Chung-Han Chen

According to our database1, Chung-Han Chen authored at least 18 papers between 1989 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Imperceptible Simplification on Mobile Displays.
Int. J. Handheld Comput. Res., 2012

Teaching cryptography using hands-on labs (abstract only).
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

2010
On Balancing Energy Consumption, Rendering Speed, and Image Quality on Mobile Devices.
Int. J. Handheld Comput. Res., 2010

An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

High Performance Symmetric Decryption Algorithm on General Purpose Graphics Processing Unit.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2010

Secondary User Authentication Based on Mobile Devices Location.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Using Mobile Devices for Secondary User Authentication.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

Designing an Undergraduate Cryptography Course.
Proceedings of the 2010 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2010

Introducing cryptography course in computer science undergraduate curricula.
Proceedings of the 48th Annual Southeast Regional Conference, 2010

2009
Weighted trust evaluation-based malicious node detection for wireless sensor networks.
Int. J. Inf. Comput. Secur., 2009

Unequal Error Protection (UEP) for Wavelet-Based Wireless 3D Mesh Transmission.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

Yield and Reliability Enhancement for VLSI Design.
Proceedings of the 2009 International Conference on Computer Design, 2009

2008
Infusing Information Assurance into an Undergraduate CS Curriculum.
Proceedings of the Second International Conference on Emerging Security Information, 2008

TUVNL: An Experimental Network Security Lab for Research and Education.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Education in Software Security.
Proceedings of the 2007 International Conference on Security & Management, 2007

1996
Embedding binary tree in VLSI/WSI processor array.
J. Comput. Sci. Technol., 1996

1990
An area-efficient reconfigurable binary tree architecture.
Proceedings of the 1990 IEEE International Conference on Computer Design: VLSI in Computers and Processors, 1990

1989
A systolic approach to multistage interconnection network design.
Proceedings of the Computer Design: VLSI in Computers and Processors, 1989


  Loading...