Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jung-San Lee
@article{DBLP:journals/istr/LeeCCHFL23, author = {Jung{-}San Lee and Ying{-}Chin Chen and Chit{-}Jie Chew and Wei{-}Che Hung and Yun{-}Yi Fan and Bo Li}, title = {Constructing gene features for robust 3D mesh zero-watermarking}, journal = {J. Inf. Secur. Appl.}, volume = {73}, pages = {103414}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103414}, doi = {10.1016/J.JISA.2022.103414}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LeeCCHFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeCHCH23, author = {Jung{-}San Lee and Yin{-}Chin Chen and Yun{-}Hao Hsieh and Shih{-}Hao Chang and Ngoc{-}Tu Huynh}, title = {Preserving friendly stacking and weighted shadows in selective scalable secret image sharing}, journal = {Multim. Tools Appl.}, volume = {82}, number = {19}, pages = {29283--29305}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-14712-7}, doi = {10.1007/S11042-023-14712-7}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeCHCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeCCCHK22, author = {Jung{-}San Lee and Ying{-}Chin Chen and Chit{-}Jie Chew and Chih{-}Lung Chen and Thu{-}Nguyet Huynh and Chung{-}Wei Kuo}, title = {CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training}, journal = {Comput. Secur.}, volume = {122}, pages = {102908}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102908}, doi = {10.1016/J.COSE.2022.102908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LeeCLCT22, author = {Jung{-}San Lee and Chit{-}Jie Chew and Jo{-}Yun Liu and Ying{-}Chin Chen and Kuo{-}Yu Tsai}, title = {Medical blockchain: Data sharing and privacy preserving of {EHR} based on smart contract}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103117}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103117}, doi = {10.1016/J.JISA.2022.103117}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LeeCLCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/WuCCWCL22, author = {Wei{-}Chen Wu and Chit{-}Jie Chew and Ying{-}Chin Chen and Cheng{-}Han Wu and Tzu Hao Chen and Jung{-}San Lee}, title = {Blockchain-Based {WDP} Solution for Real-Time Heterogeneous Computing Resource Allocation}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {4}, pages = {3810--3821}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3215988}, doi = {10.1109/TNSM.2022.3215988}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/WuCCWCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intcompsymp/ChenCCL22, author = {Tzu Hao Chen and Chit{-}Jie Chew and Ying{-}Chin Chen and Jung{-}San Lee}, editor = {Sun{-}Yuan Hsieh and Ling{-}Ju Hung and Ralf Klasing and Chia{-}Wei Lee and Sheng{-}Lung Peng}, title = {Preserving Collusion-Free and Traceability in Car-Sharing System Based on Blockchain}, booktitle = {New Trends in Computer Technologies and Applications - 25th International Computer Symposium, {ICS} 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1723}, pages = {613--624}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-9582-8\_54}, doi = {10.1007/978-981-19-9582-8\_54}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intcompsymp/ChenCCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChewCLCT21, author = {Chit{-}Jie Chew and Ying{-}Chin Chen and Jung{-}San Lee and Chih{-}Lung Chen and Kuo{-}Yu Tsai}, title = {Preserving indomitable DDoS vitality through resurrection social hybrid botnet}, journal = {Comput. Secur.}, volume = {106}, pages = {102284}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102284}, doi = {10.1016/J.COSE.2021.102284}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChewCLCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/ChengCSHL21, author = {Ting{-}Fang Cheng and Ying{-}Chin Chen and Zhu{-}Dao Song and Ngoc{-}Tu Huynh and Jung{-}San Lee}, title = {Secure session between an IoT device and a cloud server based on elliptic curve cryptosystem}, journal = {Int. J. Inf. Comput. Secur.}, volume = {15}, number = {1}, pages = {67--87}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.115348}, doi = {10.1504/IJICS.2021.115348}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/ChengCSHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeLCHL21, author = {Jung{-}San Lee and Chieh Liu and Ying{-}Chin Chen and Wei{-}Che Hung and Bo Li}, title = {Robust 3D mesh zero-watermarking based on spherical coordinate and Skewness measurement}, journal = {Multim. Tools Appl.}, volume = {80}, number = {17}, pages = {25757--25772}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-10878-0}, doi = {10.1007/S11042-021-10878-0}, timestamp = {Mon, 07 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LeeLCHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LeeCCW21, author = {Jung{-}San Lee and Chit{-}Jie Chew and Ying{-}Chin Chen and Kuo{-}Jui Wei}, title = {Preserving Liberty and Fairness in Combinatorial Double Auction Games Based on Blockchain}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {3}, pages = {3517--3527}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.3027948}, doi = {10.1109/JSYST.2020.3027948}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LeeCCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HongHCL20, author = {Wei{-}Chih Hong and Ding{-}Ray Huang and Chih{-}Lung Chen and Jung{-}San Lee}, title = {Towards Accurate and Efficient Classification of Power System Contingencies and Cyber-Attacks Using Recurrent Neural Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {123297--123309}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3007609}, doi = {10.1109/ACCESS.2020.3007609}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HongHCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/BuiLLWL20, author = {Quy{-}Anh Bui and Wei{-}Bin Lee and Jung{-}San Lee and Hsiao{-}Ling Wu and Jo{-}Yun Liu}, title = {Biometric-based key management for satisfying patient's control over health information in the {HIPAA} regulations}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {14}, number = {1}, pages = {437--454}, year = {2020}, url = {https://doi.org/10.3837/tiis.2020.01.024}, doi = {10.3837/TIIS.2020.01.024}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/BuiLLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChouNCLL20, author = {Yung{-}Chen Chou and Yu{-}Wei Nien and Ying{-}Chin Chen and Bo Li and Jung{-}San Lee}, title = {Learning salient seeds refer to the manifold ranking and background-prior strategy}, journal = {Multim. Tools Appl.}, volume = {79}, number = {9-10}, pages = {5859--5879}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-08299-1}, doi = {10.1007/S11042-019-08299-1}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChouNCLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfet/YangWYLH20, author = {Cheng{-}Hsing Yang and Chi{-}Yao Weng and Yu{-}Zhen Yang and Jung{-}San Lee and Cheng{-}Ta Huang}, title = {Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches for Images}, booktitle = {{ICFET} 2020, The 6th International Conference on Frontiers of Educational Technologies, Tokyo, Japan, June 5-8, 2020}, pages = {125--129}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3404709.3404761}, doi = {10.1145/3404709.3404761}, timestamp = {Wed, 29 Jul 2020 16:36:11 +0200}, biburl = {https://dblp.org/rec/conf/icfet/YangWYLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenWLHL19, author = {Ying{-}Chin Chen and Kuo{-}Jui Wei and Jung{-}San Lee and Ngoc{-}Tu Huynh and Jyun{-}Hong Lin}, title = {{AAVSS:} Auxiliary Authorization Mechanism Based on Arbitrary-Angle {VSS}}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {4}, pages = {537--544}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p537-544.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenWLHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeLL19, author = {Jung{-}San Lee and Chih{-}Hsuan Li and Hsin{-}Yu Lee}, title = {Visibility dehazing based on channel-weighted analysis and illumination tuning}, journal = {Multim. Tools Appl.}, volume = {78}, number = {2}, pages = {1831--1856}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6280-2}, doi = {10.1007/S11042-018-6280-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeSW18, author = {Jung{-}San Lee and Hong{-}Chi Su and Kuo{-}Jui Wei}, title = {Refining irregular image illumination with concurrent ownership embedding}, journal = {Multim. Tools Appl.}, volume = {77}, number = {15}, pages = {19851--19868}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-5414-2}, doi = {10.1007/S11042-017-5414-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ChenLS18, author = {Ying{-}Chin Chen and Jung{-}San Lee and Hong{-}Chi Su}, title = {Selective scalable secret image sharing with adaptive pixel-embedding technique}, journal = {Multim. Tools Appl.}, volume = {77}, number = {20}, pages = {27107--27121}, year = {2018}, url = {https://doi.org/10.1007/s11042-018-5908-6}, doi = {10.1007/S11042-018-5908-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ChenLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/WeiL017, author = {Kuo{-}Jui Wei and Jung{-}San Lee and Bo Li}, title = {{SMP:} Scalable Multicast Protocol for Granting Authority in Heterogeneous Networks}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {1}, pages = {60--71}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p60-71.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/WeiL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeC17, author = {Jung{-}San Lee and You{-}Ren Chen}, title = {Selective scalable secret image sharing with verification}, journal = {Multim. Tools Appl.}, volume = {76}, number = {1}, pages = {1--11}, year = {2017}, url = {https://doi.org/10.1007/s11042-015-3011-9}, doi = {10.1007/S11042-015-3011-9}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeWW17, author = {Jung{-}San Lee and Kuo{-}Jui Wei and Kai{-}Rui Wen}, title = {Image structure rebuilding technique using fractal dimension on the best match patch searching}, journal = {Multim. Tools Appl.}, volume = {76}, number = {2}, pages = {1875--1899}, year = {2017}, url = {https://doi.org/10.1007/s11042-015-3184-2}, doi = {10.1007/S11042-015-3184-2}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LeeWCS16, author = {Jung{-}San Lee and Kuo{-}Jui Wei and Ying{-}Chin Chen and Yun{-}Hsiang Sun}, title = {Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {10}, number = {12}, pages = {5616--5642}, year = {2016}, url = {https://doi.org/10.3837/tiis.2016.12.025}, doi = {10.3837/TIIS.2016.12.025}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LeeWCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeWCW16, author = {Jung{-}San Lee and Kuo{-}Jui Wei and Shin{-}Jen Chen and Yi{-}Hua Wang}, title = {Tele-micropayment scam prevention based on visual secret sharing technique}, journal = {Multim. Tools Appl.}, volume = {75}, number = {4}, pages = {2233--2248}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2403-6}, doi = {10.1007/S11042-014-2403-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeWCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LeeWL16, author = {Jung{-}San Lee and Kai{-}Rui Wen and Bo Li}, title = {Renovating Contaminative Image Archives Based on Patch Propagation and Adaptive Confidence Collation}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {26}, number = {5}, pages = {1004--1011}, year = {2016}, url = {https://doi.org/10.1109/TCSVT.2015.2430591}, doi = {10.1109/TCSVT.2015.2430591}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LeeWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/LeeCHT15, author = {Jung{-}San Lee and Chin{-}Chen Chang and Ngoc{-}Tu Huynh and Hsin{-}Yi Tsai}, title = {Preserving user-friendly shadow and high-contrast quality for multiple visual secret sharing technique}, journal = {Digit. Signal Process.}, volume = {40}, pages = {131--139}, year = {2015}, url = {https://doi.org/10.1016/j.dsp.2015.02.012}, doi = {10.1016/J.DSP.2015.02.012}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/LeeCHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/WeiLC15, author = {Kuo{-}Jui Wei and Jung{-}San Lee and Shin{-}Jen Chen}, title = {Enhancing the Security of Credit Card Transaction based on Visual {DSC}}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {9}, number = {3}, pages = {1231--1245}, year = {2015}, url = {https://doi.org/10.3837/tiis.2015.03.022}, doi = {10.3837/TIIS.2015.03.022}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/WeiLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LeeWCW15, author = {Jung{-}San Lee and Hsiao{-}Shan Wong and You{-}Ren Chen and Yi{-}Hua Wang}, title = {Stable watermarking technique based on {XNOR} operation and scale relationship}, journal = {Multim. Tools Appl.}, volume = {74}, number = {17}, pages = {6797--6826}, year = {2015}, url = {https://doi.org/10.1007/s11042-014-1930-5}, doi = {10.1007/S11042-014-1930-5}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LeeWCW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeemm/LeeL14, author = {Jung{-}San Lee and Bo Li}, title = {Self-Recognized Image Protection Technique that Resists Large-Scale Cropping}, journal = {{IEEE} Multim.}, volume = {21}, number = {1}, pages = {60--73}, year = {2014}, url = {https://doi.org/10.1109/MMUL.2014.14}, doi = {10.1109/MMUL.2014.14}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeemm/LeeL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeeH14, author = {Jung{-}San Lee and Ya{-}Chieh Huang}, title = {Fast authentication mechanism with provable correctness for cluster-based VANETs}, journal = {Secur. Commun. Networks}, volume = {7}, number = {6}, pages = {1016--1030}, year = {2014}, url = {https://doi.org/10.1002/sec.818}, doi = {10.1002/SEC.818}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeeH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/LeeL13, author = {Jung{-}San Lee and Kun{-}Shian Lin}, title = {An innovative electronic group-buying system for mobile commerce}, journal = {Electron. Commer. Res. Appl.}, volume = {12}, number = {1}, pages = {1--13}, year = {2013}, url = {https://doi.org/10.1016/j.elerap.2012.09.005}, doi = {10.1016/J.ELERAP.2012.09.005}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/LeeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LeeKL13, author = {Jung{-}San Lee and Wei{-}Chiang Kao and Bo Li}, title = {Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness}, journal = {{IET} Inf. Secur.}, volume = {7}, number = {3}, pages = {172--180}, year = {2013}, url = {https://doi.org/10.1049/iet-ifs.2011.0327}, doi = {10.1049/IET-IFS.2011.0327}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LeeKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/LeeH13, author = {Jung{-}San Lee and Ming{-}Huang Hsieh}, title = {Preserving user-participation for insecure network communications with {CAPTCHA} and visual secret sharing technique}, journal = {{IET} Networks}, volume = {2}, number = {2}, pages = {81--91}, year = {2013}, url = {https://doi.org/10.1049/iet-net.2011.0019}, doi = {10.1049/IET-NET.2011.0019}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/LeeH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LeeCW13, author = {Jung{-}San Lee and Chin{-}Chen Chang and Kuo{-}Jui Wei}, title = {Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {5}, pages = {405--410}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p405-410.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LeeCW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ivc/LinCCL13, author = {Pei{-}Yu Lin and Yi{-}Hui Chen and Chin{-}Chen Chang and Jung{-}San Lee}, title = {Contrast-Adaptive Removable Visible Watermarking {(CARVW)} mechanism}, journal = {Image Vis. Comput.}, volume = {31}, number = {4}, pages = {311--321}, year = {2013}, url = {https://doi.org/10.1016/j.imavis.2013.02.002}, doi = {10.1016/J.IMAVIS.2013.02.002}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ivc/LinCCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/Lee13, author = {Jung{-}San Lee}, title = {{RII:} Renovating the irregular illumination of digital image archives}, journal = {J. Vis. Commun. Image Represent.}, volume = {24}, number = {7}, pages = {739--751}, year = {2013}, url = {https://doi.org/10.1016/j.jvcir.2013.05.002}, doi = {10.1016/J.JVCIR.2013.05.002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/Lee13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LeeL13, author = {Jung{-}San Lee and Bo Li}, title = {Notes on "Authentication protocol using an identifier in an ad hoc network environment"}, journal = {Math. Comput. Model.}, volume = {57}, number = {5-6}, pages = {1572--1575}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.11.018}, doi = {10.1016/J.MCM.2012.11.018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LeeL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangWLL13, author = {Chien{-}Chang Yang and Kuo{-}Jui Wei and Bo Li and Jung{-}San Lee}, title = {{HORME:} hierarchical-object-relational medical management for electronic record}, journal = {Secur. Commun. Networks}, volume = {6}, number = {10}, pages = {1261--1270}, year = {2013}, url = {https://doi.org/10.1002/sec.704}, doi = {10.1002/SEC.704}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangWLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/LeeT13, author = {Jung{-}San Lee and Wan{-}Ting Tseng}, title = {A wide-adapted bantam protocol for roaming across wireless areas}, journal = {Wirel. Networks}, volume = {19}, number = {6}, pages = {1423--1440}, year = {2013}, url = {https://doi.org/10.1007/s11276-013-0542-8}, doi = {10.1007/S11276-013-0542-8}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/LeeT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/LeeL12, author = {Jung{-}San Lee and Kun{-}Shian Lin}, title = {A robust e-commerce service: Light-weight secure mail-order mechanism}, journal = {Electron. Commer. Res. Appl.}, volume = {11}, number = {4}, pages = {388--396}, year = {2012}, url = {https://doi.org/10.1016/j.elerap.2012.04.001}, doi = {10.1016/J.ELERAP.2012.04.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/LeeL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeH11, author = {Jung{-}San Lee and Ming{-}Huang Hsieh}, title = {An interactive mobile {SMS} confirmation method using secret sharing technique}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {830--839}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.07.001}, doi = {10.1016/J.COSE.2011.07.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/LinLC11, author = {Pei{-}Yu Lin and Jung{-}San Lee and Chin{-}Chen Chang}, title = {Protecting the content integrity of digital imagery with fidelity preservation}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {7}, number = {3}, pages = {15:1--15:20}, year = {2011}, url = {https://doi.org/10.1145/2000486.2000489}, doi = {10.1145/2000486.2000489}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/LinLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dsp/ChangLL10, author = {Chin{-}Chen Chang and Jung{-}San Lee and T. Hoang Ngan Le}, title = {Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector}, journal = {Digit. Signal Process.}, volume = {20}, number = {4}, pages = {1286--1307}, year = {2010}, url = {https://doi.org/10.1016/j.dsp.2009.11.005}, doi = {10.1016/J.DSP.2009.11.005}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dsp/ChangLL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LeeLC10, author = {Jung{-}San Lee and Pei{-}Yu Lin and Chin{-}Chen Chang}, title = {Lightweight Secure Roaming Mechanism Between {GPRS/UMTS} and Wireless LANs}, journal = {Wirel. Pers. Commun.}, volume = {53}, number = {4}, pages = {569--580}, year = {2010}, url = {https://doi.org/10.1007/s11277-009-9703-6}, doi = {10.1007/S11277-009-9703-6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LeeLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/ChangCL09, author = {Chin{-}Chen Chang and Shih{-}Chang Chang and Jung{-}San Lee}, title = {An on-line electronic check system with mutual authentication}, journal = {Comput. Electr. Eng.}, volume = {35}, number = {5}, pages = {757--763}, year = {2009}, url = {https://doi.org/10.1016/j.compeleceng.2009.02.007}, doi = {10.1016/J.COMPELECENG.2009.02.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/ChangCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeeCI09, author = {Jung{-}San Lee and Chin{-}Chen Chang}, title = {Design of electronic t-out-of-n lotteries on the Internet}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {2}, pages = {395--400}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.05.004}, doi = {10.1016/J.CSI.2008.05.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LeeCI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeC09b, author = {Jung{-}San Lee and Chin{-}Chen Chang}, title = {A Secure Multicast Framework in Large and High-Mobility Network Groups}, journal = {{IEICE} Trans. Commun.}, volume = {92-B}, number = {7}, pages = {2365--2373}, year = {2009}, url = {https://doi.org/10.1587/transcom.E92.B.2365}, doi = {10.1587/TRANSCOM.E92.B.2365}, timestamp = {Mon, 13 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeC09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LeeCC09, author = {Jung{-}San Lee and Chi{-}Shiang Chan and Chin{-}Chen Chang}, title = {Non-iterative privacy preservation for online lotteries}, journal = {{IET} Inf. Secur.}, volume = {3}, number = {4}, pages = {139--147}, year = {2009}, url = {https://doi.org/10.1049/iet-ifs.2008.0104}, doi = {10.1049/IET-IFS.2008.0104}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LeeCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ChangL09, author = {Chin{-}Chen Chang and Jung{-}San Lee}, title = {Robust t-out-of-n oblivious transfer mechanism based on {CRT}}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {226--235}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.03.004}, doi = {10.1016/J.JNCA.2008.03.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ChangL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/LinLC09, author = {Pei{-}Yu Lin and Jung{-}San Lee and Chin{-}Chen Chang}, title = {Distortion-free secret image sharing mechanism using modulus operator}, journal = {Pattern Recognit.}, volume = {42}, number = {5}, pages = {886--895}, year = {2009}, url = {https://doi.org/10.1016/j.patcog.2008.09.014}, doi = {10.1016/J.PATCOG.2008.09.014}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pr/LinLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LeeCC09, author = {Jung{-}San Lee and Chin{-}Hao Chen and Chin{-}Chen Chang}, title = {A Novel Illumination-Balance Technique for Improving the Quality of Degraded Text-Photo Images}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {19}, number = {6}, pages = {900--905}, year = {2009}, url = {https://doi.org/10.1109/TCSVT.2009.2017314}, doi = {10.1109/TCSVT.2009.2017314}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LeeCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LinLC09, author = {Pei{-}Yu Lin and Jung{-}San Lee and Chin{-}Chen Chang}, title = {Dual Digital Watermarking for Internet Media Based on Hybrid Strategies}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {19}, number = {8}, pages = {1169--1177}, year = {2009}, url = {https://doi.org/10.1109/TCSVT.2009.2020263}, doi = {10.1109/TCSVT.2009.2020263}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LinLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/his/ChangLL09, author = {Chin{-}Chen Chang and Pei{-}Yu Lin and Jung{-}San Lee}, editor = {Ge Yu and Mario K{\"{o}}ppen and Shyi{-}Ming Chen and Xiamu Niu}, title = {A Self-Reference Watermarking Scheme Based on Wet Paper Coding}, booktitle = {9th International Conference on Hybrid Intelligent Systems {(HIS} 2009), August 12-14, 2009, Shenyang, China}, pages = {228--233}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/HIS.2009.52}, doi = {10.1109/HIS.2009.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/his/ChangLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ncm/LeeLC09, author = {Jung{-}San Lee and Bo Li and Yung{-}Chen Chou}, editor = {Jinhwa Kim and Dursun Delen and Jinsoo Park and Franz Ko and Chen Rui and Jong Hyung Lee and Jian Wang and Gang Kou}, title = {A Brand-New Mobile Value-Added Service: M-Check}, booktitle = {International Conference on Networked Computing and Advanced Information Management, {NCM} 2009, Fifth International Joint Conference on INC, {IMS} and {IDC:} {INC} 2009: International Conference on Networked Computing, {IMS} 2009: International Conference on Advanced Information Management and Service, {IDC} 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009}, pages = {2050--2055}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NCM.2009.278}, doi = {10.1109/NCM.2009.278}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ncm/LeeLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/LeeL09, author = {Jung{-}San Lee and T. Hoang Ngan Le}, title = {Hybrid (2, n) Visual Secret Sharing Scheme for Color Images}, booktitle = {2009 {IEEE} International Conference on Computing and Communication Technologies, {RIVF} 2009, Da Nang, Vietnam, 13-17 July, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/RIVF.2009.5174642}, doi = {10.1109/RIVF.2009.5174642}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rivf/LeeL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeeC08, author = {Jung{-}San Lee and Chin{-}Chen Chang}, title = {Preserving data integrity in mobile \emph{ad hoc} networks with variant Diffie-Hellman protocol}, journal = {Secur. Commun. Networks}, volume = {1}, number = {4}, pages = {277--286}, year = {2008}, url = {https://doi.org/10.1002/sec.21}, doi = {10.1002/SEC.21}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeeC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuimc/ChangLC08, author = {Chin{-}Chen Chang and Jung{-}San Lee and Ting{-}Fang Cheng}, editor = {Won Kim and Hyung{-}Jin Choi}, title = {Security design for three-party encrypted key exchange protocol using smart cards}, booktitle = {Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, {ICUIMC} 2008, Suwon, Korea, January 31 - February 01, 2008}, pages = {329--333}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352793.1352862}, doi = {10.1145/1352793.1352862}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icuimc/ChangLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/LiLC08, author = {Jing Li and Jung{-}San Lee and Chin{-}Chen Chang}, editor = {Jeng{-}Shyang Pan and Xiamu Niu and Hsiang{-}Cheh Huang and Lakhmi C. Jain}, title = {Preserving {PHI} in Compliance with {HIPAA} Privacy/Security Regulations Using Cryptographic Techniques}, booktitle = {4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17 August 2008, Proceedings}, pages = {1545--1548}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IIH-MSP.2008.38}, doi = {10.1109/IIH-MSP.2008.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/LiLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/ChangL08a, author = {Chin{-}Chen Chang and Jung{-}San Lee}, editor = {Jeng{-}Shyang Pan and Ajith Abraham and Chin{-}Chen Chang}, title = {Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol}, booktitle = {Eighth International Conference on Intelligent Systems Design and Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes}, pages = {467--471}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISDA.2008.334}, doi = {10.1109/ISDA.2008.334}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isda/ChangL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChengLC07, author = {Ting{-}Fang Cheng and Jung{-}San Lee and Chin{-}Chen Chang}, title = {Security enhancement of an IC-card-based remote login mechanism}, journal = {Comput. Networks}, volume = {51}, number = {9}, pages = {2280--2287}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2007.01.013}, doi = {10.1016/J.COMNET.2007.01.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChengLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmc/LeeCCC07, author = {Jung{-}San Lee and Chin{-}Chen Chang and Pen{-}Yi Chang}, title = {Anonymous authentication scheme for wireless communications}, journal = {Int. J. Mob. Commun.}, volume = {5}, number = {5}, pages = {590--601}, year = {2007}, url = {https://doi.org/10.1504/IJMC.2007.013941}, doi = {10.1504/IJMC.2007.013941}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmc/LeeCCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LeeC07, author = {Jung{-}San Lee and Chin{-}Chen Chang}, title = {Secure communications for cluster-based ad hoc networks using node identities}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {4}, pages = {1377--1396}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2006.10.003}, doi = {10.1016/J.JNCA.2006.10.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LeeC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChangL06, author = {Chin{-}Chen Chang and Jung{-}San Lee}, title = {An anonymous voting mechanism based on the key exchange protocol}, journal = {Comput. Secur.}, volume = {25}, number = {4}, pages = {307--314}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.02.004}, doi = {10.1016/J.COSE.2006.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChangL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmc/ChangLC06, author = {Ya{-}Fen Chang and Jung{-}San Lee and Chin{-}Chen Chang}, title = {A secure and efficient authentication scheme for mobile users}, journal = {Int. J. Mob. Commun.}, volume = {4}, number = {5}, pages = {581--594}, year = {2006}, url = {https://doi.org/10.1504/IJMC.2006.009261}, doi = {10.1504/IJMC.2006.009261}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmc/ChangLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChangLC05, author = {Chin{-}Chen Chang and Jung{-}San Lee and Ya{-}Fen Chang}, title = {Efficient authentication protocols of {GSM}}, journal = {Comput. Commun.}, volume = {28}, number = {8}, pages = {921--928}, year = {2005}, url = {https://doi.org/10.1016/j.comcom.2005.01.015}, doi = {10.1016/J.COMCOM.2005.01.015}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChangLC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ChangLC05, author = {Chin{-}Chen Chang and Jung{-}San Lee and Chang{-}Chu Chen}, title = {On the Forward and Backward Secrecy of {HLL} Group Key Exchange Mechanism}, booktitle = {Fifth International Conference on Computer and Information Technology {(CIT} 2005), 21-23 September 2005, Shanghai, China}, pages = {702--705}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CIT.2005.149}, doi = {10.1109/CIT.2005.149}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ChangLC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ChangL05, author = {Chin{-}Chen Chang and Jung{-}San Lee}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Improvement on an Optimized Protocol for Mobile Network Authentication and Security}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {538--541}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_79}, doi = {10.1007/11596981\_79}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/ChangL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cw/ChangKL05, author = {Chin{-}Chen Chang and Jui{-}Yi Kuo and Jung{-}San Lee}, title = {Time-bounded Based Password Authentication Scheme}, booktitle = {4th International Conference on Cyberworlds {(CW} 2005), 23-25 November 2005, Singapore}, pages = {117--122}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CW.2005.90}, doi = {10.1109/CW.2005.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cw/ChangKL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ride/ChangLL05, author = {Chin{-}Chen Chang and Yu{-}Chiang Li and Jung{-}San Lee}, title = {An Efficient Algorithm for Incremental Mining of Association Rules}, booktitle = {15th International Workshop on Research Issues in Data Engineering {(RIDE-SDMA} 2005), Stream Data Mining and Applications, 3-7 April 2005, Tokyo, Japan}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/RIDE.2005.6}, doi = {10.1109/RIDE.2005.6}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ride/ChangLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cw/ChangL04a, author = {Chin{-}Chen Chang and Jung{-}San Lee}, title = {An Efficient and Secure Multi-Server Password Authentication Scheme using Smart Cards}, booktitle = {3rd International Conference on Cyberworlds {(CW} 2004), 18-20 November 2004, Tokyo, Japan}, pages = {417--422}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CW.2004.17}, doi = {10.1109/CW.2004.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cw/ChangL04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.