Search the dblp DataBase
Chi-Sung Laih :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yung-Cheng Lee , Chi-Sung Laih On the Key Recovery of the Key Escrow System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:216-220 [Conf ] Chi-Sung Laih , Lein Harn Generalized Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:159-166 [Conf ] Chi-Sung Laih , Sung-Ming Yen Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:219-230 [Conf ] Chi-Sung Laih , Sung-Ming Yen , Lein Harn Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:450-459 [Conf ] Tsutomu Matsumoto , Hideki Imai , Chi-Sung Laih , Sung-Ming Yen On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:296-307 [Conf ] Hung-Min Sun , Wu-Chuan Yang , Chi-Sung Laih On the Design of RSA with Short Secret Exponent. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:150-164 [Conf ] Sung-Ming Yen , Chi-Sung Laih The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:447-456 [Conf ] Chi-Sung Laih , Wen-Chung Kuo Cryptanalysis of the Enhanced ElGamal's Signature Scheme. [Citation Graph (0, 0)][DBLP ] Cryptography: Policy and Algorithms, 1995, pp:228-231 [Conf ] Chi-Sung Laih , Lein Harn , Jau-Yien Lee , Tzonelih Hwang Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:286-298 [Conf ] Shee-Yau Wu , Shih-Chuan Lu , Chi-Sung Laih Design of AES Based on Dual Cipher and Composite Field. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:25-38 [Conf ] Ming-Yang Chen , Ching-Nung Yang , Chi-Sung Laih Authorized Tracking and Tracing for RFID Tags. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:435-444 [Conf ] Chi-Sung Laih , Chun-Ju Fu , Wen-Chung Kuo Design a Secure and Practical Metering Scheme. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2006, pp:443-447 [Conf ] Lein Harn , David Huang , Chi-Sung Laih Password Authentication Based On Public-Key Distribution Cryptosystem. [Citation Graph (0, 1)][DBLP ] ICDE, 1989, pp:332-338 [Conf ] Chi-Sung Laih , Fu-Kuan Tu Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:167-0 [Conf ] Chi-Sung Laih , Jau-Yien Lee , Lein Harn , Chin-Hsing Chen A New Scheme for ID-Based Cryptosystems and Signature. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1989, pp:998-1002 [Conf ] Chi-Sung Laih , Sung-Ming Yen On the Design of Conference Key Distribution Systems for the Broadcasting Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1993, pp:1406-1413 [Conf ] Wu-Chuan Yang , Dah-Jyh Guan , Chi-Sung Laih Fast Multi-computations with Integer Similarity Strategy. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:138-153 [Conf ] P. T. Chen , C. S. Laih , Fabien Pouget , Marc Dacier Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:120-134 [Conf ] I-Chuan Chang Bor-Wen Hsu , Chi-Sung Laih A DCT Quantization-Based Image Authentication System for Digital Forensics. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:223-235 [Conf ] Chin-Chen Chang , Tzong-Chen Wu , Chi-Sung Laih Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:1, pp:45-47 [Journal ] Chen-Chi Lin , Chi-Sung Laih The GPKI developing status of Taiwan and some major Asia countries. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2003, v:26, n:16, pp:1884-1892 [Journal ] Chi-Sung Laih , Wen-Hong Chiou , Chin-Chen Chang Authentication and protection of public keys. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:7, pp:581-585 [Journal ] Shyh-Yih Wang , Chi-Sung Laih Cryptanalyses of two key assignment schemes based on polynomial interpolations. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:2, pp:134-138 [Journal ] Ching-Nung Yang , Chi-Sung Laih New Colored Visual Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2000, v:20, n:3, pp:325-336 [Journal ] Chi-Sung Laih , K. Y. Chen Generating visible RSA public keys for PKI. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:2, pp:103-109 [Journal ] Chi-Sung Laih , Shin Yan Chiou Cryptanalysis of an optimized protocol for mobile network authentication and security. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2003, v:85, n:6, pp:339-341 [Journal ] Chi-Sung Laih , Fu-Kuan Tu , Wen-Chung Tai On the Security of the Lucas Function. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:53, n:5, pp:243-247 [Journal ] Ching-Nung Yang , Chi-Sung Laih A Note on Error-Correcting Codes for Authentication and Subliminal Channels. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:62, n:3, pp:141-143 [Journal ] Wen-Chung Kuo , Chi-Sung Laih , M. J. Gau On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1999, v:15, n:5, pp:701-713 [Journal ] Chi-Sung Laih Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1992, v:8, n:4, pp:633-640 [Journal ] Chi-Sung Laih , Sung-Ming Yen Multi-Signature for Specified Group of Verifiers. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1996, v:12, n:1, pp:143-152 [Journal ] Chen-Chi Lin , Chi-Sung Laih , Ching-Nung Yang New Audio Secret Sharing Schemes With Time Division Technique. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2003, v:19, n:4, pp:605-614 [Journal ] Hung-Min Sun , Wu-Chuan Yang , Chi-Sung Laih On the Design of RSA With Short Secret Exponent. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:1, pp:1-18 [Journal ] Shyh-Yih Wang , Chi-Sung Laih Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2005, v:75, n:1-2, pp:189-192 [Journal ] Chi-Sung Laih , M. J. Gau Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1997, v:46, n:4, pp:511- [Journal ] Chi-Sung Laih , Ching-Nung Yang On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1996, v:45, n:1, pp:103-108 [Journal ] Ching-Nung Yang , Chi-Sung Laih DCm Codes for Constructing t -EC/AUED Codes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1998, v:47, n:4, pp:492- [Journal ] Sung-Ming Yen , Chi-Sung Laih Improved Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:5, pp:729-730 [Journal ] Sung-Ming Yen , Chi-Sung Laih Improved Digital Signature Suitable for Batch Verification. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:7, pp:957-959 [Journal ] Wu-Chuan Yang , D. J. Guan , Chi-Sung Laih Fast Multicomputation with Asynchronous Strategy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:2, pp:234-242 [Journal ] Shyh-Yih Wang , Chi-Sung Laih Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:91-100 [Journal ] Chi-Sung Laih , Lein Harn , Jau-Yien Lee On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:9, pp:1135-1137 [Journal ] Defending On-Line Web Application Security with User-Behavior Surveillance. [Citation Graph (, )][DBLP ] The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan. [Citation Graph (, )][DBLP ] Malicious Webpage Detection by Semantics-Aware Reasoning. [Citation Graph (, )][DBLP ] Generating Attack Scenarios with Causal Relationship. [Citation Graph (, )][DBLP ] A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. [Citation Graph (, )][DBLP ] Search in 0.044secs, Finished in 0.046secs