<?xml version="1.0"?>
<dblpperson name="Chi-Sung Laih" pid="48/6439" n="73">
<person key="homepages/48/6439" mdate="2009-06-10">
<author pid="48/6439">Chi-Sung Laih</author>
</person>
<r><article key="journals/jvcir/LinYLL13" mdate="2025-01-19">
<author pid="123/8327">Hsiao-Ching Lin</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="42/2662">Hui-Tang Lin</author>
<title>Natural language letter based visual cryptography scheme.</title>
<pages>318-331</pages>
<year>2013</year>
<volume>24</volume>
<journal>J. Vis. Commun. Image Represent.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.jvcir.2013.01.003</ee>
<ee>https://www.wikidata.org/entity/Q125943040</ee>
<url>db/journals/jvcir/jvcir24.html#LinYLL13</url>
</article>
</r>
<r><article key="journals/tc/LuJL13" mdate="2017-05-20">
<author pid="10/9351">Chia-Yu Lu</author>
<author pid="48/10709">Shang-Ming Jen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication.</title>
<pages>428-438</pages>
<year>2013</year>
<volume>62</volume>
<journal>IEEE Trans. Computers</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TC.2011.242</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TC.2011.242</ee>
<url>db/journals/tc/tc62.html#LuJL13</url>
</article>
</r>
<r><article key="journals/cacm/LaihJL12" mdate="2018-11-06">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="48/10709">Shang-Ming Jen</author>
<author pid="10/9351">Chia-Yu Lu</author>
<title>Long-term confidentiality of PKI.</title>
<pages>91-95</pages>
<year>2012</year>
<volume>55</volume>
<journal>Commun. ACM</journal>
<number>1</number>
<ee>https://doi.org/10.1145/2063176.2063199</ee>
<url>db/journals/cacm/cacm55.html#LaihJL12</url>
</article>
</r>
<r><article key="journals/ieicet/SunCLLL12" mdate="2020-04-11">
<author pid="51/11208">Ming-Kung Sun</author>
<author pid="05/6858">Michael Chang</author>
<author pid="123/8327">Hsiao-Ching Lin</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="42/2662">Hui-Tang Lin</author>
<title>A Trust Distributed DRM System Using Smart Cards.</title>
<pages>2991-3000</pages>
<year>2012</year>
<volume>95-D</volume>
<journal>IEICE Trans. Inf. Syst.</journal>
<number>12</number>
<ee>https://doi.org/10.1587/transinf.E95.D.2991</ee>
<ee>http://search.ieice.org/bin/summary.php?id=e95-d_12_2991</ee>
<url>db/journals/ieicet/ieicet95d.html#SunCLLL12</url>
</article>
</r>
<r><article key="journals/ijcomsys/LeeCL12" mdate="2020-07-30">
<author pid="77/6612">Chin-Feng Lee</author>
<author pid="16/6905">Hung-Yu Chien</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Server-less RFID authentication and searching protocol with enhanced security.</title>
<pages>376-385</pages>
<year>2012</year>
<volume>25</volume>
<journal>Int. J. Commun. Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1002/dac.1246</ee>
<url>db/journals/ijcomsys/ijcomsys25.html#LeeCL12</url>
</article>
</r>
<r><article key="journals/scn/ChenL11" mdate="2020-09-10">
<author pid="21/4787">Pei-Te Chen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>A challenge-based trust establishment protocol for peer-to-peer networks.</title>
<pages>71-78</pages>
<year>2011</year>
<volume>4</volume>
<journal>Secur. Commun. Networks</journal>
<number>1</number>
<ee>https://doi.org/10.1002/sec.171</ee>
<url>db/journals/scn/scn4.html#ChenL11</url>
</article>
</r>
<r><inproceedings key="conf/icpads/SunLCLL11" mdate="2023-03-23">
<author pid="51/11208">Ming-Kung Sun</author>
<author pid="85/11208">Mao-Jie Lin</author>
<author pid="05/6858">Michael Chang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="42/2662">Hui-Tang Lin</author>
<title>Malware Virtualization-Resistant Behavior Detection.</title>
<pages>912-917</pages>
<year>2011</year>
<booktitle>ICPADS</booktitle>
<ee>https://doi.org/10.1109/ICPADS.2011.78</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPADS.2011.78</ee>
<crossref>conf/icpads/2011</crossref>
<url>db/conf/icpads/icpads2011.html#SunLCLL11</url>
</inproceedings>
</r>
<r><article key="journals/eswa/HouCCLC10" mdate="2022-10-02">
<author pid="68/4529">Yung-Tsung Hou</author>
<author pid="02/7428">Yimeng Chang</author>
<author orcid="0000-0003-3951-7931" pid="c/TsuhanChen">Tsuhan Chen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="00/415">Chia-Mei Chen</author>
<title>Malicious web content detection by machine learning.</title>
<pages>55-60</pages>
<year>2010</year>
<volume>37</volume>
<journal>Expert Syst. Appl.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.eswa.2009.05.023</ee>
<url>db/journals/eswa/eswa37.html#HouCCLC10</url>
</article>
</r>
<r><inproceedings key="conf/bwcca/LuYL10" mdate="2023-03-23">
<author pid="10/9351">Chia-Yu Lu</author>
<author pid="51/752">Wu-Chuan Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems.</title>
<pages>401-406</pages>
<year>2010</year>
<booktitle>BWCCA</booktitle>
<ee>https://doi.org/10.1109/BWCCA.2010.104</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/BWCCA.2010.104</ee>
<crossref>conf/bwcca/2010</crossref>
<url>db/conf/bwcca/bwcca2010.html#LuYL10</url>
</inproceedings>
</r>
<r><article key="journals/eswa/LaiCLC09" mdate="2022-10-02">
<author pid="59/234">Gu Hsin Lai</author>
<author pid="00/415">Chia-Mei Chen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author orcid="0000-0003-3951-7931" pid="c/TsuhanChen">Tsuhan Chen</author>
<title>A collaborative anti-spam system.</title>
<pages>6645-6653</pages>
<year>2009</year>
<volume>36</volume>
<journal>Expert Syst. Appl.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/j.eswa.2008.08.075</ee>
<url>db/journals/eswa/eswa36.html#LaiCLC09</url>
</article>
</r>
<r><article key="journals/iet-com/LaihSCH09" mdate="2020-09-08">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="51/11208">Ming-Kung Sun</author>
<author pid="135/9484">Chen-Chung Chang</author>
<author pid="74/5823">Yunghsiang Han</author>
<title>Adaptive key pre-distribution model for distributed sensor networks.</title>
<pages>723-732</pages>
<year>2009</year>
<volume>3</volume>
<journal>IET Commun.</journal>
<number>5</number>
<ee>https://doi.org/10.1049/iet-com.2008.0266</ee>
<url>db/journals/iet-com/iet-com3.html#LaihSCH09</url>
</article>
</r>
<r><article key="journals/ijisec/ChengL09" mdate="2017-05-27">
<author pid="77/7372">Jiin-Chiou Cheng</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Conference key agreement protocol with non-interactive fault-tolerance over broadcast network.</title>
<pages>37-48</pages>
<year>2009</year>
<volume>8</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10207-008-0062-1</ee>
<url>db/journals/ijisec/ijisec8.html#ChengL09</url>
</article>
</r>
<r><article key="journals/jpdc/ChienL09" mdate="2020-02-22">
<author pid="16/6905">Hung-Yu Chien</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>ECC-based lightweight authentication protocol with untraceability for low-cost RFID.</title>
<pages>848-853</pages>
<year>2009</year>
<volume>69</volume>
<journal>J. Parallel Distributed Comput.</journal>
<number>10</number>
<ee>https://doi.org/10.1016/j.jpdc.2009.07.007</ee>
<url>db/journals/jpdc/jpdc69.html#ChienL09</url>
</article>
</r>
<r><article key="journals/sensors/JenLK09" mdate="2018-11-14">
<author pid="48/10709">Shang-Ming Jen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="82/2421">Wen-Chung Kuo</author>
<title>A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.</title>
<pages>5022-5039</pages>
<year>2009</year>
<volume>9</volume>
<journal>Sensors</journal>
<number>6</number>
<ee type="oa">https://doi.org/10.3390/s90605022</ee>
<ee>https://www.wikidata.org/entity/Q35795657</ee>
<url>db/journals/sensors/sensors9.html#JenLK09</url>
</article>
</r>
<r><inproceedings key="conf/ccnc/SunLYK10" mdate="2020-04-25">
<author pid="51/11208">Ming-Kung Sun</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="261/7203">Hong-Yi Yen</author>
<author pid="261/7188">Jyun-Rong Kuo</author>
<title>A Ticket Based Digital Rights Management Model.</title>
<pages>1-5</pages>
<year>2009</year>
<booktitle>CCNC</booktitle>
<ee>https://doi.org/10.1109/CCNC.2009.4784774</ee>
<crossref>conf/ccnc/2009</crossref>
<url>db/conf/ccnc/ccnc2009.html#SunLYK10</url>
</inproceedings>
</r>
<r><article key="journals/ijisec/ChenL08" mdate="2017-05-27">
<author pid="21/4787">Pei-Te Chen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>IDSIC: an intrusion detection system with identification capability.</title>
<pages>185-197</pages>
<year>2008</year>
<volume>7</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s10207-007-0024-z</ee>
<url>db/journals/ijisec/ijisec7.html#ChenL08</url>
</article>
</r>
<r><article key="journals/tmm/WangL08" mdate="2020-10-01">
<author pid="92/6767">Shyh-Yih Wang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Efficient Key Distribution for Access Control in Pay-TV Systems.</title>
<pages>480-492</pages>
<year>2008</year>
<volume>10</volume>
<journal>IEEE Trans. Multim.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TMM.2008.917417</ee>
<url>db/journals/tmm/tmm10.html#WangL08</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/ChengLLCC08" mdate="2023-03-24">
<author pid="94/2075">Yu-Chin Cheng</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="59/234">Gu Hsin Lai</author>
<author pid="00/415">Chia-Mei Chen</author>
<author orcid="0000-0003-3951-7931" pid="c/TsuhanChen">Tsuhan Chen</author>
<title>Defending On-Line Web Application Security with User-Behavior Surveillance.</title>
<pages>410-415</pages>
<year>2008</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2008.127</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2008.127</ee>
<crossref>conf/IEEEares/2008</crossref>
<url>db/conf/IEEEares/ares2008.html#ChengLLCC08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/apscc/LinCL08" mdate="2023-09-30">
<author orcid="0000-0002-7537-9970" pid="53/7827">Ching-Huang Lin</author>
<author pid="01/1814">Chih-Hao Chen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection.</title>
<pages>1252-1257</pages>
<year>2008</year>
<booktitle>APSCC</booktitle>
<ee>https://doi.org/10.1109/APSCC.2008.212</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/APSCC.2008.212</ee>
<crossref>conf/apscc/2008</crossref>
<url>db/conf/apscc/apscc2008.html#LinCL08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icwl/YangWCLWLG08" mdate="2017-05-25">
<author pid="34/2060">Ya-Ting Carolyn Yang</author>
<author pid="46/1558">Wan-Chi Wu</author>
<author pid="16/1861">Pei-Yun Chung</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="83/3926">Jia-Rong Wen</author>
<author pid="86/5966">Chi-San Lin</author>
<author pid="66/2106">Jian-Bin Gao</author>
<title>The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan.</title>
<pages>87-98</pages>
<year>2008</year>
<booktitle>ICWL</booktitle>
<ee>https://doi.org/10.1007/978-3-540-85033-5_10</ee>
<crossref>conf/icwl/2008</crossref>
<url>db/conf/icwl/icwl2008.html#YangWCLWLG08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isda/LinHCJL08" mdate="2023-03-23">
<author pid="83/7777">Shih-Fen Lin</author>
<author pid="68/4529">Yung-Tsung Hou</author>
<author pid="00/415">Chia-Mei Chen</author>
<author pid="94/5277">Bingchiang Jeng</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Malicious Webpage Detection by Semantics-Aware Reasoning.</title>
<pages>115-120</pages>
<year>2008</year>
<booktitle>ISDA (1)</booktitle>
<ee>https://doi.org/10.1109/ISDA.2008.290</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISDA.2008.290</ee>
<crossref>conf/isda/2008</crossref>
<url>db/conf/isda/isda2008-1.html#LinHCJL08</url>
</inproceedings>
</r>
<r><article key="journals/tc/YangGL07" mdate="2022-06-13">
<author pid="51/752">Wu-Chuan Yang</author>
<author pid="45/2140">Dah-Jyh Guan</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Fast Multicomputation with Asynchronous Strategy.</title>
<pages>234-242</pages>
<year>2007</year>
<volume>56</volume>
<journal>IEEE Trans. Computers</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TC.2007.29</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/TC.2007.29</ee>
<url>db/journals/tc/tc56.html#YangGL07</url>
</article>
</r>
<r><inproceedings key="conf/grc/ChengCCWL07" mdate="2023-03-24">
<author pid="94/2075">Yu-Chin Cheng</author>
<author pid="24/1211">Chien-Hung Chen</author>
<author pid="48/3183">Chung-Chih Chiang</author>
<author pid="73/4640-2">Jun-Wei Wang 0002</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Generating Attack Scenarios with Causal Relationship.</title>
<pages>368-373</pages>
<year>2007</year>
<crossref>conf/grc/2007</crossref>
<booktitle>GrC</booktitle>
<ee>https://doi.org/10.1109/GrC.2007.117</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/GrC.2007.117</ee>
<url>db/conf/grc/grc2007.html#ChengCCWL07</url>
</inproceedings>
</r>
<r><article key="journals/tdsc/WangL06" mdate="2020-04-09">
<author pid="92/6767">Shyh-Yih Wang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme.</title>
<pages>91-100</pages>
<year>2006</year>
<volume>3</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TDSC.2006.15</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2006.15</ee>
<url>db/journals/tdsc/tdsc3.html#WangL06</url>
</article>
</r>
<r><inproceedings key="conf/euc/ChenYL06" mdate="2018-06-26">
<author pid="15/5182">Ming-Yang Chen</author>
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Authorized Tracking and Tracing for RFID Tags.</title>
<pages>435-444</pages>
<year>2006</year>
<crossref>conf/euc/2006w</crossref>
<booktitle>EUC Workshops</booktitle>
<ee type="oa">https://doi.org/10.1007/11807964_44</ee>
<url>db/conf/euc/eucw2006.html#ChenYL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ic/LaihFK06" mdate="2007-01-02">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="66/6440">Chun-Ju Fu</author>
<author pid="82/2421">Wen-Chung Kuo</author>
<title>Design a Secure and Practical Metering Scheme.</title>
<pages>443-447</pages>
<year>2006</year>
<crossref>conf/ic/2006</crossref>
<booktitle>International Conference on Internet Computing</booktitle>
<url>db/conf/ic/icomp2006.html#LaihFK06</url>
</inproceedings>
</r>
<r><article key="journals/amc/YangGL05" mdate="2020-02-21">
<author pid="51/752">Wu-Chuan Yang</author>
<author pid="45/2140">Dah-Jyh Guan</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation.</title>
<pages>108-117</pages>
<year>2005</year>
<volume>167</volume>
<journal>Appl. Math. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.amc.2004.06.107</ee>
<url>db/journals/amc/amc167.html#YangGL05</url>
</article>
</r>
<r><article key="journals/compsec/WangL05" mdate="2023-08-28">
<author pid="92/6767">Shyh-Yih Wang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Cryptanalyses of two key assignment schemes based on polynomial interpolations.</title>
<pages>134-138</pages>
<year>2005</year>
<volume>24</volume>
<journal>Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/j.cose.2004.07.002</ee>
<ee>https://www.wikidata.org/entity/Q115062312</ee>
<url>db/journals/compsec/compsec24.html#WangL05</url>
</article>
</r>
<r><article key="journals/jss/WangL05" mdate="2020-02-24">
<author pid="92/6767">Shyh-Yih Wang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies.</title>
<pages>189-192</pages>
<year>2005</year>
<volume>75</volume>
<journal>J. Syst. Softw.</journal>
<number>1-2</number>
<ee>https://doi.org/10.1016/j.jss.2004.04.015</ee>
<url>db/journals/jss/jss75.html#WangL05</url>
</article>
</r>
<r><inproceedings key="conf/pkc/YangGL05" mdate="2017-05-24">
<author pid="51/752">Wu-Chuan Yang</author>
<author pid="45/2140">Dah-Jyh Guan</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Fast Multi-computations with Integer Similarity Strategy.</title>
<pages>138-153</pages>
<ee>https://doi.org/10.1007/978-3-540-30580-4_10</ee>
<year>2005</year>
<crossref>conf/pkc/2005</crossref>
<booktitle>Public Key Cryptography</booktitle>
<url>db/conf/pkc/pkc2005.html#YangGL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sadfe/ChenLPD05" mdate="2023-03-24">
<author pid="21/4787">Pei-Te Chen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="50/1616">Fabien Pouget</author>
<author orcid="0000-0003-3206-2030" pid="76/5806">Marc Dacier</author>
<title>Comparative Survey of Local Honeypot Sensors to Assist Network Forensics.</title>
<pages>120-134</pages>
<year>2005</year>
<crossref>conf/sadfe/2005</crossref>
<booktitle>SADFE</booktitle>
<ee>https://doi.org/10.1109/SADFE.2005.6</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SADFE.2005.6</ee>
<url>db/conf/sadfe/sadfe2005.html#ChenLPD05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sadfe/HsuL05" mdate="2023-03-24">
<author pid="17/860">I-Chuan Chang</author>
<author pid="150/5321">Bor-Wen Hsu</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>A DCT Quantization-Based Image Authentication System for Digital Forensics.</title>
<pages>223-235</pages>
<year>2005</year>
<crossref>conf/sadfe/2005</crossref>
<booktitle>SADFE</booktitle>
<ee>https://doi.org/10.1109/SADFE.2005.1</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SADFE.2005.1</ee>
<url>db/conf/sadfe/sadfe2005.html#HsuL05</url>
</inproceedings>
</r>
<r><article key="journals/ijisec/LaihC04" mdate="2017-05-27">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="70/6829">K. Y. Chen</author>
<title>Generating visible RSA public keys for PKI.</title>
<pages>103-109</pages>
<year>2004</year>
<volume>2</volume>
<journal>Int. J. Inf. Sec.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10207-003-0030-8</ee>
<url>db/journals/ijisec/ijisec2.html#LaihC04</url>
</article>
</r>
<r><inproceedings key="conf/ctrsa/WuLL04" mdate="2017-05-21">
<author pid="72/360">Shee-Yau Wu</author>
<author pid="53/5054">Shih-Chuan Lu</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Design of AES Based on Dual Cipher and Composite Field.</title>
<pages>25-38</pages>
<ee>https://doi.org/10.1007/978-3-540-24660-2_3</ee>
<year>2004</year>
<crossref>conf/ctrsa/2004</crossref>
<booktitle>CT-RSA</booktitle>
<url>db/conf/ctrsa/ctrsa2004.html#WuLL04</url>
</inproceedings>
</r>
<r><article key="journals/comcom/LinL03" mdate="2020-02-20">
<author pid="02/2202">Chen-Chi Lin</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>The GPKI developing status of Taiwan and some major Asia countries.</title>
<pages>1884-1892</pages>
<year>2003</year>
<volume>26</volume>
<journal>Comput. Commun.</journal>
<number>16</number>
<ee>https://doi.org/10.1016/S0140-3664(03)00083-5</ee>
<url>db/journals/comcom/comcom26.html#LinL03</url>
</article>
</r>
<r><article key="journals/ieiceta/ChiouL03" mdate="2021-06-08">
<author pid="93/7486">Shin-Yan Chiou</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>A Tempo-Based <i>t</i>-out-of-<i>n</i> Audio Cryptography Scheme.</title>
<pages>2091-2098</pages>
<year>2003</year>
<volume>86-A</volume>
<journal>IEICE Trans. Fundam. Electron. Commun. Comput. Sci.</journal>
<number>8</number>
<ee>http://search.ieice.org/bin/summary.php?id=e86-a_8_2091</ee>
<url>db/journals/ieiceta/ieiceta86.html#ChiouL03</url>
</article>
</r>
<r><article key="journals/ipl/LaihC03" mdate="2017-05-26">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="93/7486">Shin Yan Chiou</author>
<title>Cryptanalysis of an optimized protocol for mobile network authentication and security.</title>
<pages>339-341</pages>
<year>2003</year>
<volume>85</volume>
<journal>Inf. Process. Lett.</journal>
<number>6</number>
<ee>https://doi.org/10.1016/S0020-0190(02)00431-3</ee>
<url>db/journals/ipl/ipl85.html#LaihC03</url>
</article>
</r>
<r><article key="journals/jise/LinLY03" mdate="2021-07-16">
<author pid="02/2202">Chen-Chi Lin</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="21/1931">Ching-Nung Yang</author>
<title>New Audio Secret Sharing Schemes With Time Division Technique.</title>
<pages>605-614</pages>
<year>2003</year>
<volume>19</volume>
<journal>J. Inf. Sci. Eng.</journal>
<number>4</number>
<ee type="archive">http://www.iis.sinica.edu.tw/page/jise/2003/200307_04.html</ee>
<url>db/journals/jise/jise19.html#LinLY03</url>
</article>
</r>
<r><proceedings key="conf/asiacrypt/2003" mdate="2019-05-14">
<editor pid="48/6439">Chi-Sung Laih</editor>
<title>Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings</title>
<booktitle>ASIACRYPT</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>2894</volume>
<publisher>Springer</publisher>
<year>2003</year>
<isbn>3-540-20592-6</isbn>
<ee>https://doi.org/10.1007/b94617</ee>
<url>db/conf/asiacrypt/asiacrypt2003.html</url>
</proceedings>
</r>
<r><article key="journals/jise/SunYL02" mdate="2021-07-16">
<author pid="42/1523">Hung-Min Sun</author>
<author pid="51/752">Wu-Chuan Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>On the Design of RSA With Short Secret Exponent.</title>
<pages>1-18</pages>
<year>2002</year>
<volume>18</volume>
<journal>J. Inf. Sci. Eng.</journal>
<number>1</number>
<ee type="archive">http://www.iis.sinica.edu.tw/page/jise/2002/200201_01.html</ee>
<url>db/journals/jise/jise18.html#SunYL02</url>
</article>
</r>
<r><article key="journals/dcc/YangL00" mdate="2019-06-17">
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>New Colored Visual Secret Sharing Schemes.</title>
<pages>325-336</pages>
<year>2000</year>
<volume>20</volume>
<journal>Des. Codes Cryptogr.</journal>
<number>3</number>
<url>db/journals/dcc/dcc20.html#YangL00</url>
</article>
</r>
<r><article key="journals/icl/LinL00" mdate="2020-08-20">
<author pid="02/2202">Chen-Chi Lin</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Cryptanalysis of Nyberg-Rueppel's message recovery scheme.</title>
<pages>231-232</pages>
<year>2000</year>
<volume>4</volume>
<journal>IEEE Commun. Lett.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/4234.852925</ee>
<url>db/journals/icl/icl4.html#LinL00</url>
</article>
</r>
<r><inproceedings key="conf/iscas/WangLTH00" mdate="2017-10-22">
<author pid="69/4580">Lih-Yang Wang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="207/3221">Hang-Geng Tsai</author>
<author pid="207/3225">Nern-Min Huang</author>
<title>On the hardware design for DES cipher in tamper resistant devices against differential fault analysis.</title>
<pages>697-700</pages>
<year>2000</year>
<booktitle>ISCAS</booktitle>
<ee>https://doi.org/10.1109/ISCAS.2000.856424</ee>
<crossref>conf/iscas/2000</crossref>
<url>db/conf/iscas/iscas2000.html#WangLTH00</url>
</inproceedings>
</r>
<r><article key="journals/jise/KuoLG99" mdate="2021-07-16">
<author pid="82/2421">Wen-Chung Kuo</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="40/6761">Min-Jea Gau</author>
<title>On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes.</title>
<pages>701-713</pages>
<year>1999</year>
<volume>15</volume>
<journal>J. Inf. Sci. Eng.</journal>
<number>5</number>
<ee type="archive">http://www.iis.sinica.edu.tw/page/jise/1999/199909_06.html</ee>
<url>db/journals/jise/jise15.html#KuoLG99</url>
</article>
</r>
<r><article key="journals/tce/TuLT99" mdate="2020-07-09">
<author pid="41/5180">Fu-Kuan Tu</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="159/2330">Hsu-Hung Tung</author>
<title>On key distribution management for conditional access system on pay-TV system.</title>
<pages>151-158</pages>
<year>1999</year>
<volume>45</volume>
<journal>IEEE Trans. Consumer Electron.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/30.754430</ee>
<url>db/journals/tce/tce45.html#TuLT99</url>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/SunYL99" mdate="2017-05-19">
<author pid="42/1523">Hung-Min Sun</author>
<author pid="51/752">Wu-Chuan Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>On the Design of RSA with Short Secret Exponent.</title>
<pages>150-164</pages>
<year>1999</year>
<crossref>conf/asiacrypt/1999</crossref>
<booktitle>ASIACRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt99.html#SunYL99</url>
<ee>https://doi.org/10.1007/978-3-540-48000-6_13</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/icppw/LaihT99" mdate="2023-03-24">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="41/5180">Fu-Kuan Tu</author>
<title>Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes.</title>
<pages>167-173</pages>
<year>1999</year>
<crossref>conf/icppw/1999</crossref>
<booktitle>ICPP Workshops</booktitle>
<ee>https://doi.org/10.1109/ICPPW.1999.800057</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPPW.1999.800057</ee>
<url>db/conf/icppw/icppw1999.html#LaihT99</url>
</inproceedings>
</r>
<r><article key="journals/tc/YangL98" mdate="2017-06-14">
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>DC<sub><i>m</i></sub> Codes for Constructing <i>t</i>-EC/AUED Codes.</title>
<pages>492</pages>
<year>1998</year>
<volume>47</volume>
<journal>IEEE Trans. Computers</journal>
<number>4</number>
<url>db/journals/tc/tc47.html#YangL98</url>
<ee>https://doi.org/10.1109/12.675719</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/12.675719</ee>
</article>
</r>
<r><article key="journals/ipl/YangL97" mdate="2017-05-26">
<author pid="21/1931">Ching-Nung Yang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>A Note on Error-Correcting Codes for Authentication and Subliminal Channels.</title>
<pages>141-143</pages>
<year>1997</year>
<volume>62</volume>
<journal>Inf. Process. Lett.</journal>
<number>3</number>
<url>db/journals/ipl/ipl62.html#YangL97</url>
<ee>https://doi.org/10.1016/S0020-0190(97)00053-7</ee>
</article>
</r>
<r><article key="journals/tc/LaihG97" mdate="2020-01-17">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="40/6761">Min-Jea Gau</author>
<title>Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem.</title>
<pages>511</pages>
<year>1997</year>
<volume>46</volume>
<journal>IEEE Trans. Computers</journal>
<number>4</number>
<url>db/journals/tc/tc46.html#LaihG97</url>
<ee>https://doi.org/10.1109/12.588074</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/12.588074</ee>
</article>
</r>
<r><inproceedings key="conf/acsac/LeeL97" mdate="2023-03-23">
<author pid="10/5620">Yung-Cheng Lee</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>On the Key Recovery of the Key Escrow System.</title>
<pages>216-220</pages>
<year>1997</year>
<crossref>conf/acsac/1997</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1997.646192</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.1997.646192</ee>
<url>db/conf/acsac/acsac1997.html#LeeL97</url>
</inproceedings>
</r>
<r><article key="journals/jise/LaihY96" mdate="2021-07-16">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="88/4820">Sung-Ming Yen</author>
<title>Multi-Signature for Specified Group of Verifiers.</title>
<pages>143-152</pages>
<year>1996</year>
<volume>12</volume>
<journal>J. Inf. Sci. Eng.</journal>
<number>1</number>
<ee type="archive">http://www.iis.sinica.edu.tw/page/jise/1996/199603_07.html</ee>
<url>db/journals/jise/jise12.html#LaihY96</url>
</article>
</r>
<r><article key="journals/tc/LaihY96" mdate="2017-06-14">
<author pid="48/6439">Chi-Sung Laih</author>
<author orcid="0000-0002-3881-7329" pid="21/1931">Ching-Nung Yang</author>
<title>On the Analysis and Design of Group Theoretical T-syEC/AUED Codes.</title>
<pages>103-108</pages>
<year>1996</year>
<volume>45</volume>
<journal>IEEE Trans. Computers</journal>
<number>1</number>
<url>db/journals/tc/tc45.html#LaihY96</url>
<ee>https://doi.org/10.1109/12.481491</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/12.481491</ee>
</article>
</r>
<r><article key="journals/comcom/ChangWL95" mdate="2020-02-20">
<author pid="c/ChinChenChang">Chin-Chen Chang 0001</author>
<author pid="93/2842">Tzong-Chen Wu</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.</title>
<pages>45-47</pages>
<year>1995</year>
<volume>18</volume>
<journal>Comput. Commun.</journal>
<number>1</number>
<url>db/journals/comcom/comcom18.html#ChangWL95</url>
</article>
</r>
<r><article key="journals/ipl/LaihTT95" mdate="2017-05-26">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="41/5180">Fu-Kuan Tu</author>
<author pid="78/6829">Wen-Chung Tai</author>
<title>On the Security of the Lucas Function.</title>
<pages>243-247</pages>
<year>1995</year>
<volume>53</volume>
<journal>Inf. Process. Lett.</journal>
<number>5</number>
<url>db/journals/ipl/ipl53.html#LaihTT95</url>
<ee>https://doi.org/10.1016/0020-0190(94)00209-H</ee>
</article>
</r>
<r><article key="journals/tc/YenL95" mdate="2017-05-20">
<author pid="88/4820">Sung-Ming Yen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Improved Digital Signature Algorithm.</title>
<pages>729-730</pages>
<year>1995</year>
<volume>44</volume>
<journal>IEEE Trans. Computers</journal>
<number>5</number>
<url>db/journals/tc/tc44.html#YenL95</url>
<ee>https://doi.org/10.1109/12.381963</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/12.381963</ee>
<note>Correction: IEEE Transactions on Computers 45(7): 864 (1996)</note>
</article>
</r>
<r><article key="journals/tc/YenL95a" mdate="2017-05-16">
<author pid="88/4820">Sung-Ming Yen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Improved Digital Signature Suitable for Batch Verification.</title>
<pages>957-959</pages>
<year>1995</year>
<volume>44</volume>
<journal>IEEE Trans. Computers</journal>
<number>7</number>
<url>db/journals/tc/tc44.html#YenL95a</url>
<ee>https://doi.org/10.1109/12.392857</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/12.392857</ee>
</article>
</r>
<r><inproceedings key="conf/cpa/LaihK95" mdate="2017-05-22">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="82/2421">Wen-Chung Kuo</author>
<title>Cryptanalysis of the Enhanced ElGamal's Signature Scheme.</title>
<pages>228-231</pages>
<year>1995</year>
<crossref>conf/cpa/1995</crossref>
<booktitle>Cryptography: Policy and Algorithms</booktitle>
<url>db/conf/cpa/cpa1995.html#LaihK95</url>
<ee>https://doi.org/10.1007/BFb0032361</ee>
</inproceedings>
</r>
<r><article key="journals/compsec/LaihCC94" mdate="2023-08-28">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="68/3463">Wen-Hong Chiou</author>
<author pid="c/ChinChenChang">Chin-Chen Chang 0001</author>
<title>Authentication and protection of public keys.</title>
<pages>581-585</pages>
<year>1994</year>
<volume>13</volume>
<journal>Comput. Secur.</journal>
<number>7</number>
<ee>https://doi.org/10.1016/0167-4048(94)90009-4</ee>
<ee>https://www.wikidata.org/entity/Q115115634</ee>
<url>db/journals/compsec/compsec13.html#LaihCC94</url>
</article>
</r>
<r><inproceedings key="conf/infocom/LaihY93" mdate="2023-03-23">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="88/4820">Sung-Ming Yen</author>
<title>On the Design of Conference Key Distribution Systems for the Broadcasting Networks.</title>
<pages>1406-1413</pages>
<year>1993</year>
<crossref>conf/infocom/1993</crossref>
<booktitle>INFOCOM</booktitle>
<url>db/conf/infocom/infocom1993-3.html#LaihY93</url>
<ee>https://doi.org/10.1109/INFCOM.1993.253406</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/INFCOM.1993.253406</ee>
</inproceedings>
</r>
<r><article key="journals/jise/Laih92" mdate="2021-07-16">
<author pid="48/6439">Chi-Sung Laih</author>
<title>Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle.</title>
<pages>633-640</pages>
<year>1992</year>
<volume>8</volume>
<journal>J. Inf. Sci. Eng.</journal>
<number>4</number>
<ee type="archive">http://www.iis.sinica.edu.tw/page/jise/1992/199212_08.html</ee>
<url>db/journals/jise/jise8.html#Laih92</url>
</article>
</r>
<r><article key="journals/jssc/YenLCL92" mdate="2025-02-03">
<author pid="88/4820">Sung-Ming Yen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="41/2635">Chin-Hsing Chen</author>
<author pid="15/408">Jau-Yien Lee</author>
<title>An efficient redundant-binary number to binary number converter.</title>
<pages>109-112</pages>
<year>1992</year>
<month>January</month>
<volume>27</volume>
<journal>IEEE J. Solid State Circuits</journal>
<number>1</number>
<ee>https://doi.org/10.1109/4.109563</ee>
<url>db/journals/jssc/jssc27.html#YenLCL92</url>
<stream>streams/journals/jssc</stream>
</article>
</r>
<r><inproceedings key="conf/asiacrypt/LaihY92" mdate="2017-05-19">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="88/4820">Sung-Ming Yen</author>
<title>Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.</title>
<pages>219-230</pages>
<year>1992</year>
<crossref>conf/asiacrypt/1992</crossref>
<booktitle>AUSCRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt92.html#LaihY92</url>
<ee>https://doi.org/10.1007/3-540-57220-1_64</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/MatsumotoILY92" mdate="2017-05-19">
<author pid="58/4020">Tsutomu Matsumoto</author>
<author pid="14/1398">Hideki Imai</author>
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="88/4820">Sung-Ming Yen</author>
<title>On Verifiable Implicit Asking Protocols for RSA Computation.</title>
<pages>296-307</pages>
<year>1992</year>
<crossref>conf/asiacrypt/1992</crossref>
<booktitle>AUSCRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt92.html#MatsumotoILY92</url>
<ee>https://doi.org/10.1007/3-540-57220-1_70</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/YenL92" mdate="2017-05-19">
<author pid="88/4820">Sung-Ming Yen</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>The Fast Cascade Exponentation Algorithm and its Applications on Cryptography.</title>
<pages>447-456</pages>
<year>1992</year>
<crossref>conf/asiacrypt/1992</crossref>
<booktitle>AUSCRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt92.html#YenL92</url>
<ee>https://doi.org/10.1007/3-540-57220-1_82</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/LaihH91" mdate="2017-05-19">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="h/LeinHarn">Lein Harn</author>
<title>Generalized Threshold Cryptosystems.</title>
<pages>159-166</pages>
<year>1991</year>
<crossref>conf/asiacrypt/1991</crossref>
<booktitle>ASIACRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt91.html#LaihH91</url>
<ee>https://doi.org/10.1007/3-540-57332-1_13</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/asiacrypt/LaihYH91" mdate="2017-05-19">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="88/4820">Sung-Ming Yen</author>
<author pid="h/LeinHarn">Lein Harn</author>
<title>Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.</title>
<pages>450-459</pages>
<year>1991</year>
<crossref>conf/asiacrypt/1991</crossref>
<booktitle>ASIACRYPT</booktitle>
<url>db/conf/asiacrypt/asiacrypt91.html#LaihYH91</url>
<ee>https://doi.org/10.1007/3-540-57332-1_38</ee>
</inproceedings>
</r>
<r><article key="journals/ipl/LaihLH89" mdate="2017-05-26">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="15/408">Jau-Yien Lee</author>
<author pid="h/LeinHarn">Lein Harn</author>
<title>A new threshold scheme and its application in designing the conference key distribution cryptosystem.</title>
<pages>95-99</pages>
<year>1989</year>
<volume>32</volume>
<journal>Inf. Process. Lett.</journal>
<number>3</number>
<ee>https://doi.org/10.1016/0020-0190(89)90008-2</ee>
<url>db/journals/ipl/ipl32.html#LaihLH89</url>
</article>
</r>
<r><article key="journals/jsac/LaihLHS89" mdate="2020-04-02">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="15/408">Jau-Yien Lee</author>
<author pid="h/LeinHarn">Lein Harn</author>
<author pid="00/645">Yan-Kuin Su</author>
<title>Linearly shift knapsack public-key cryptosystem.</title>
<pages>534-539</pages>
<year>1989</year>
<volume>7</volume>
<journal>IEEE J. Sel. Areas Commun.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/49.17717</ee>
<url>db/journals/jsac/jsac7.html#LaihLHS89</url>
</article>
</r>
<r><article key="journals/tse/LaihHL89" mdate="2017-05-17">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="h/LeinHarn">Lein Harn</author>
<author pid="15/408">Jau-Yien Lee</author>
<title>On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.</title>
<pages>1135-1137</pages>
<ee>https://doi.org/10.1109/32.31371</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/32.31371</ee>
<year>1989</year>
<volume>15</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>9</number>
<url>db/journals/tse/tse15.html#LaihHL89</url>
</article>
</r>
<r><inproceedings key="conf/crypto/LaihLH89" mdate="2017-05-19">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="h/LeinHarn">Lein Harn</author>
<author pid="15/408">Jau-Yien Lee</author>
<author pid="36/1922">Tzonelih Hwang</author>
<title>Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.</title>
<pages>286-298</pages>
<ee>https://doi.org/10.1007/0-387-34805-0_26</ee>
<year>1989</year>
<crossref>conf/crypto/1989</crossref>
<booktitle>CRYPTO</booktitle>
<url>db/conf/crypto/crypto89.html#LaihLH89</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/HarnL89" mdate="2023-03-24">
<author pid="h/LeinHarn">Lein Harn</author>
<author pid="51/845">David Huang</author>
<author pid="48/6439">Chi-Sung Laih</author>
<title>Password Authentication Based On Public-Key Distribution Cryptosystem.</title>
<pages>332-338</pages>
<cdrom>ICDE89/P332.pdf</cdrom>
<year>1989</year>
<booktitle>ICDE</booktitle>
<url>db/conf/icde/icde89.html#HarnL89</url>
<crossref>conf/icde/89</crossref>
<ee>https://doi.org/10.1109/ICDE.1989.47233</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDE.1989.47233</ee>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>journals/cacm/Purdy74</cite>
<cite>...</cite>
<cite>books/aw/Denning82</cite>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/LaihLHC89" mdate="2023-03-23">
<author pid="48/6439">Chi-Sung Laih</author>
<author pid="15/408">Jau-Yien Lee</author>
<author pid="h/LeinHarn">Lein Harn</author>
<author pid="41/2635">Chin-Hsing Chen</author>
<title>A New Scheme for ID-Based Cryptosystems and Signature.</title>
<pages>998-1002</pages>
<year>1989</year>
<crossref>conf/infocom/1989</crossref>
<booktitle>INFOCOM</booktitle>
<url>db/conf/infocom/infocom1989-3.html#LaihLHC89</url>
<ee>https://doi.org/10.1109/INFCOM.1989.101551</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/INFCOM.1989.101551</ee>
</inproceedings>
</r>
<coauthors n="71" nc="8">
<co c="0"><na f="c/Chang:Chen=Chung" pid="135/9484">Chen-Chung Chang</na></co>
<co c="0"><na f="c/Chang_0001:Chin=Chen" pid="c/ChinChenChang">Chin-Chen Chang 0001</na></co>
<co c="5"><na f="c/Chang:I=Chuan" pid="17/860">I-Chuan Chang</na></co>
<co c="0"><na f="c/Chang:Michael" pid="05/6858">Michael Chang</na></co>
<co c="0"><na f="c/Chang:Yimeng" pid="02/7428">Yimeng Chang</na></co>
<co c="0"><na f="c/Chen:Chia=Mei" pid="00/415">Chia-Mei Chen</na></co>
<co c="0"><na f="c/Chen:Chien=Hung" pid="24/1211">Chien-Hung Chen</na></co>
<co c="6"><na f="c/Chen:Chih=Hao" pid="01/1814">Chih-Hao Chen</na></co>
<co c="0"><na f="c/Chen:Chin=Hsing" pid="41/2635">Chin-Hsing Chen</na></co>
<co c="-1"><na f="c/Chen:K=_Y=" pid="70/6829">K. Y. Chen</na></co>
<co c="0"><na f="c/Chen:Ming=Yang" pid="15/5182">Ming-Yang Chen</na></co>
<co c="2"><na f="c/Chen:Pei=Te" pid="21/4787">Pei-Te Chen</na></co>
<co c="0"><na f="c/Chen:Tsuhan" pid="c/TsuhanChen">Tsuhan Chen</na></co>
<co c="0"><na f="c/Cheng:Jiin=Chiou" pid="77/7372">Jiin-Chiou Cheng</na></co>
<co c="0"><na f="c/Cheng:Yu=Chin" pid="94/2075">Yu-Chin Cheng</na></co>
<co c="0"><na f="c/Chiang:Chung=Chih" pid="48/3183">Chung-Chih Chiang</na></co>
<co c="0"><na f="c/Chien:Hung=Yu" pid="16/6905">Hung-Yu Chien</na></co>
<co c="0" n="2"><na f="c/Chiou:Shin=Yan" pid="93/7486">Shin-Yan Chiou</na><na>Shin Yan Chiou</na></co>
<co c="0"><na f="c/Chiou:Wen=Hong" pid="68/3463">Wen-Hong Chiou</na></co>
<co c="1"><na f="c/Chung:Pei=Yun" pid="16/1861">Pei-Yun Chung</na></co>
<co c="2"><na f="d/Dacier:Marc" pid="76/5806">Marc Dacier</na></co>
<co c="0"><na f="f/Fu:Chun=Ju" pid="66/6440">Chun-Ju Fu</na></co>
<co c="1"><na f="g/Gao:Jian=Bin" pid="66/2106">Jian-Bin Gao</na></co>
<co c="0"><na f="g/Gau:Min=Jea" pid="40/6761">Min-Jea Gau</na></co>
<co c="0"><na f="g/Guan:Dah=Jyh" pid="45/2140">Dah-Jyh Guan</na></co>
<co c="0" n="2"><na f="h/Han:Yunghsiang_Sam" pid="74/5823">Yunghsiang Sam Han</na><na>Yunghsiang Han</na></co>
<co c="0"><na f="h/Harn:Lein" pid="h/LeinHarn">Lein Harn</na></co>
<co c="0"><na f="h/Hou:Yung=Tsung" pid="68/4529">Yung-Tsung Hou</na></co>
<co c="5"><na f="h/Hsu:Bor=Wen" pid="150/5321">Bor-Wen Hsu</na></co>
<co c="0"><na f="h/Huang:David" pid="51/845">David Huang</na></co>
<co c="4"><na f="h/Huang:Nern=Min" pid="207/3225">Nern-Min Huang</na></co>
<co c="0"><na f="h/Hwang:Tzonelih" pid="36/1922">Tzonelih Hwang</na></co>
<co c="0"><na f="i/Imai:Hideki" pid="14/1398">Hideki Imai</na></co>
<co c="0"><na f="j/Jen:Shang=Ming" pid="48/10709">Shang-Ming Jen</na></co>
<co c="0"><na f="j/Jeng:Bingchiang" pid="94/5277">Bingchiang Jeng</na></co>
<co c="0"><na f="k/Kuo:Jyun=Rong" pid="261/7188">Jyun-Rong Kuo</na></co>
<co c="0"><na f="k/Kuo:Wen=Chung" pid="82/2421">Wen-Chung Kuo</na></co>
<co c="0"><na f="l/Lai:Gu_Hsin" pid="59/234">Gu Hsin Lai</na></co>
<co c="0"><na f="l/Lee:Chin=Feng" pid="77/6612">Chin-Feng Lee</na></co>
<co c="0"><na f="l/Lee:Jau=Yien" pid="15/408">Jau-Yien Lee</na></co>
<co c="0"><na f="l/Lee:Yung=Cheng" pid="10/5620">Yung-Cheng Lee</na></co>
<co c="0"><na f="l/Lin:Chen=Chi" pid="02/2202">Chen-Chi Lin</na></co>
<co c="1"><na f="l/Lin:Chi=San" pid="86/5966">Chi-San Lin</na></co>
<co c="6"><na f="l/Lin:Ching=Huang" pid="53/7827">Ching-Huang Lin</na></co>
<co c="0"><na f="l/Lin:Hsiao=Ching" pid="123/8327">Hsiao-Ching Lin</na></co>
<co c="0"><na f="l/Lin:Hui=Tang" pid="42/2662">Hui-Tang Lin</na></co>
<co c="0"><na f="l/Lin:Mao=Jie" pid="85/11208">Mao-Jie Lin</na></co>
<co c="0"><na f="l/Lin:Shih=Fen" pid="83/7777">Shih-Fen Lin</na></co>
<co c="0"><na f="l/Lu:Chia=Yu" pid="10/9351">Chia-Yu Lu</na></co>
<co c="7"><na f="l/Lu:Shih=Chuan" pid="53/5054">Shih-Chuan Lu</na></co>
<co c="0"><na f="m/Matsumoto:Tsutomu" pid="58/4020">Tsutomu Matsumoto</na></co>
<co c="2"><na f="p/Pouget:Fabien" pid="50/1616">Fabien Pouget</na></co>
<co c="0"><na f="s/Su:Yan=Kuin" pid="00/645">Yan-Kuin Su</na></co>
<co c="0"><na f="s/Sun:Hung=Min" pid="42/1523">Hung-Min Sun</na></co>
<co c="0"><na f="s/Sun:Ming=Kung" pid="51/11208">Ming-Kung Sun</na></co>
<co c="3"><na f="t/Tai:Wen=Chung" pid="78/6829">Wen-Chung Tai</na></co>
<co c="4"><na f="t/Tsai:Hang=Geng" pid="207/3221">Hang-Geng Tsai</na></co>
<co c="3"><na f="t/Tu:Fu=Kuan" pid="41/5180">Fu-Kuan Tu</na></co>
<co c="3"><na f="t/Tung:Hsu=Hung" pid="159/2330">Hsu-Hung Tung</na></co>
<co c="0"><na f="w/Wang_0002:Jun=Wei" pid="73/4640-2">Jun-Wei Wang 0002</na></co>
<co c="4"><na f="w/Wang:Lih=Yang" pid="69/4580">Lih-Yang Wang</na></co>
<co c="0"><na f="w/Wang:Shyh=Yih" pid="92/6767">Shyh-Yih Wang</na></co>
<co c="1"><na f="w/Wen:Jia=Rong" pid="83/3926">Jia-Rong Wen</na></co>
<co c="7"><na f="w/Wu:Shee=Yau" pid="72/360">Shee-Yau Wu</na></co>
<co c="0"><na f="w/Wu:Tzong=Chen" pid="93/2842">Tzong-Chen Wu</na></co>
<co c="1"><na f="w/Wu:Wan=Chi" pid="46/1558">Wan-Chi Wu</na></co>
<co c="0"><na f="y/Yang:Ching=Nung" pid="21/1931">Ching-Nung Yang</na></co>
<co c="0"><na f="y/Yang:Wu=Chuan" pid="51/752">Wu-Chuan Yang</na></co>
<co c="1"><na f="y/Yang:Ya=Ting_Carolyn" pid="34/2060">Ya-Ting Carolyn Yang</na></co>
<co c="0"><na f="y/Yen:Hong=Yi" pid="261/7203">Hong-Yi Yen</na></co>
<co c="0"><na f="y/Yen:Sung=Ming" pid="88/4820">Sung-Ming Yen</na></co>
</coauthors>
</dblpperson>

