The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chin-Ling Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chin-Ling Chen
    DiffServ Operational Model. [Citation Graph (0, 0)][DBLP]
    LCN, 2002, pp:353-362 [Conf]
  2. Chin-Ling Chen, Jia-Chun Yu
    Supporting Rate-based Control in DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:67-72 [Conf]
  3. Chin-Ling Chen, Ruay Shiung Chang
    A Distributed Load Balancing Algorithm Based on Spanning Trees. [Citation Graph (0, 0)][DBLP]
    PPSC, 1995, pp:639-640 [Conf]
  4. Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
    A fair and secure mobile billing system. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:4, pp:517-524 [Journal]
  5. Ruay Shiung Chang, Kung-Joi Pai, Chin-Ling Chen
    Design of a multiple leaky buckets shaper. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:13, pp:1307-1318 [Journal]
  6. Chin-Ling Chen, Ruay Shiung Chang
    A new dynamic bandwidth allocation scheme for MPEG videos in ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:16, pp:1505-1513 [Journal]
  7. Chin-Ling Chen, Ruay Shiung Chang
    Dynamic priority transmission mechanism for DQDB. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:5, pp:483-490 [Journal]
  8. Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
    The design of a secure anonymous Internet voting system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:4, pp:330-337 [Journal]
  9. Chin-Ling Chen, Chih-Cheng Chen, Ling-Chun Liu, Gwoboa Horng
    A server-aided signature scheme for mobile commerce. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:565-570 [Conf]
  10. Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan
    A Secure Authentication Scheme for a Public Terminal Before a Transaction. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:118-126 [Conf]

  11. A Framework Supporting User-Specific Services in RFID Systems. [Citation Graph (, )][DBLP]


  12. Performance of a data gather scheme with novel chain construction for wireless sensor networks. [Citation Graph (, )][DBLP]


  13. A spare two-tier data aggregation for grid-based wireless sensor networks. [Citation Graph (, )][DBLP]


  14. Using Mobile Device to Design a Secure Transaction. [Citation Graph (, )][DBLP]


  15. A traceable E-cash transfer system against blackmail via subliminal channel. [Citation Graph (, )][DBLP]


Search in 0.036secs, Finished in 0.036secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002