Chi-Sung Laih

According to our database1, Chi-Sung Laih authored at least 70 papers between 1989 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication.
IEEE Trans. Computers, 2013

Natural language letter based visual cryptography scheme.
J. Vis. Commun. Image Represent., 2013

2012
Server-less RFID authentication and searching protocol with enhanced security.
Int. J. Commun. Syst., 2012

A Trust Distributed DRM System Using Smart Cards.
IEICE Trans. Inf. Syst., 2012

Long-term confidentiality of PKI.
Commun. ACM, 2012

2011
A challenge-based trust establishment protocol for peer-to-peer networks.
Secur. Commun. Networks, 2011

Malware Virtualization-Resistant Behavior Detection.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
Malicious web content detection by machine learning.
Expert Syst. Appl., 2010

Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET.
Sensors, 2009

ECC-based lightweight authentication protocol with untraceability for low-cost RFID.
J. Parallel Distributed Comput., 2009

Conference key agreement protocol with non-interactive fault-tolerance over broadcast network.
Int. J. Inf. Sec., 2009

Adaptive key pre-distribution model for distributed sensor networks.
IET Commun., 2009

A collaborative anti-spam system.
Expert Syst. Appl., 2009

A Ticket Based Digital Rights Management Model.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Efficient Key Distribution for Access Control in Pay-TV Systems.
IEEE Trans. Multim., 2008

IDSIC: an intrusion detection system with identification capability.
Int. J. Inf. Sec., 2008

Malicious Webpage Detection by Semantics-Aware Reasoning.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan.
Proceedings of the Advances in Web Based Learning, 2008

A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Defending On-Line Web Application Security with User-Behavior Surveillance.
Proceedings of the The Third International Conference on Availability, 2008

2007
Fast Multicomputation with Asynchronous Strategy.
IEEE Trans. Computers, 2007

Generating Attack Scenarios with Causal Relationship.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

2006
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme.
IEEE Trans. Dependable Secur. Comput., 2006

Design a Secure and Practical Metering Scheme.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

Authorized Tracking and Tracing for RFID Tags.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies.
J. Syst. Softw., 2005

Cryptanalyses of two key assignment schemes based on polynomial interpolations.
Comput. Secur., 2005

Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation.
Appl. Math. Comput., 2005

A DCT Quantization-Based Image Authentication System for Digital Forensics.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Comparative Survey of Local Honeypot Sensors to Assist Network Forensics.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

Fast Multi-computations with Integer Similarity Strategy.
Proceedings of the Public Key Cryptography, 2005

2004
Generating visible RSA public keys for PKI.
Int. J. Inf. Sec., 2004

Design of AES Based on Dual Cipher and Composite Field.
Proceedings of the Topics in Cryptology, 2004

2003
New Audio Secret Sharing Schemes With Time Division Technique.
J. Inf. Sci. Eng., 2003

Cryptanalysis of an optimized protocol for mobile network authentication and security.
Inf. Process. Lett., 2003

A Tempo-Based <i>t</i>-out-of-<i>n</i> Audio Cryptography Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

The GPKI developing status of Taiwan and some major Asia countries.
Comput. Commun., 2003

2002
On the Design of RSA With Short Secret Exponent.
J. Inf. Sci. Eng., 2002

2000
Cryptanalysis of Nyberg-Rueppel's message recovery scheme.
IEEE Commun. Lett., 2000

New Colored Visual Secret Sharing Schemes.
Des. Codes Cryptogr., 2000

On the hardware design for DES cipher in tamper resistant devices against differential fault analysis.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000

1999
On key distribution management for conditional access system on pay-TV system.
IEEE Trans. Consumer Electron., 1999

On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes.
J. Inf. Sci. Eng., 1999

Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
DC<sub><i>m</i></sub> Codes for Constructing <i>t</i>-EC/AUED Codes.
IEEE Trans. Computers, 1998

1997
Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem.
IEEE Trans. Computers, 1997

A Note on Error-Correcting Codes for Authentication and Subliminal Channels.
Inf. Process. Lett., 1997

On the Key Recovery of the Key Escrow System.
Proceedings of the 13th Annual Computer Security Applications Conference (ACSAC 1997), 1997

1996
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes.
IEEE Trans. Computers, 1996

Multi-Signature for Specified Group of Verifiers.
J. Inf. Sci. Eng., 1996

1995
Improved Digital Signature Suitable for Batch Verification.
IEEE Trans. Computers, 1995

Improved Digital Signature Algorithm.
IEEE Trans. Computers, 1995

On the Security of the Lucas Function.
Inf. Process. Lett., 1995

Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues.
Comput. Commun., 1995

Cryptanalysis of the Enhanced ElGamal's Signature Scheme.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Authentication and protection of public keys.
Comput. Secur., 1994

1993
On the Design of Conference Key Distribution Systems for the Broadcasting Networks.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993

1992
Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle.
J. Inf. Sci. Eng., 1992

The Fast Cascade Exponentation Algorithm and its Applications on Cryptography.
Proceedings of the Advances in Cryptology, 1992

On Verifiable Implicit Asking Protocols for RSA Computation.
Proceedings of the Advances in Cryptology, 1992

Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols.
Proceedings of the Advances in Cryptology, 1992

1991
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence.
Proceedings of the Advances in Cryptology, 1991

Generalized Threshold Cryptosystems.
Proceedings of the Advances in Cryptology, 1991

1989
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial.
IEEE Trans. Software Eng., 1989

Linearly shift knapsack public-key cryptosystem.
IEEE J. Sel. Areas Commun., 1989

A new threshold scheme and its application in designing the conference key distribution cryptosystem.
Inf. Process. Lett., 1989

A New Scheme for ID-Based Cryptosystems and Signature.
Proceedings of the Proceedings IEEE INFOCOM '89, 1989

Password Authentication Based On Public-Key Distribution Cryptosystem.
Proceedings of the Fifth International Conference on Data Engineering, 1989

Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space.
Proceedings of the Advances in Cryptology, 1989


  Loading...