The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chi-Sung Laih: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yung-Cheng Lee, Chi-Sung Laih
    On the Key Recovery of the Key Escrow System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:216-220 [Conf]
  2. Chi-Sung Laih, Lein Harn
    Generalized Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:159-166 [Conf]
  3. Chi-Sung Laih, Sung-Ming Yen
    Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:219-230 [Conf]
  4. Chi-Sung Laih, Sung-Ming Yen, Lein Harn
    Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:450-459 [Conf]
  5. Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
    On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:296-307 [Conf]
  6. Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih
    On the Design of RSA with Short Secret Exponent. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:150-164 [Conf]
  7. Sung-Ming Yen, Chi-Sung Laih
    The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:447-456 [Conf]
  8. Chi-Sung Laih, Wen-Chung Kuo
    Cryptanalysis of the Enhanced ElGamal's Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:228-231 [Conf]
  9. Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang
    Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:286-298 [Conf]
  10. Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih
    Design of AES Based on Dual Cipher and Composite Field. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:25-38 [Conf]
  11. Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih
    Authorized Tracking and Tracing for RFID Tags. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:435-444 [Conf]
  12. Chi-Sung Laih, Chun-Ju Fu, Wen-Chung Kuo
    Design a Secure and Practical Metering Scheme. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2006, pp:443-447 [Conf]
  13. Lein Harn, David Huang, Chi-Sung Laih
    Password Authentication Based On Public-Key Distribution Cryptosystem. [Citation Graph (0, 1)][DBLP]
    ICDE, 1989, pp:332-338 [Conf]
  14. Chi-Sung Laih, Fu-Kuan Tu
    Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:167-0 [Conf]
  15. Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen
    A New Scheme for ID-Based Cryptosystems and Signature. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1989, pp:998-1002 [Conf]
  16. Chi-Sung Laih, Sung-Ming Yen
    On the Design of Conference Key Distribution Systems for the Broadcasting Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1993, pp:1406-1413 [Conf]
  17. Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih
    Fast Multi-computations with Integer Similarity Strategy. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:138-153 [Conf]
  18. P. T. Chen, C. S. Laih, Fabien Pouget, Marc Dacier
    Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:120-134 [Conf]
  19. I-Chuan Chang Bor-Wen Hsu, Chi-Sung Laih
    A DCT Quantization-Based Image Authentication System for Digital Forensics. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:223-235 [Conf]
  20. Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih
    Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:1, pp:45-47 [Journal]
  21. Chen-Chi Lin, Chi-Sung Laih
    The GPKI developing status of Taiwan and some major Asia countries. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1884-1892 [Journal]
  22. Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang
    Authentication and protection of public keys. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:581-585 [Journal]
  23. Shyh-Yih Wang, Chi-Sung Laih
    Cryptanalyses of two key assignment schemes based on polynomial interpolations. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:2, pp:134-138 [Journal]
  24. Ching-Nung Yang, Chi-Sung Laih
    New Colored Visual Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:20, n:3, pp:325-336 [Journal]
  25. Chi-Sung Laih, K. Y. Chen
    Generating visible RSA public keys for PKI. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:103-109 [Journal]
  26. Chi-Sung Laih, Shin Yan Chiou
    Cryptanalysis of an optimized protocol for mobile network authentication and security. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:85, n:6, pp:339-341 [Journal]
  27. Chi-Sung Laih, Fu-Kuan Tu, Wen-Chung Tai
    On the Security of the Lucas Function. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:53, n:5, pp:243-247 [Journal]
  28. Ching-Nung Yang, Chi-Sung Laih
    A Note on Error-Correcting Codes for Authentication and Subliminal Channels. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:62, n:3, pp:141-143 [Journal]
  29. Wen-Chung Kuo, Chi-Sung Laih, M. J. Gau
    On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1999, v:15, n:5, pp:701-713 [Journal]
  30. Chi-Sung Laih
    Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1992, v:8, n:4, pp:633-640 [Journal]
  31. Chi-Sung Laih, Sung-Ming Yen
    Multi-Signature for Specified Group of Verifiers. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1996, v:12, n:1, pp:143-152 [Journal]
  32. Chen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang
    New Audio Secret Sharing Schemes With Time Division Technique. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2003, v:19, n:4, pp:605-614 [Journal]
  33. Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih
    On the Design of RSA With Short Secret Exponent. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:1-18 [Journal]
  34. Shyh-Yih Wang, Chi-Sung Laih
    Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:189-192 [Journal]
  35. Chi-Sung Laih, M. J. Gau
    Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1997, v:46, n:4, pp:511- [Journal]
  36. Chi-Sung Laih, Ching-Nung Yang
    On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1996, v:45, n:1, pp:103-108 [Journal]
  37. Ching-Nung Yang, Chi-Sung Laih
    DCm Codes for Constructing t-EC/AUED Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1998, v:47, n:4, pp:492- [Journal]
  38. Sung-Ming Yen, Chi-Sung Laih
    Improved Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:5, pp:729-730 [Journal]
  39. Sung-Ming Yen, Chi-Sung Laih
    Improved Digital Signature Suitable for Batch Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:7, pp:957-959 [Journal]
  40. Wu-Chuan Yang, D. J. Guan, Chi-Sung Laih
    Fast Multicomputation with Asynchronous Strategy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:2, pp:234-242 [Journal]
  41. Shyh-Yih Wang, Chi-Sung Laih
    Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:1, pp:91-100 [Journal]
  42. Chi-Sung Laih, Lein Harn, Jau-Yien Lee
    On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:9, pp:1135-1137 [Journal]

  43. Defending On-Line Web Application Security with User-Behavior Surveillance. [Citation Graph (, )][DBLP]


  44. The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan. [Citation Graph (, )][DBLP]


  45. Malicious Webpage Detection by Semantics-Aware Reasoning. [Citation Graph (, )][DBLP]


  46. Generating Attack Scenarios with Causal Relationship. [Citation Graph (, )][DBLP]


  47. A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. [Citation Graph (, )][DBLP]


Search in 0.058secs, Finished in 0.060secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002