|
Search the dblp DataBase
Chin-Ling Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chin-Ling Chen
DiffServ Operational Model. [Citation Graph (0, 0)][DBLP] LCN, 2002, pp:353-362 [Conf]
- Chin-Ling Chen, Jia-Chun Yu
Supporting Rate-based Control in DiffServ Networks. [Citation Graph (0, 0)][DBLP] NCA, 2005, pp:67-72 [Conf]
- Chin-Ling Chen, Ruay Shiung Chang
A Distributed Load Balancing Algorithm Based on Spanning Trees. [Citation Graph (0, 0)][DBLP] PPSC, 1995, pp:639-640 [Conf]
- Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
A fair and secure mobile billing system. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:4, pp:517-524 [Journal]
- Ruay Shiung Chang, Kung-Joi Pai, Chin-Ling Chen
Design of a multiple leaky buckets shaper. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:13, pp:1307-1318 [Journal]
- Chin-Ling Chen, Ruay Shiung Chang
A new dynamic bandwidth allocation scheme for MPEG videos in ATM networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:16, pp:1505-1513 [Journal]
- Chin-Ling Chen, Ruay Shiung Chang
Dynamic priority transmission mechanism for DQDB. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:5, pp:483-490 [Journal]
- Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
The design of a secure anonymous Internet voting system. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:4, pp:330-337 [Journal]
- Chin-Ling Chen, Chih-Cheng Chen, Ling-Chun Liu, Gwoboa Horng
A server-aided signature scheme for mobile commerce. [Citation Graph (0, 0)][DBLP] IWCMC, 2007, pp:565-570 [Conf]
- Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan
A Secure Authentication Scheme for a Public Terminal Before a Transaction. [Citation Graph (0, 0)][DBLP] NBiS, 2007, pp:118-126 [Conf]
A Framework Supporting User-Specific Services in RFID Systems. [Citation Graph (, )][DBLP]
Performance of a data gather scheme with novel chain construction for wireless sensor networks. [Citation Graph (, )][DBLP]
A spare two-tier data aggregation for grid-based wireless sensor networks. [Citation Graph (, )][DBLP]
Using Mobile Device to Design a Secure Transaction. [Citation Graph (, )][DBLP]
A traceable E-cash transfer system against blackmail via subliminal channel. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|