Search the dblp DataBase
Chin-Laung Lei :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
E. Allen Emerson , Chin-Laung Lei Efficient Model Checking in Fragments of the Propositional Mu-Calculus (Extended Abstract) [Citation Graph (1, 0)][DBLP ] LICS, 1986, pp:267-278 [Conf ] Chun-I Fan , Chin-Laung Lei A Multi-Recastable Ticket Scheme for Electronic Elections. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:116-124 [Conf ] Wen-Shenq Juang , Chin-Laung Lei Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP ] ASIAN, 1996, pp:172-181 [Conf ] Alexander I-Chi Lai , Chin-Laung Lei Improving Dynamic Token-Based Distributed Synchronization Performance via Optimistic Broadcasting. [Citation Graph (0, 0)][DBLP ] CANPC, 1998, pp:119-131 [Conf ] Chun-Ying Huang , Yun-Peng Chiu , Kuan-Ta Chen , Chin-Laung Lei A distributed key assignment protocol for secure multicast based on proxy cryptography. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:359- [Conf ] Chun-Ying Huang , Kuan-Ta Chen , Chin-Laung Lei Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. [Citation Graph (0, 0)][DBLP ] DSN, 2006, pp:403-412 [Conf ] Chi-Lan Chang , Yun-Peng Chiu , Chin-Laung Lei Automatic Generation of Conflict-Free IPsec Policies. [Citation Graph (0, 0)][DBLP ] FORTE, 2005, pp:233-246 [Conf ] Chun-I Fan , Chin-Laung Lei Secure Rewarding Schemes. [Citation Graph (0, 0)][DBLP ] HICSS (3), 1997, pp:571-580 [Conf ] Alexander I-Chi Lai , Chin-Laung Lei Data Prefetching for Distributed Shared Memory Systems. [Citation Graph (0, 0)][DBLP ] HICSS (1), 1996, pp:102-110 [Conf ] Pan-Lung Tsai , Chun-Ying Huang , Yun-Yin Huang , Chia-Chang Hsu , Chin-Laung Lei A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec VPNs. [Citation Graph (0, 0)][DBLP ] HiPC, 2005, pp:432-443 [Conf ] Pan-Lung Tsai , Chin-Laung Lei A Session Migration Scheme for Smart Web Services in Mobile Computing. [Citation Graph (0, 0)][DBLP ] International Conference on Internet Computing, 2004, pp:846-852 [Conf ] Hann-Huei Chiou , Alexander I-Chi Lai , Chin-Laung Lei Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICDCS, 2000, pp:654-661 [Conf ] Yun-Peng Chiu , Chin-Laung Lei , Chun-Ying Huang Secure Multicast Using Proxy Encryption. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:280-290 [Conf ] Jiunn-Jye Lee , Chin-Laung Lei An On-Line Page-Structure Approximation Scheme for Web Proxies. [Citation Graph (0, 0)][DBLP ] ICPADS (2), 2005, pp:669-673 [Conf ] Kuan-Ta Chen , Polly Huang , Chun-Ying Huang , Chin-Laung Lei The impact of network variabilities on TCP clocking schemes. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2005, pp:2770-2775 [Conf ] Tzuoo-Hawn Yeh , Cheng-Ming Kuo , Chin-Laung Lei , Hsu-Chun Yen Competitive Analysis of On-Line Disk Scheduling. [Citation Graph (0, 0)][DBLP ] ISAAC, 1996, pp:356-365 [Conf ] Tzuoo-Hawn Yeh , Cheng-Ming Kuo , Chin-Laung Lei , Hsu-Chun Yen Competitive Source Routing on Tori and Meshes. [Citation Graph (0, 0)][DBLP ] ISAAC, 1997, pp:82-91 [Conf ] Alexander I-Chi Lai , Chin-Laung Lei A High Performance Dynamic Token-Based Distributed Synchronization Algorithm. [Citation Graph (0, 0)][DBLP ] ISPAN, 1997, pp:150-156 [Conf ] Kuan-Ta Chen , Chin-Laung Lei Design Implications of Social Interaction in Online Games. [Citation Graph (0, 0)][DBLP ] ICEC, 2006, pp:318-321 [Conf ] Chun-Ying Huang , Yun-Peng Chiu , Kuan-Ta Chen , Hann-Huei Chiou , Chin-Laung Lei Secure Content Delivery using Key Composition. [Citation Graph (0, 0)][DBLP ] LCN, 2005, pp:484-485 [Conf ] Kuan-Ta Chen , Chin-Laung Lei Network game design: hints and implications of player interaction. [Citation Graph (0, 0)][DBLP ] NETGAMES, 2006, pp:17- [Conf ] Kuan-Ta Chen , Polly Huang , Chun-Ying Huang , Chin-Laung Lei Game traffic analysis: an MMORPG perspective. [Citation Graph (0, 0)][DBLP ] NOSSDAV, 2005, pp:19-24 [Conf ] E. Allen Emerson , Chin-Laung Lei Modalities for Model Checking: Branching Time Strikes Back. [Citation Graph (0, 0)][DBLP ] POPL, 1985, pp:84-96 [Conf ] Jen-Hao Kuo , Siong-Ui Te , Pang-Ting Liao , Chun-Ying Huang , Pan-Lung Tsai , Chin-Laung Lei , Sy-Yen Kuo , Yennun Huang , Zsehong Tsai An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. [Citation Graph (0, 0)][DBLP ] PRDC, 2005, pp:133-139 [Conf ] Pei-Ling Yu , Pan-Lung Tsai , Chin-Laung Lei A Content-Protection Scheme for Multi-Layered Reselling Structure. [Citation Graph (0, 0)][DBLP ] SEC, 2004, pp:339-350 [Conf ] Kuan-Ta Chen , Chun-Ying Huang , Polly Huang , Chin-Laung Lei Quantifying Skype user satisfaction. [Citation Graph (0, 0)][DBLP ] SIGCOMM, 2006, pp:399-410 [Conf ] E. Allen Emerson , Chin-Laung Lei Temporal Reasoning Under Generalized Fairness Constraints. [Citation Graph (0, 0)][DBLP ] STACS, 1986, pp:21-36 [Conf ] Yu-Shian Chen , Chin-Laung Lei , Yun-Peng Chiu , Chun-Ying Huang Confessible Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:25- [Conf ] Chien-Hua Chiu , Chin-Yen Lee , Pan-Lung Tsai , Chun-Ying Huang , Chin-Laung Lei Building High-Performance and Reconfigurable Bandwidth Controllers with Adaptive Clustering. [Citation Graph (0, 0)][DBLP ] ICSNC, 2006, pp:7- [Conf ] Jiunn-Jye Lee , Chun-Ying Huang , Li-Yuan Lee , Chin-Laung Lei Design and Implementation of Secure Communication Channels over UPnP Networks. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:307-312 [Conf ] Ren-Chiun Wang , Wen-Shenq Juang , Chen-Chi Wu , Chin-Laung Lei A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:313-318 [Conf ] Tzuoo-Hawn Yeh , Cheng-Ming Kuo , Chin-Laung Lei , Hsu-Chun Yen Distributed and On-Line Routing on Tori. [Citation Graph (0, 0)][DBLP ] Algorithmica, 2002, v:32, n:4, pp:562-593 [Journal ] Horng-Twu Liaw , Chin-Laung Lei An Optimal Algorithm to Assign Cryptographic Keys in a Tree Structure for Access Control. [Citation Graph (0, 0)][DBLP ] BIT, 1993, v:33, n:1, pp:46-56 [Journal ] Kuan-Ta Chen , Polly Huang , Chin-Laung Lei How sensitive are online gamers to network quality? [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2006, v:49, n:11, pp:34-38 [Journal ] Chin-Laung Lei , Horng-Twu Liaw A parallel algorithm for finding congruent regions. [Citation Graph (0, 0)][DBLP ] Computers & Graphics, 1992, v:16, n:3, pp:289-294 [Journal ] Wen-Shenq Juang , Chin-Laung Lei , Horng-Twu Liaw A Verifiable Multi-Authority Secret Election Allowing Abstention from Voting. [Citation Graph (0, 0)][DBLP ] Comput. J., 2002, v:45, n:6, pp:672-682 [Journal ] Kuan-Ta Chen , Polly Huang , Chin-Laung Lei Game traffic analysis: An MMORPG perspective. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:16, pp:3002-3023 [Journal ] Wen-Shenq Juang , Chin-Laung Lei , C.-Y. Chang Anonymous channel and authentication in wireless communications. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:15-16, pp:1502-1511 [Journal ] Pan-Lung Tsai , Chin-Laung Lei Analysis and evaluation of a multiple gateway traffic-distribution scheme for gateway clusters. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:16, pp:3170-3181 [Journal ] Wen-Shenq Juang , Chin-Laung Lei A collision-free secret ballot protocol for computerized general elections. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:4, pp:339-348 [Journal ] Wen-Shenq Juang , Chin-Laung Lei , Horng-Twu Liaw Fair blind threshold signatures based on discrete logarithm. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2001, v:16, n:6, pp:371-379 [Journal ] Chun-I Fan , Chin-Laung Lei A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:1, pp:47-58 [Journal ] Chin-Laung Lei , Wen-Shenq Juang , Pei-Ling Yu Provably Secure Blind Threshold Signatures Based on Discrete Logarithm. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:1, pp:23-39 [Journal ] Chin-Laung Lei , Horng-Twu Liaw Efficient Parallel Algorithms for Finding the Majority Element. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1993, v:9, n:2, pp:319-334 [Journal ] Yuen-Chang Sun , Ming-Lin Kao , Chin-Laung Lei A Fully Distributed Approach to Repositories of Reusable Software Components. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2001, v:17, n:1, pp:147-158 [Journal ] Tzuoo-Hawn Yeh , Cheng-Ming Kuo , Chin-Laung Lei , Hsu-Chun Yen Competitive Analysis of On-Line Disk Scheduling. [Citation Graph (0, 0)][DBLP ] Theory Comput. Syst., 1998, v:31, n:5, pp:491-506 [Journal ] E. Allen Emerson , Chin-Laung Lei Modalities for Model Checking: Branching Time Logic Strikes Back. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1987, v:8, n:3, pp:275-306 [Journal ] Chin-Laung Lei , Pei-Ling Yu , Pan-Lung Tsai , Ming-Hwa Chan An efficient and anonymous buyer-seller watermarking protocol. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2004, v:13, n:12, pp:1618-1626 [Journal ] Kuan-Ta Chen , Chun-Ying Huang , Polly Huang , Chin-Laung Lei An empirical evaluation of TCP performance in online games. [Citation Graph (0, 0)][DBLP ] Advances in Computer Entertainment Technology, 2006, pp:5- [Conf ] Kuan-Ta Chen , Jhih-Wei Jiang , Polly Huang , Hao-hua Chu , Chin-Laung Lei , Wen-Chin Chen Identifying MMORPG bots: a traffic analysis approach. [Citation Graph (0, 0)][DBLP ] Advances in Computer Entertainment Technology, 2006, pp:4- [Conf ] Chun-Ying Huang , Chin-Laung Lei Bounding Peer-to-Peer Upload Traffic in Client Networks. [Citation Graph (0, 0)][DBLP ] DSN, 2007, pp:759-769 [Conf ] Kuan-Ta Chen , Polly Huang , Guo-Shiuan Wang , Chun-Ying Huang , Chin-Laung Lei On the Sensitivity of Online Game Playing Time to Network QoS. [Citation Graph (0, 0)][DBLP ] INFOCOM, 2006, pp:- [Conf ] Chun-Ying Huang , Yun-Peng Chiu , Kuan-Ta Chen , Chin-Laung Lei Secure multicast in dynamic environments. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:10, pp:2805-2817 [Journal ] Chun-I Fan , Chin-Laung Lei An unlinkably divisible and intention attachable ticket scheme for runoff elections. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2002, v:25, n:2, pp:93-107 [Journal ] An Anonymous and Deniable Conversation for a Thin Client. [Citation Graph (, )][DBLP ] Broadcast Authentication in Sensor Networks Using Compressed Bloom Filters. [Citation Graph (, )][DBLP ] A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. [Citation Graph (, )][DBLP ] Peer-to-Peer Application Recognition Based on Signaling Activity. [Citation Graph (, )][DBLP ] A crowdsourceable QoE evaluation framework for multimedia content. [Citation Graph (, )][DBLP ] An empirical evaluation of VoIP playout buffer dimensioning in Skype, Google talk, and MSN Messenger. [Citation Graph (, )][DBLP ] A prevention approach to scrambling attacks in WiMAX networks. [Citation Graph (, )][DBLP ] Inferring Speech Activity from Encrypted Skype Traffic. [Citation Graph (, )][DBLP ] Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks. [Citation Graph (, )][DBLP ] Detecting VoIP Traffic Based on Human Conversation Patterns. [Citation Graph (, )][DBLP ] A sector-based routing model over structured peer-to-peer networks. [Citation Graph (, )][DBLP ] A location-ID sensitive key establishment scheme in static wireless sensor networks. [Citation Graph (, )][DBLP ] Filtering False Messages En-Route in Wireless Multi-Hop Networks. [Citation Graph (, )][DBLP ] What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.456secs