Chung-Chih Li

According to our database1, Chung-Chih Li authored at least 21 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SDT: Towards a Blockchain-Based Secure Data Trading Application.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2024

2016
An Improved Artificial Bee Colony Algorithm Applied to Engineering Optimization Problems.
J. Inf. Sci. Eng., 2016

2014
Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft.
IEEE Syst. J., 2014

2013
Simple linear string constraints.
Formal Aspects Comput., 2013

2010
A String Constraint Solver for Detecting Web Application Vulnerability.
Proceedings of the 22nd International Conference on Software Engineering & Knowledge Engineering (SEKE'2010), Redwood City, San Francisco Bay, CA, USA, July 1, 2010

Modeling Regular Replacement for String Constraint Solving.
Proceedings of the Second NASA Formal Methods Symposium, 2010

2009
Speed-Up Theorems in Type-2 Computations Using Oracle Turing Machines.
Theory Comput. Syst., 2009

2008
Security co-existence of wireless sensor networks and RFID for pervasive computing.
Comput. Commun., 2008

Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing.
Comput. Commun., 2008

Secret Little Functions and Codebook for Protecting Users from Password Theft.
Proceedings of IEEE International Conference on Communications, 2008

A Virtual Password Scheme to Protect Passwords.
Proceedings of IEEE International Conference on Communications, 2008

Multi-Lateral Constructive Learning Process with Hands-On Problem-Based Solving Technology.
Proceedings of the 2008 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2008

2007
Self-organizing map based web pages clustering using web logs.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

Speed-Up Theorems in Type-2 Computation.
Proceedings of the Computation and Logic in the Real World, 2007

2006
A lightweight secure protocol for wireless sensor networks.
Comput. Commun., 2006

A LCG-based Secure Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

A Lightweight Secure Solution for RFID.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Using Joseki for Tactics Deployment in Computer Go.
J. Int. Comput. Games Assoc., 2005

Canonical Sequence Directed Tactics Analyzer for Computer Go Games.
Proceedings of the 2005 International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 2005), 2005

Using Linear Congruential Generators for Cryptographic Purposes.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

2004
Asymptotic Behaviors of Type-2 Algorithms and Induced Baire Topologies.
Proceedings of the Exploring New Frontiers of Theoretical Informatics, 2004


  Loading...