BibTeX records: Jung-San Lee

download as .bib file

@article{DBLP:journals/istr/LeeCCHFL23,
  author       = {Jung{-}San Lee and
                  Ying{-}Chin Chen and
                  Chit{-}Jie Chew and
                  Wei{-}Che Hung and
                  Yun{-}Yi Fan and
                  Bo Li},
  title        = {Constructing gene features for robust 3D mesh zero-watermarking},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {73},
  pages        = {103414},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103414},
  doi          = {10.1016/J.JISA.2022.103414},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LeeCCHFL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeCHCH23,
  author       = {Jung{-}San Lee and
                  Yin{-}Chin Chen and
                  Yun{-}Hao Hsieh and
                  Shih{-}Hao Chang and
                  Ngoc{-}Tu Huynh},
  title        = {Preserving friendly stacking and weighted shadows in selective scalable
                  secret image sharing},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {19},
  pages        = {29283--29305},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-14712-7},
  doi          = {10.1007/S11042-023-14712-7},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeCHCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeCCCHK22,
  author       = {Jung{-}San Lee and
                  Ying{-}Chin Chen and
                  Chit{-}Jie Chew and
                  Chih{-}Lung Chen and
                  Thu{-}Nguyet Huynh and
                  Chung{-}Wei Kuo},
  title        = {CoNN-IDS: Intrusion detection system based on collaborative neural
                  networks and agile training},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102908},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102908},
  doi          = {10.1016/J.COSE.2022.102908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LeeCLCT22,
  author       = {Jung{-}San Lee and
                  Chit{-}Jie Chew and
                  Jo{-}Yun Liu and
                  Ying{-}Chin Chen and
                  Kuo{-}Yu Tsai},
  title        = {Medical blockchain: Data sharing and privacy preserving of {EHR} based
                  on smart contract},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {65},
  pages        = {103117},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jisa.2022.103117},
  doi          = {10.1016/J.JISA.2022.103117},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/LeeCLCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/WuCCWCL22,
  author       = {Wei{-}Chen Wu and
                  Chit{-}Jie Chew and
                  Ying{-}Chin Chen and
                  Cheng{-}Han Wu and
                  Tzu Hao Chen and
                  Jung{-}San Lee},
  title        = {Blockchain-Based {WDP} Solution for Real-Time Heterogeneous Computing
                  Resource Allocation},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {3810--3821},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3215988},
  doi          = {10.1109/TNSM.2022.3215988},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/WuCCWCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intcompsymp/ChenCCL22,
  author       = {Tzu Hao Chen and
                  Chit{-}Jie Chew and
                  Ying{-}Chin Chen and
                  Jung{-}San Lee},
  editor       = {Sun{-}Yuan Hsieh and
                  Ling{-}Ju Hung and
                  Ralf Klasing and
                  Chia{-}Wei Lee and
                  Sheng{-}Lung Peng},
  title        = {Preserving Collusion-Free and Traceability in Car-Sharing System Based
                  on Blockchain},
  booktitle    = {New Trends in Computer Technologies and Applications - 25th International
                  Computer Symposium, {ICS} 2022, Taoyuan, Taiwan, December 15-17, 2022,
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1723},
  pages        = {613--624},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-9582-8\_54},
  doi          = {10.1007/978-981-19-9582-8\_54},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intcompsymp/ChenCCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChewCLCT21,
  author       = {Chit{-}Jie Chew and
                  Ying{-}Chin Chen and
                  Jung{-}San Lee and
                  Chih{-}Lung Chen and
                  Kuo{-}Yu Tsai},
  title        = {Preserving indomitable DDoS vitality through resurrection social hybrid
                  botnet},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102284},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102284},
  doi          = {10.1016/J.COSE.2021.102284},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChewCLCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/ChengCSHL21,
  author       = {Ting{-}Fang Cheng and
                  Ying{-}Chin Chen and
                  Zhu{-}Dao Song and
                  Ngoc{-}Tu Huynh and
                  Jung{-}San Lee},
  title        = {Secure session between an IoT device and a cloud server based on elliptic
                  curve cryptosystem},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {67--87},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.115348},
  doi          = {10.1504/IJICS.2021.115348},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/ChengCSHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeLCHL21,
  author       = {Jung{-}San Lee and
                  Chieh Liu and
                  Ying{-}Chin Chen and
                  Wei{-}Che Hung and
                  Bo Li},
  title        = {Robust 3D mesh zero-watermarking based on spherical coordinate and
                  Skewness measurement},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {17},
  pages        = {25757--25772},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-10878-0},
  doi          = {10.1007/S11042-021-10878-0},
  timestamp    = {Mon, 07 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/LeeLCHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LeeCCW21,
  author       = {Jung{-}San Lee and
                  Chit{-}Jie Chew and
                  Ying{-}Chin Chen and
                  Kuo{-}Jui Wei},
  title        = {Preserving Liberty and Fairness in Combinatorial Double Auction Games
                  Based on Blockchain},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {3},
  pages        = {3517--3527},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.3027948},
  doi          = {10.1109/JSYST.2020.3027948},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LeeCCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HongHCL20,
  author       = {Wei{-}Chih Hong and
                  Ding{-}Ray Huang and
                  Chih{-}Lung Chen and
                  Jung{-}San Lee},
  title        = {Towards Accurate and Efficient Classification of Power System Contingencies
                  and Cyber-Attacks Using Recurrent Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {123297--123309},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3007609},
  doi          = {10.1109/ACCESS.2020.3007609},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HongHCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/BuiLLWL20,
  author       = {Quy{-}Anh Bui and
                  Wei{-}Bin Lee and
                  Jung{-}San Lee and
                  Hsiao{-}Ling Wu and
                  Jo{-}Yun Liu},
  title        = {Biometric-based key management for satisfying patient's control over
                  health information in the {HIPAA} regulations},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {14},
  number       = {1},
  pages        = {437--454},
  year         = {2020},
  url          = {https://doi.org/10.3837/tiis.2020.01.024},
  doi          = {10.3837/TIIS.2020.01.024},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/BuiLLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChouNCLL20,
  author       = {Yung{-}Chen Chou and
                  Yu{-}Wei Nien and
                  Ying{-}Chin Chen and
                  Bo Li and
                  Jung{-}San Lee},
  title        = {Learning salient seeds refer to the manifold ranking and background-prior
                  strategy},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {9-10},
  pages        = {5859--5879},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-08299-1},
  doi          = {10.1007/S11042-019-08299-1},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChouNCLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfet/YangWYLH20,
  author       = {Cheng{-}Hsing Yang and
                  Chi{-}Yao Weng and
                  Yu{-}Zhen Yang and
                  Jung{-}San Lee and
                  Cheng{-}Ta Huang},
  title        = {Achieve Thumbnail Preserving Encryption by Sum Preserving Approaches
                  for Images},
  booktitle    = {{ICFET} 2020, The 6th International Conference on Frontiers of Educational
                  Technologies, Tokyo, Japan, June 5-8, 2020},
  pages        = {125--129},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3404709.3404761},
  doi          = {10.1145/3404709.3404761},
  timestamp    = {Wed, 29 Jul 2020 16:36:11 +0200},
  biburl       = {https://dblp.org/rec/conf/icfet/YangWYLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenWLHL19,
  author       = {Ying{-}Chin Chen and
                  Kuo{-}Jui Wei and
                  Jung{-}San Lee and
                  Ngoc{-}Tu Huynh and
                  Jyun{-}Hong Lin},
  title        = {{AAVSS:} Auxiliary Authorization Mechanism Based on Arbitrary-Angle
                  {VSS}},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {537--544},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n4/ijns-2019-v21-n4-p537-544.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenWLHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeLL19,
  author       = {Jung{-}San Lee and
                  Chih{-}Hsuan Li and
                  Hsin{-}Yu Lee},
  title        = {Visibility dehazing based on channel-weighted analysis and illumination
                  tuning},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {2},
  pages        = {1831--1856},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6280-2},
  doi          = {10.1007/S11042-018-6280-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeSW18,
  author       = {Jung{-}San Lee and
                  Hong{-}Chi Su and
                  Kuo{-}Jui Wei},
  title        = {Refining irregular image illumination with concurrent ownership embedding},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {15},
  pages        = {19851--19868},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-5414-2},
  doi          = {10.1007/S11042-017-5414-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ChenLS18,
  author       = {Ying{-}Chin Chen and
                  Jung{-}San Lee and
                  Hong{-}Chi Su},
  title        = {Selective scalable secret image sharing with adaptive pixel-embedding
                  technique},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {20},
  pages        = {27107--27121},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-018-5908-6},
  doi          = {10.1007/S11042-018-5908-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ChenLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/WeiL017,
  author       = {Kuo{-}Jui Wei and
                  Jung{-}San Lee and
                  Bo Li},
  title        = {{SMP:} Scalable Multicast Protocol for Granting Authority in Heterogeneous
                  Networks},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {1},
  pages        = {60--71},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p60-71.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/WeiL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeC17,
  author       = {Jung{-}San Lee and
                  You{-}Ren Chen},
  title        = {Selective scalable secret image sharing with verification},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {1},
  pages        = {1--11},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-015-3011-9},
  doi          = {10.1007/S11042-015-3011-9},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeWW17,
  author       = {Jung{-}San Lee and
                  Kuo{-}Jui Wei and
                  Kai{-}Rui Wen},
  title        = {Image structure rebuilding technique using fractal dimension on the
                  best match patch searching},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {2},
  pages        = {1875--1899},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-015-3184-2},
  doi          = {10.1007/S11042-015-3184-2},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LeeWCS16,
  author       = {Jung{-}San Lee and
                  Kuo{-}Jui Wei and
                  Ying{-}Chin Chen and
                  Yun{-}Hsiang Sun},
  title        = {Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {10},
  number       = {12},
  pages        = {5616--5642},
  year         = {2016},
  url          = {https://doi.org/10.3837/tiis.2016.12.025},
  doi          = {10.3837/TIIS.2016.12.025},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LeeWCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeWCW16,
  author       = {Jung{-}San Lee and
                  Kuo{-}Jui Wei and
                  Shin{-}Jen Chen and
                  Yi{-}Hua Wang},
  title        = {Tele-micropayment scam prevention based on visual secret sharing technique},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {4},
  pages        = {2233--2248},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-014-2403-6},
  doi          = {10.1007/S11042-014-2403-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeWCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LeeWL16,
  author       = {Jung{-}San Lee and
                  Kai{-}Rui Wen and
                  Bo Li},
  title        = {Renovating Contaminative Image Archives Based on Patch Propagation
                  and Adaptive Confidence Collation},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {26},
  number       = {5},
  pages        = {1004--1011},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCSVT.2015.2430591},
  doi          = {10.1109/TCSVT.2015.2430591},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LeeWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/LeeCHT15,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang and
                  Ngoc{-}Tu Huynh and
                  Hsin{-}Yi Tsai},
  title        = {Preserving user-friendly shadow and high-contrast quality for multiple
                  visual secret sharing technique},
  journal      = {Digit. Signal Process.},
  volume       = {40},
  pages        = {131--139},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.dsp.2015.02.012},
  doi          = {10.1016/J.DSP.2015.02.012},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/LeeCHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WeiLC15,
  author       = {Kuo{-}Jui Wei and
                  Jung{-}San Lee and
                  Shin{-}Jen Chen},
  title        = {Enhancing the Security of Credit Card Transaction based on Visual
                  {DSC}},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {9},
  number       = {3},
  pages        = {1231--1245},
  year         = {2015},
  url          = {https://doi.org/10.3837/tiis.2015.03.022},
  doi          = {10.3837/TIIS.2015.03.022},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/WeiLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LeeWCW15,
  author       = {Jung{-}San Lee and
                  Hsiao{-}Shan Wong and
                  You{-}Ren Chen and
                  Yi{-}Hua Wang},
  title        = {Stable watermarking technique based on {XNOR} operation and scale
                  relationship},
  journal      = {Multim. Tools Appl.},
  volume       = {74},
  number       = {17},
  pages        = {6797--6826},
  year         = {2015},
  url          = {https://doi.org/10.1007/s11042-014-1930-5},
  doi          = {10.1007/S11042-014-1930-5},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LeeWCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeemm/LeeL14,
  author       = {Jung{-}San Lee and
                  Bo Li},
  title        = {Self-Recognized Image Protection Technique that Resists Large-Scale
                  Cropping},
  journal      = {{IEEE} Multim.},
  volume       = {21},
  number       = {1},
  pages        = {60--73},
  year         = {2014},
  url          = {https://doi.org/10.1109/MMUL.2014.14},
  doi          = {10.1109/MMUL.2014.14},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeemm/LeeL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeeH14,
  author       = {Jung{-}San Lee and
                  Ya{-}Chieh Huang},
  title        = {Fast authentication mechanism with provable correctness for cluster-based
                  VANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {6},
  pages        = {1016--1030},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.818},
  doi          = {10.1002/SEC.818},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeeH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/LeeL13,
  author       = {Jung{-}San Lee and
                  Kun{-}Shian Lin},
  title        = {An innovative electronic group-buying system for mobile commerce},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {12},
  number       = {1},
  pages        = {1--13},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.elerap.2012.09.005},
  doi          = {10.1016/J.ELERAP.2012.09.005},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/LeeL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LeeKL13,
  author       = {Jung{-}San Lee and
                  Wei{-}Chiang Kao and
                  Bo Li},
  title        = {Aryabhata remainder theorem-based non-iterative electronic lottery
                  mechanism with robustness},
  journal      = {{IET} Inf. Secur.},
  volume       = {7},
  number       = {3},
  pages        = {172--180},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-ifs.2011.0327},
  doi          = {10.1049/IET-IFS.2011.0327},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LeeKL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/LeeH13,
  author       = {Jung{-}San Lee and
                  Ming{-}Huang Hsieh},
  title        = {Preserving user-participation for insecure network communications
                  with {CAPTCHA} and visual secret sharing technique},
  journal      = {{IET} Networks},
  volume       = {2},
  number       = {2},
  pages        = {81--91},
  year         = {2013},
  url          = {https://doi.org/10.1049/iet-net.2011.0019},
  doi          = {10.1049/IET-NET.2011.0019},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/LeeH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LeeCW13,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang and
                  Kuo{-}Jui Wei},
  title        = {Provably Secure Conference Key Distribution Mechanism Preserving the
                  Forward and Backward Secrecy},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {5},
  pages        = {405--410},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n5/ijns-2013-v15-n5-p405-410.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LeeCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ivc/LinCCL13,
  author       = {Pei{-}Yu Lin and
                  Yi{-}Hui Chen and
                  Chin{-}Chen Chang and
                  Jung{-}San Lee},
  title        = {Contrast-Adaptive Removable Visible Watermarking {(CARVW)} mechanism},
  journal      = {Image Vis. Comput.},
  volume       = {31},
  number       = {4},
  pages        = {311--321},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.imavis.2013.02.002},
  doi          = {10.1016/J.IMAVIS.2013.02.002},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ivc/LinCCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/Lee13,
  author       = {Jung{-}San Lee},
  title        = {{RII:} Renovating the irregular illumination of digital image archives},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {24},
  number       = {7},
  pages        = {739--751},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jvcir.2013.05.002},
  doi          = {10.1016/J.JVCIR.2013.05.002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/Lee13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LeeL13,
  author       = {Jung{-}San Lee and
                  Bo Li},
  title        = {Notes on "Authentication protocol using an identifier in an ad
                  hoc network environment"},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {5-6},
  pages        = {1572--1575},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.11.018},
  doi          = {10.1016/J.MCM.2012.11.018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LeeL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangWLL13,
  author       = {Chien{-}Chang Yang and
                  Kuo{-}Jui Wei and
                  Bo Li and
                  Jung{-}San Lee},
  title        = {{HORME:} hierarchical-object-relational medical management for electronic
                  record},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {10},
  pages        = {1261--1270},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.704},
  doi          = {10.1002/SEC.704},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangWLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LeeT13,
  author       = {Jung{-}San Lee and
                  Wan{-}Ting Tseng},
  title        = {A wide-adapted bantam protocol for roaming across wireless areas},
  journal      = {Wirel. Networks},
  volume       = {19},
  number       = {6},
  pages        = {1423--1440},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11276-013-0542-8},
  doi          = {10.1007/S11276-013-0542-8},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/LeeT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ecra/LeeL12,
  author       = {Jung{-}San Lee and
                  Kun{-}Shian Lin},
  title        = {A robust e-commerce service: Light-weight secure mail-order mechanism},
  journal      = {Electron. Commer. Res. Appl.},
  volume       = {11},
  number       = {4},
  pages        = {388--396},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.elerap.2012.04.001},
  doi          = {10.1016/J.ELERAP.2012.04.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ecra/LeeL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeH11,
  author       = {Jung{-}San Lee and
                  Ming{-}Huang Hsieh},
  title        = {An interactive mobile {SMS} confirmation method using secret sharing
                  technique},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {8},
  pages        = {830--839},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2011.07.001},
  doi          = {10.1016/J.COSE.2011.07.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/LinLC11,
  author       = {Pei{-}Yu Lin and
                  Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Protecting the content integrity of digital imagery with fidelity
                  preservation},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {7},
  number       = {3},
  pages        = {15:1--15:20},
  year         = {2011},
  url          = {https://doi.org/10.1145/2000486.2000489},
  doi          = {10.1145/2000486.2000489},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/LinLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsp/ChangLL10,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee and
                  T. Hoang Ngan Le},
  title        = {Hybrid wet paper coding mechanism for steganography employing n-indicator
                  and fuzzy edge detector},
  journal      = {Digit. Signal Process.},
  volume       = {20},
  number       = {4},
  pages        = {1286--1307},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.dsp.2009.11.005},
  doi          = {10.1016/J.DSP.2009.11.005},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dsp/ChangLL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LeeLC10,
  author       = {Jung{-}San Lee and
                  Pei{-}Yu Lin and
                  Chin{-}Chen Chang},
  title        = {Lightweight Secure Roaming Mechanism Between {GPRS/UMTS} and Wireless
                  LANs},
  journal      = {Wirel. Pers. Commun.},
  volume       = {53},
  number       = {4},
  pages        = {569--580},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11277-009-9703-6},
  doi          = {10.1007/S11277-009-9703-6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LeeLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ChangCL09,
  author       = {Chin{-}Chen Chang and
                  Shih{-}Chang Chang and
                  Jung{-}San Lee},
  title        = {An on-line electronic check system with mutual authentication},
  journal      = {Comput. Electr. Eng.},
  volume       = {35},
  number       = {5},
  pages        = {757--763},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.02.007},
  doi          = {10.1016/J.COMPELECENG.2009.02.007},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/ChangCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LeeCI09,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Design of electronic t-out-of-n lotteries on the Internet},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {2},
  pages        = {395--400},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.05.004},
  doi          = {10.1016/J.CSI.2008.05.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LeeCI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeC09b,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {A Secure Multicast Framework in Large and High-Mobility Network Groups},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {92-B},
  number       = {7},
  pages        = {2365--2373},
  year         = {2009},
  url          = {https://doi.org/10.1587/transcom.E92.B.2365},
  doi          = {10.1587/TRANSCOM.E92.B.2365},
  timestamp    = {Mon, 13 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeC09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LeeCC09,
  author       = {Jung{-}San Lee and
                  Chi{-}Shiang Chan and
                  Chin{-}Chen Chang},
  title        = {Non-iterative privacy preservation for online lotteries},
  journal      = {{IET} Inf. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {139--147},
  year         = {2009},
  url          = {https://doi.org/10.1049/iet-ifs.2008.0104},
  doi          = {10.1049/IET-IFS.2008.0104},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LeeCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChangL09,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee},
  title        = {Robust t-out-of-n oblivious transfer mechanism based on {CRT}},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {32},
  number       = {1},
  pages        = {226--235},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jnca.2008.03.004},
  doi          = {10.1016/J.JNCA.2008.03.004},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ChangL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/LinLC09,
  author       = {Pei{-}Yu Lin and
                  Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Distortion-free secret image sharing mechanism using modulus operator},
  journal      = {Pattern Recognit.},
  volume       = {42},
  number       = {5},
  pages        = {886--895},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.patcog.2008.09.014},
  doi          = {10.1016/J.PATCOG.2008.09.014},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pr/LinLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LeeCC09,
  author       = {Jung{-}San Lee and
                  Chin{-}Hao Chen and
                  Chin{-}Chen Chang},
  title        = {A Novel Illumination-Balance Technique for Improving the Quality of
                  Degraded Text-Photo Images},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {19},
  number       = {6},
  pages        = {900--905},
  year         = {2009},
  url          = {https://doi.org/10.1109/TCSVT.2009.2017314},
  doi          = {10.1109/TCSVT.2009.2017314},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LeeCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LinLC09,
  author       = {Pei{-}Yu Lin and
                  Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Dual Digital Watermarking for Internet Media Based on Hybrid Strategies},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {19},
  number       = {8},
  pages        = {1169--1177},
  year         = {2009},
  url          = {https://doi.org/10.1109/TCSVT.2009.2020263},
  doi          = {10.1109/TCSVT.2009.2020263},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LinLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/ChangLL09,
  author       = {Chin{-}Chen Chang and
                  Pei{-}Yu Lin and
                  Jung{-}San Lee},
  editor       = {Ge Yu and
                  Mario K{\"{o}}ppen and
                  Shyi{-}Ming Chen and
                  Xiamu Niu},
  title        = {A Self-Reference Watermarking Scheme Based on Wet Paper Coding},
  booktitle    = {9th International Conference on Hybrid Intelligent Systems {(HIS}
                  2009), August 12-14, 2009, Shenyang, China},
  pages        = {228--233},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HIS.2009.52},
  doi          = {10.1109/HIS.2009.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/ChangLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ncm/LeeLC09,
  author       = {Jung{-}San Lee and
                  Bo Li and
                  Yung{-}Chen Chou},
  editor       = {Jinhwa Kim and
                  Dursun Delen and
                  Jinsoo Park and
                  Franz Ko and
                  Chen Rui and
                  Jong Hyung Lee and
                  Jian Wang and
                  Gang Kou},
  title        = {A Brand-New Mobile Value-Added Service: M-Check},
  booktitle    = {International Conference on Networked Computing and Advanced Information
                  Management, {NCM} 2009, Fifth International Joint Conference on INC,
                  {IMS} and {IDC:} {INC} 2009: International Conference on Networked
                  Computing, {IMS} 2009: International Conference on Advanced Information
                  Management and Service, {IDC} 2009: International Conference on Digital
                  Content, Multimedia Technology and its Applications, Seoul, Korea,
                  August 25-27, 2009},
  pages        = {2050--2055},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NCM.2009.278},
  doi          = {10.1109/NCM.2009.278},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ncm/LeeLC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/LeeL09,
  author       = {Jung{-}San Lee and
                  T. Hoang Ngan Le},
  title        = {Hybrid (2, n) Visual Secret Sharing Scheme for Color Images},
  booktitle    = {2009 {IEEE} International Conference on Computing and Communication
                  Technologies, {RIVF} 2009, Da Nang, Vietnam, 13-17 July, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/RIVF.2009.5174642},
  doi          = {10.1109/RIVF.2009.5174642},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rivf/LeeL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeeC08,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Preserving data integrity in mobile \emph{ad hoc} networks with variant
                  Diffie-Hellman protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {1},
  number       = {4},
  pages        = {277--286},
  year         = {2008},
  url          = {https://doi.org/10.1002/sec.21},
  doi          = {10.1002/SEC.21},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeeC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/ChangLC08,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee and
                  Ting{-}Fang Cheng},
  editor       = {Won Kim and
                  Hyung{-}Jin Choi},
  title        = {Security design for three-party encrypted key exchange protocol using
                  smart cards},
  booktitle    = {Proceedings of the 2nd International Conference on Ubiquitous Information
                  Management and Communication, {ICUIMC} 2008, Suwon, Korea, January
                  31 - February 01, 2008},
  pages        = {329--333},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352793.1352862},
  doi          = {10.1145/1352793.1352862},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icuimc/ChangLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/LiLC08,
  author       = {Jing Li and
                  Jung{-}San Lee and
                  Chin{-}Chen Chang},
  editor       = {Jeng{-}Shyang Pan and
                  Xiamu Niu and
                  Hsiang{-}Cheh Huang and
                  Lakhmi C. Jain},
  title        = {Preserving {PHI} in Compliance with {HIPAA} Privacy/Security Regulations
                  Using Cryptographic Techniques},
  booktitle    = {4th International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2008), Harbin, China, 15-17
                  August 2008, Proceedings},
  pages        = {1545--1548},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/IIH-MSP.2008.38},
  doi          = {10.1109/IIH-MSP.2008.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/LiLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/ChangL08a,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee},
  editor       = {Jeng{-}Shyang Pan and
                  Ajith Abraham and
                  Chin{-}Chen Chang},
  title        = {Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol},
  booktitle    = {Eighth International Conference on Intelligent Systems Design and
                  Applications, {ISDA} 2008, 26-28 November 2008, Kaohsiung, Taiwan,
                  3 Volumes},
  pages        = {467--471},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ISDA.2008.334},
  doi          = {10.1109/ISDA.2008.334},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isda/ChangL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChengLC07,
  author       = {Ting{-}Fang Cheng and
                  Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Security enhancement of an IC-card-based remote login mechanism},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {9},
  pages        = {2280--2287},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.01.013},
  doi          = {10.1016/J.COMNET.2007.01.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ChengLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/LeeCCC07,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang and
                  Pen{-}Yi Chang},
  title        = {Anonymous authentication scheme for wireless communications},
  journal      = {Int. J. Mob. Commun.},
  volume       = {5},
  number       = {5},
  pages        = {590--601},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJMC.2007.013941},
  doi          = {10.1504/IJMC.2007.013941},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmc/LeeCCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LeeC07,
  author       = {Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {Secure communications for cluster-based ad hoc networks using node
                  identities},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {30},
  number       = {4},
  pages        = {1377--1396},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jnca.2006.10.003},
  doi          = {10.1016/J.JNCA.2006.10.003},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LeeC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChangL06,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee},
  title        = {An anonymous voting mechanism based on the key exchange protocol},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {4},
  pages        = {307--314},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.02.004},
  doi          = {10.1016/J.COSE.2006.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChangL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmc/ChangLC06,
  author       = {Ya{-}Fen Chang and
                  Jung{-}San Lee and
                  Chin{-}Chen Chang},
  title        = {A secure and efficient authentication scheme for mobile users},
  journal      = {Int. J. Mob. Commun.},
  volume       = {4},
  number       = {5},
  pages        = {581--594},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJMC.2006.009261},
  doi          = {10.1504/IJMC.2006.009261},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijmc/ChangLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ChangLC05,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee and
                  Ya{-}Fen Chang},
  title        = {Efficient authentication protocols of {GSM}},
  journal      = {Comput. Commun.},
  volume       = {28},
  number       = {8},
  pages        = {921--928},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.comcom.2005.01.015},
  doi          = {10.1016/J.COMCOM.2005.01.015},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ChangLC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ChangLC05,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee and
                  Chang{-}Chu Chen},
  title        = {On the Forward and Backward Secrecy of {HLL} Group Key Exchange Mechanism},
  booktitle    = {Fifth International Conference on Computer and Information Technology
                  {(CIT} 2005), 21-23 September 2005, Shanghai, China},
  pages        = {702--705},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CIT.2005.149},
  doi          = {10.1109/CIT.2005.149},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ChangLC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ChangL05,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Improvement on an Optimized Protocol for Mobile Network Authentication
                  and Security},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {538--541},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_79},
  doi          = {10.1007/11596981\_79},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ChangL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cw/ChangKL05,
  author       = {Chin{-}Chen Chang and
                  Jui{-}Yi Kuo and
                  Jung{-}San Lee},
  title        = {Time-bounded Based Password Authentication Scheme},
  booktitle    = {4th International Conference on Cyberworlds {(CW} 2005), 23-25 November
                  2005, Singapore},
  pages        = {117--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CW.2005.90},
  doi          = {10.1109/CW.2005.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cw/ChangKL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ride/ChangLL05,
  author       = {Chin{-}Chen Chang and
                  Yu{-}Chiang Li and
                  Jung{-}San Lee},
  title        = {An Efficient Algorithm for Incremental Mining of Association Rules},
  booktitle    = {15th International Workshop on Research Issues in Data Engineering
                  {(RIDE-SDMA} 2005), Stream Data Mining and Applications, 3-7 April
                  2005, Tokyo, Japan},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/RIDE.2005.6},
  doi          = {10.1109/RIDE.2005.6},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ride/ChangLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cw/ChangL04a,
  author       = {Chin{-}Chen Chang and
                  Jung{-}San Lee},
  title        = {An Efficient and Secure Multi-Server Password Authentication Scheme
                  using Smart Cards},
  booktitle    = {3rd International Conference on Cyberworlds {(CW} 2004), 18-20 November
                  2004, Tokyo, Japan},
  pages        = {417--422},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CW.2004.17},
  doi          = {10.1109/CW.2004.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cw/ChangL04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics