The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Iuon-Chang Lin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai
    A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:133-138 [Conf]
  2. Chin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang
    A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:376-379 [Conf]
  3. Iuon-Chang Lin, Chin-Chen Chang
    An Efficient Fault-Tolerant Digital Signature Scheme Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ATC, 2006, pp:601-610 [Conf]
  4. Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang
    Security Enhancement for the "Simple Authentication Key Agreement Algorithm". [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:113-115 [Conf]
  5. Chin-Chen Chang, Iuon-Chang Lin
    Cryptanalysis of the Improved User Efficient Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:42-46 [Conf]
  6. Chin-Chen Chang, Iuon-Chang Lin, Timothy K. Shih
    An Efficient Edge Detection Technique for Chinese Calligraphy. [Citation Graph (0, 0)][DBLP]
    JCIS, 2002, pp:960-963 [Conf]
  7. Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang
    A Secure and Efficient Scheme for Authenticating Remote Users using Smart Card. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  8. Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang
    An Improvement on Secure E-mail Protocols Providing Perfect Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  9. Iuon-Chang Lin, Chin-Chen Chang
    A (t, n) Threshold Secret Sharing System with Efficient Identification of Cheaters. [Citation Graph (0, 0)][DBLP]
    Computers and Artificial Intelligence, 2005, v:24, n:5, pp:- [Journal]
  10. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang
    The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:1, pp:53-67 [Journal]
  11. Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin
    Adding timestamps to the secure electronic auction protocol. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:40, n:2, pp:155-162 [Journal]
  12. Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang
    A new key assignment scheme for enforcing complicated access control policies in hierarchy. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2003, v:19, n:4, pp:457-462 [Journal]
  13. Iuon-Chang Lin, Min-Shiang Hwang, Li-Hua Li
    A new remote user authentication scheme for multi-server architecture. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2003, v:19, n:1, pp:13-22 [Journal]
  14. Ching-Yun Chang, Iuon-Chang Lin
    An Efficient Progressive Image Transmission Scheme for Chinese Calligraphy. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 2006, v:20, n:7, pp:1077-1092 [Journal]
  15. Min-Shiang Hwang, Iuon-Chang Lin, Eric Jui-Lin Lu
    A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2000, v:11, n:2, pp:137-144 [Journal]
  16. Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang
    Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2000, v:11, n:1, pp:15-19 [Journal]
  17. Chin-Chen Chang, Iuon-Chang Lin
    Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:1, pp:37-44 [Journal]
  18. Min-Shiang Hwang, Iuon-Chang Lin, Li-Hua Li
    A simple micro-payment scheme. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:221-229 [Journal]
  19. Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang
    A user authentication system using back-propagation network. [Citation Graph (0, 0)][DBLP]
    Neural Computing and Applications, 2005, v:14, n:3, pp:243-249 [Journal]
  20. Chin-Chen Chang, Iuon-Chang Lin
    Novel full-search schemes for speeding up image coding using vector quantization. [Citation Graph (0, 0)][DBLP]
    Real-Time Imaging, 2004, v:10, n:2, pp:95-102 [Journal]
  21. Chin-Chen Chang, Iuon-Chang Lin
    An improvement of delegated multisignature scheme with document decomposition. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:52-57 [Journal]
  22. Chin-Chen Chang, Iuon-Chang Lin
    Remarks on fingerprint-based remote user authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:91-96 [Journal]
  23. Min-Shiang Hwang, Eric Jui-Lin Lu, Iuon-Chang Lin
    A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:6, pp:1552-1560 [Journal]
  24. Chin-Chen Chang, Timothy K. Shih, Iuon-Chang Lin
    Guessing by neighbors: an efficient reconstruction method for transmitting image progressively. [Citation Graph (0, 0)][DBLP]
    The Visual Computer, 2003, v:19, n:5, pp:342-353 [Journal]
  25. Chin-Chen Chang, Iuon-Chang Lin
    A new solution for assigning cryptographic keys to control access in mobile agent environments. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:137-146 [Journal]
  26. Iuon-Chang Lin, Chin-Chen Chang
    Security enhancement for digital signature schemes with fault tolerance in RSA. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:19, pp:4031-4039 [Journal]

  27. Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. [Citation Graph (, )][DBLP]


  28. An Efficient Mutual Authentication Protocol for RFID Systems. [Citation Graph (, )][DBLP]


  29. A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. [Citation Graph (, )][DBLP]


  30. Halftone image resampling by interpolation and error-diffusion. [Citation Graph (, )][DBLP]


  31. A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]


  32. A new steganographic method for color and grayscale image hiding. [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.016secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002