Search the dblp DataBase
Chung-Chih Li :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chung-Chih Li , Bo Sun Using Linear Congruential Generators for Cryptographic Purposes. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2005, pp:13-19 [Conf ] Chung-Chih Li Asymptotic Behaviors of Type-2 Algorithms and Induced Baire Topologies. [Citation Graph (0, 0)][DBLP ] IFIP TCS, 2004, pp:465-478 [Conf ] Chung-Chih Li , Hikyoo Koh Canonical Sequence Directed Tactics Analyzer for Computer Go Games. [Citation Graph (0, 0)][DBLP ] CIMCA/IAWTIC, 2005, pp:1066-1071 [Conf ] Bo Sun , Chung-Chih Li , Kui Wu , Yang Xiao A lightweight secure protocol for wireless sensor networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:13-14, pp:2556-2568 [Journal ] Chung-Chih Li Speed-Up Theorems in Type-2 Computation. [Citation Graph (0, 0)][DBLP ] CiE, 2007, pp:478-487 [Conf ] Dehu Qi , Chung-Chih Li Self-organizing map based web pages clustering using web logs. [Citation Graph (0, 0)][DBLP ] SEDE, 2007, pp:265-270 [Conf ] Bo Sun , Chung-Chih Li , Yang Xiao A Lightweight Secure Solution for RFID. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Multi-Lateral Constructive Learning Process with Hands-On Problem-Based Solving Technology. [Citation Graph (, )][DBLP ] Secret Little Functions and Codebook for Protecting Users from Password Theft. [Citation Graph (, )][DBLP ] A Virtual Password Scheme to Protect Passwords. [Citation Graph (, )][DBLP ] Security co-existence of wireless sensor networks and RFID for pervasive computing. [Citation Graph (, )][DBLP ] Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs