The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chin-Laung Lei: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. E. Allen Emerson, Chin-Laung Lei
    Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract) [Citation Graph (1, 0)][DBLP]
    LICS, 1986, pp:267-278 [Conf]
  2. Chun-I Fan, Chin-Laung Lei
    A Multi-Recastable Ticket Scheme for Electronic Elections. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:116-124 [Conf]
  3. Wen-Shenq Juang, Chin-Laung Lei
    Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ASIAN, 1996, pp:172-181 [Conf]
  4. Alexander I-Chi Lai, Chin-Laung Lei
    Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting. [Citation Graph (0, 0)][DBLP]
    CANPC, 1998, pp:119-131 [Conf]
  5. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
    A distributed key assignment protocol for secure multicast based on proxy cryptography. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:359- [Conf]
  6. Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei
    Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:403-412 [Conf]
  7. Chi-Lan Chang, Yun-Peng Chiu, Chin-Laung Lei
    Automatic Generation of Conflict-Free IPsec Policies. [Citation Graph (0, 0)][DBLP]
    FORTE, 2005, pp:233-246 [Conf]
  8. Chun-I Fan, Chin-Laung Lei
    Secure Rewarding Schemes. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1997, pp:571-580 [Conf]
  9. Alexander I-Chi Lai, Chin-Laung Lei
    Data Prefetching for Distributed Shared Memory Systems. [Citation Graph (0, 0)][DBLP]
    HICSS (1), 1996, pp:102-110 [Conf]
  10. Pan-Lung Tsai, Chun-Ying Huang, Yun-Yin Huang, Chia-Chang Hsu, Chin-Laung Lei
    A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs. [Citation Graph (0, 0)][DBLP]
    HiPC, 2005, pp:432-443 [Conf]
  11. Pan-Lung Tsai, Chin-Laung Lei
    A Session Migration Scheme for Smart Web Services in Mobile Computing. [Citation Graph (0, 0)][DBLP]
    International Conference on Internet Computing, 2004, pp:846-852 [Conf]
  12. Hann-Huei Chiou, Alexander I-Chi Lai, Chin-Laung Lei
    Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:654-661 [Conf]
  13. Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
    Secure Multicast Using Proxy Encryption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:280-290 [Conf]
  14. Jiunn-Jye Lee, Chin-Laung Lei
    An On-Line Page-Structure Approximation Scheme for Web Proxies. [Citation Graph (0, 0)][DBLP]
    ICPADS (2), 2005, pp:669-673 [Conf]
  15. Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei
    The impact of network variabilities on TCP clocking schemes. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2005, pp:2770-2775 [Conf]
  16. Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen
    Competitive Analysis of On-Line Disk Scheduling. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1996, pp:356-365 [Conf]
  17. Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen
    Competitive Source Routing on Tori and Meshes. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1997, pp:82-91 [Conf]
  18. Alexander I-Chi Lai, Chin-Laung Lei
    A High Performance Dynamic Token-Based Distributed Synchronization Algorithm. [Citation Graph (0, 0)][DBLP]
    ISPAN, 1997, pp:150-156 [Conf]
  19. Kuan-Ta Chen, Chin-Laung Lei
    Design Implications of Social Interaction in Online Games. [Citation Graph (0, 0)][DBLP]
    ICEC, 2006, pp:318-321 [Conf]
  20. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann-Huei Chiou, Chin-Laung Lei
    Secure Content Delivery using Key Composition. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:484-485 [Conf]
  21. Kuan-Ta Chen, Chin-Laung Lei
    Network game design: hints and implications of player interaction. [Citation Graph (0, 0)][DBLP]
    NETGAMES, 2006, pp:17- [Conf]
  22. Kuan-Ta Chen, Polly Huang, Chun-Ying Huang, Chin-Laung Lei
    Game traffic analysis: an MMORPG perspective. [Citation Graph (0, 0)][DBLP]
    NOSSDAV, 2005, pp:19-24 [Conf]
  23. E. Allen Emerson, Chin-Laung Lei
    Modalities for Model Checking: Branching Time Strikes Back. [Citation Graph (0, 0)][DBLP]
    POPL, 1985, pp:84-96 [Conf]
  24. Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai
    An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:133-139 [Conf]
  25. Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei
    A Content-Protection Scheme for Multi-Layered Reselling Structure. [Citation Graph (0, 0)][DBLP]
    SEC, 2004, pp:339-350 [Conf]
  26. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei
    Quantifying Skype user satisfaction. [Citation Graph (0, 0)][DBLP]
    SIGCOMM, 2006, pp:399-410 [Conf]
  27. E. Allen Emerson, Chin-Laung Lei
    Temporal Reasoning Under Generalized Fairness Constraints. [Citation Graph (0, 0)][DBLP]
    STACS, 1986, pp:21-36 [Conf]
  28. Yu-Shian Chen, Chin-Laung Lei, Yun-Peng Chiu, Chun-Ying Huang
    Confessible Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:25- [Conf]
  29. Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, Chin-Laung Lei
    Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:7- [Conf]
  30. Jiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei
    Design and Implementation of Secure Communication Channels over UPnP Networks. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:307-312 [Conf]
  31. Ren-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei
    A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:313-318 [Conf]
  32. Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen
    Distributed and On-Line Routing on Tori. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2002, v:32, n:4, pp:562-593 [Journal]
  33. Horng-Twu Liaw, Chin-Laung Lei
    An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control. [Citation Graph (0, 0)][DBLP]
    BIT, 1993, v:33, n:1, pp:46-56 [Journal]
  34. Kuan-Ta Chen, Polly Huang, Chin-Laung Lei
    How sensitive are online gamers to network quality? [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:11, pp:34-38 [Journal]
  35. Chin-Laung Lei, Horng-Twu Liaw
    A parallel algorithm for finding congruent regions. [Citation Graph (0, 0)][DBLP]
    Computers & Graphics, 1992, v:16, n:3, pp:289-294 [Journal]
  36. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
    A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:6, pp:672-682 [Journal]
  37. Kuan-Ta Chen, Polly Huang, Chin-Laung Lei
    Game traffic analysis: An MMORPG perspective. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:16, pp:3002-3023 [Journal]
  38. Wen-Shenq Juang, Chin-Laung Lei, C.-Y. Chang
    Anonymous channel and authentication in wireless communications. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:15-16, pp:1502-1511 [Journal]
  39. Pan-Lung Tsai, Chin-Laung Lei
    Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:16, pp:3170-3181 [Journal]
  40. Wen-Shenq Juang, Chin-Laung Lei
    A collision-free secret ballot protocol for computerized general elections. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:4, pp:339-348 [Journal]
  41. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw
    Fair blind threshold signatures based on discrete logarithm. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:6, pp:371-379 [Journal]
  42. Chun-I Fan, Chin-Laung Lei
    A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:47-58 [Journal]
  43. Chin-Laung Lei, Wen-Shenq Juang, Pei-Ling Yu
    Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:23-39 [Journal]
  44. Chin-Laung Lei, Horng-Twu Liaw
    Efficient Parallel Algorithms for Finding the Majority Element. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1993, v:9, n:2, pp:319-334 [Journal]
  45. Yuen-Chang Sun, Ming-Lin Kao, Chin-Laung Lei
    A Fully Distributed Approach to Repositories of Reusable Software Components. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:1, pp:147-158 [Journal]
  46. Tzuoo-Hawn Yeh, Cheng-Ming Kuo, Chin-Laung Lei, Hsu-Chun Yen
    Competitive Analysis of On-Line Disk Scheduling. [Citation Graph (0, 0)][DBLP]
    Theory Comput. Syst., 1998, v:31, n:5, pp:491-506 [Journal]
  47. E. Allen Emerson, Chin-Laung Lei
    Modalities for Model Checking: Branching Time Logic Strikes Back. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1987, v:8, n:3, pp:275-306 [Journal]
  48. Chin-Laung Lei, Pei-Ling Yu, Pan-Lung Tsai, Ming-Hwa Chan
    An efficient and anonymous buyer-seller watermarking protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2004, v:13, n:12, pp:1618-1626 [Journal]
  49. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, Chin-Laung Lei
    An empirical evaluation of TCP performance in online games. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2006, pp:5- [Conf]
  50. Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-hua Chu, Chin-Laung Lei, Wen-Chin Chen
    Identifying MMORPG bots: a traffic analysis approach. [Citation Graph (0, 0)][DBLP]
    Advances in Computer Entertainment Technology, 2006, pp:4- [Conf]
  51. Chun-Ying Huang, Chin-Laung Lei
    Bounding Peer-to-Peer Upload Traffic in Client Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:759-769 [Conf]
  52. Kuan-Ta Chen, Polly Huang, Guo-Shiuan Wang, Chun-Ying Huang, Chin-Laung Lei
    On the Sensitivity of Online Game Playing Time to Network QoS. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  53. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei
    Secure multicast in dynamic environments. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:10, pp:2805-2817 [Journal]
  54. Chun-I Fan, Chin-Laung Lei
    An unlinkably divisible and intention attachable ticket scheme for runoff elections. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2002, v:25, n:2, pp:93-107 [Journal]

  55. An Anonymous and Deniable Conversation for a Thin Client. [Citation Graph (, )][DBLP]


  56. Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters. [Citation Graph (, )][DBLP]


  57. A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. [Citation Graph (, )][DBLP]


  58. Peer-to-Peer Application Recognition Based on Signaling Activity. [Citation Graph (, )][DBLP]


  59. A crowdsourceable QoE evaluation framework for multimedia content. [Citation Graph (, )][DBLP]


  60. An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger. [Citation Graph (, )][DBLP]


  61. A prevention approach to scrambling attacks in WiMAX networks. [Citation Graph (, )][DBLP]


  62. Inferring Speech Activity from Encrypted Skype Traffic. [Citation Graph (, )][DBLP]


  63. Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks. [Citation Graph (, )][DBLP]


  64. Detecting VoIP Traffic Based on Human Conversation Patterns. [Citation Graph (, )][DBLP]


  65. A sector-based routing model over structured peer-to-peer networks. [Citation Graph (, )][DBLP]


  66. A location-ID sensitive key establishment scheme in static wireless sensor networks. [Citation Graph (, )][DBLP]


  67. Filtering False Messages En-Route in Wireless Multi-Hop Networks. [Citation Graph (, )][DBLP]


  68. What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.456secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002