communications. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:5, pp:449-460 [Journal]
  3. Der-Chyuan Lou, Te-Lung Yin, Ming-Chang Chang
    An efficient steganographic approach. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2002, v:17, n:4/5, pp:281-291 [Journal]
  4. Der-Chyuan Lou, Chia-Long Wu, Chin-Yin Chen
    Fast exponentiation by folding the signed-digit exponent in half. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2003, v:80, n:10, pp:1251-1259 [Journal]
  5. Der-Chyuan Lou, Chia-Long Wu, Rong-yi Ou
    Application of Parallel Virtual Machine Framework to the Strong Prime Problem. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2002, v:79, n:7, pp:797-806 [Journal]
  6. Der-Chyuan Lou, Chia-Long Wu
    Parallel exponentiation using common-multiplicand-multiplication and signed-digit-folding techniques. [Citation Graph (0, 0)][DBLP]
    Int. J. Comput. Math., 2004, v:81, n:10, pp:1187-1202 [Journal]
  7. Der-Chyuan Lou, Jieh-Ming Shieh, Hao-Kuan Tso
    A robust buyer-seller watermarking scheme based on DWT. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2006, v:20, n:1, pp:79-90 [Journal]
  8. Tsorng-Lin Chia, Kuang-Bor Wang, Zen Chen, Der-Chyuan Lou
    Parallel distance transforms on a linear array architecture. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:82, n:2, pp:73-81 [Journal]
  9. Chin-Chen Chang, Der-Chyuan Lou, Tzong-Chen Wu
    A Binary Access Control Method Using Prime Factorization. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1997, v:96, n:1&2, pp:15-26 [Journal]
  10. Kuang-Bor Wang, Tsorng-Lin Chia, Zen Chen, Der-Chyuan Lou
    Parallel Execution of a Connected Component Labeling Operation on a Linear Array Architecture. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2003, v:19, n:2, pp:353-370 [Journal]
  11. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA). [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:2, pp:253-258 [Journal]
  12. Der-Chyuan Lou, Chin-Chen Chang
    An adaptive exponentiation method. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:42, n:1, pp:59-69 [Journal]
  13. Der-Chyuan Lou, Te-Lung Yin
    Spatial database with each picture self-contained multiscape and access control in a hierarchy. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:56, n:2, pp:153-163 [Journal]
  14. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    Erratum to "On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)" [The Journal of Systems and Software 79 (2006) 253-258]. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:12, pp:1789- [Journal]
  15. Der-Chyuan Lou, Chin-Chen Chang
    A Parallel Two-List Algorithm for the Knapsack Problem. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1997, v:22, n:14, pp:1985-1996 [Journal]
  16. Der-Chyuan Lou, Chia-Hung Sung
    A steganographic scheme for secure communications based on the chaos and euler Theorem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Multimedia, 2004, v:6, n:3, pp:501-509 [Journal]
  17. Der-Chyuan Lou, Jui-Chang Lai, Chia-Long Wu, Te-Jen Chang
    An efficient Montgomery exponentiation algorithm by using signed-digit-recoding and folding techniques. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2007, v:185, n:1, pp:31-44 [Journal]
  18. Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
    On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]
  19. Chia-Long Wu, Der-Chyuan Lou, Te-Jen Chang
    An Efficient Montgomery Exponentiation Algorithm for Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:3, pp:449-468 [Journal]
  20. Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Jen Chang
    Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2006, v:17, n:3, pp:445-462 [Journal]

  21. Fast Modular Multiplication for E-Commerce Cryptosystem. [Citation Graph (, )][DBLP]


  22. A Lossless Secret Image Sharing Method. [Citation Graph (, )][DBLP]


  23. An efficient Montgomery exponentiation algorithm for public-key cryptosystems. [Citation Graph (, )][DBLP]


  24. A robust watermarking scheme for digital image using self similarity. [Citation Graph (, )][DBLP]


  25. Dual-wrapped digital watermarking scheme for image copyright protection. [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002