Остановите войну!
for scientists:
default search action
Chi-Sung Laih
- > Home > Persons > Chi-Sung Laih
Publications
- 2013
- [j43]Hsiao-Ching Lin, Ching-Nung Yang, Chi-Sung Laih, Hui-Tang Lin:
Natural language letter based visual cryptography scheme. J. Vis. Commun. Image Represent. 24(3): 318-331 (2013) - [j42]Chia-Yu Lu, Shang-Ming Jen, Chi-Sung Laih:
A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication. IEEE Trans. Computers 62(3): 428-438 (2013) - 2012
- [j41]Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu:
Long-term confidentiality of PKI. Commun. ACM 55(1): 91-95 (2012) - [j40]Ming-Kung Sun, Michael Chang, Hsiao-Ching Lin, Chi-Sung Laih, Hui-Tang Lin:
A Trust Distributed DRM System Using Smart Cards. IEICE Trans. Inf. Syst. 95-D(12): 2991-3000 (2012) - [j39]Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih:
Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun. Syst. 25(3): 376-385 (2012) - 2011
- [c28]Ming-Kung Sun, Mao-Jie Lin, Michael Chang, Chi-Sung Laih, Hui-Tang Lin:
Malware Virtualization-Resistant Behavior Detection. ICPADS 2011: 912-917 - 2010
- [j37]Yung-Tsung Hou, Yimeng Chang, Tsuhan Chen, Chi-Sung Laih, Chia-Mei Chen:
Malicious web content detection by machine learning. Expert Syst. Appl. 37(1): 55-60 (2010) - [c27]Chia-Yu Lu, Wu-Chuan Yang, Chi-Sung Laih:
Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems. BWCCA 2010: 401-406 - 2009
- [j36]Gu Hsin Lai, Chia-Mei Chen, Chi-Sung Laih, Tsuhan Chen:
A collaborative anti-spam system. Expert Syst. Appl. 36(3): 6645-6653 (2009) - [j35]Chi-Sung Laih, Ming-Kung Sun, Chen-Chung Chang, Yunghsiang Han:
Adaptive key pre-distribution model for distributed sensor networks. IET Commun. 3(5): 723-732 (2009) - [j34]Jiin-Chiou Cheng, Chi-Sung Laih:
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. Int. J. Inf. Sec. 8(1): 37-48 (2009) - [j33]Hung-Yu Chien, Chi-Sung Laih:
ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distributed Comput. 69(10): 848-853 (2009) - [j32]Shang-Ming Jen, Chi-Sung Laih, Wen-Chung Kuo:
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET. Sensors 9(6): 5022-5039 (2009) - [c26]Ming-Kung Sun, Chi-Sung Laih, Hong-Yi Yen, Jyun-Rong Kuo:
A Ticket Based Digital Rights Management Model. CCNC 2009: 1-5 - 2008
- [j30]Shyh-Yih Wang, Chi-Sung Laih:
Efficient Key Distribution for Access Control in Pay-TV Systems. IEEE Trans. Multim. 10(3): 480-492 (2008) - [c25]Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
Defending On-Line Web Application Security with User-Behavior Surveillance. ARES 2008: 410-415 - [c22]Shih-Fen Lin, Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng, Chi-Sung Laih:
Malicious Webpage Detection by Semantics-Aware Reasoning. ISDA (1) 2008: 115-120 - 2007
- [j29]Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:
Fast Multicomputation with Asynchronous Strategy. IEEE Trans. Computers 56(2): 234-242 (2007) - [c21]Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih:
Generating Attack Scenarios with Causal Relationship. GrC 2007: 368-373 - 2006
- [j28]Shyh-Yih Wang, Chi-Sung Laih:
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Dependable Secur. Comput. 3(1): 91-100 (2006) - [c20]Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih:
Authorized Tracking and Tracing for RFID Tags. EUC Workshops 2006: 435-444 - [c19]Chi-Sung Laih, Chun-Ju Fu, Wen-Chung Kuo:
Design a Secure and Practical Metering Scheme. International Conference on Internet Computing 2006: 443-447 - 2005
- [j27]Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:
Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation. Appl. Math. Comput. 167(1): 108-117 (2005) - [j26]Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalyses of two key assignment schemes based on polynomial interpolations. Comput. Secur. 24(2): 134-138 (2005) - [j25]Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. J. Syst. Softw. 75(1-2): 189-192 (2005) - [c18]Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:
Fast Multi-computations with Integer Similarity Strategy. Public Key Cryptography 2005: 138-153 - 2003
- [j23]Chen-Chi Lin, Chi-Sung Laih:
The GPKI developing status of Taiwan and some major Asia countries. Comput. Commun. 26(16): 1884-1892 (2003) - [j22]Shin-Yan Chiou, Chi-Sung Laih:
A Tempo-Based t-out-of-n Audio Cryptography Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(8): 2091-2098 (2003) - [j21]Chi-Sung Laih, Shin Yan Chiou:
Cryptanalysis of an optimized protocol for mobile network authentication and security. Inf. Process. Lett. 85(6): 339-341 (2003) - [j20]Chen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang:
New Audio Secret Sharing Schemes With Time Division Technique. J. Inf. Sci. Eng. 19(4): 605-614 (2003) - 2002
- [j19]Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih:
On the Design of RSA With Short Secret Exponent. J. Inf. Sci. Eng. 18(1): 1-18 (2002) - 2000
- [j18]Ching-Nung Yang, Chi-Sung Laih:
New Colored Visual Secret Sharing Schemes. Des. Codes Cryptogr. 20(3): 325-336 (2000) - [j17]Chen-Chi Lin, Chi-Sung Laih:
Cryptanalysis of Nyberg-Rueppel's message recovery scheme. IEEE Commun. Lett. 4(7): 231-232 (2000) - 1999
- [j16]Wen-Chung Kuo, Chi-Sung Laih, Min-Jea Gau:
On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes. J. Inf. Sci. Eng. 15(5): 701-713 (1999) - [c13]Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih:
On the Design of RSA with Short Secret Exponent. ASIACRYPT 1999: 150-164 - 1998
- [j14]Ching-Nung Yang, Chi-Sung Laih:
DCm Codes for Constructing t-EC/AUED Codes. IEEE Trans. Computers 47(4): 492 (1998) - 1997
- [j13]Ching-Nung Yang, Chi-Sung Laih:
A Note on Error-Correcting Codes for Authentication and Subliminal Channels. Inf. Process. Lett. 62(3): 141-143 (1997) - [j12]Chi-Sung Laih, Min-Jea Gau:
Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. IEEE Trans. Computers 46(4): 511 (1997) - [c11]Yung-Cheng Lee, Chi-Sung Laih:
On the Key Recovery of the Key Escrow System. ACSAC 1997: 216-220 - 1996
- [j11]Chi-Sung Laih, Sung-Ming Yen:
Multi-Signature for Specified Group of Verifiers. J. Inf. Sci. Eng. 12(1): 143-152 (1996) - [j10]Chi-Sung Laih, Ching-Nung Yang:
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. IEEE Trans. Computers 45(1): 103-108 (1996) - 1995
- [j9]Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Comput. Commun. 18(1): 45-47 (1995) - [j7]Sung-Ming Yen, Chi-Sung Laih:
Improved Digital Signature Algorithm. IEEE Trans. Computers 44(5): 729-730 (1995) - [j6]Sung-Ming Yen, Chi-Sung Laih:
Improved Digital Signature Suitable for Batch Verification. IEEE Trans. Computers 44(7): 957-959 (1995) - [c10]Chi-Sung Laih, Wen-Chung Kuo:
Cryptanalysis of the Enhanced ElGamal's Signature Scheme. Cryptography: Policy and Algorithms 1995: 228-231 - 1994
- [j5]Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang:
Authentication and protection of public keys. Comput. Secur. 13(7): 581-585 (1994) - 1993
- [c9]Chi-Sung Laih, Sung-Ming Yen:
On the Design of Conference Key Distribution Systems for the Broadcasting Networks. INFOCOM 1993: 1406-1413 - 1992
- [c8]Chi-Sung Laih, Sung-Ming Yen:
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. AUSCRYPT 1992: 219-230 - [c7]Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen:
On Verifiable Implicit Asking Protocols for RSA Computation. AUSCRYPT 1992: 296-307 - [c6]Sung-Ming Yen, Chi-Sung Laih:
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. AUSCRYPT 1992: 447-456 - 1991
- [c5]Chi-Sung Laih, Lein Harn:
Generalized Threshold Cryptosystems. ASIACRYPT 1991: 159-166 - [c4]Chi-Sung Laih, Sung-Ming Yen, Lein Harn:
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. ASIACRYPT 1991: 450-459 - 1989
- [j3]Chi-Sung Laih, Jau-Yien Lee, Lein Harn:
A new threshold scheme and its application in designing the conference key distribution cryptosystem. Inf. Process. Lett. 32(3): 95-99 (1989) - [j2]Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Yan-Kuin Su:
Linearly shift knapsack public-key cryptosystem. IEEE J. Sel. Areas Commun. 7(4): 534-539 (1989) - [j1]Chi-Sung Laih, Lein Harn, Jau-Yien Lee:
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. IEEE Trans. Software Eng. 15(9): 1135-1137 (1989) - [c3]Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang:
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. CRYPTO 1989: 286-298 - [c2]Lein Harn, David Huang, Chi-Sung Laih:
Password Authentication Based On Public-Key Distribution Cryptosystem. ICDE 1989: 332-338 - [c1]Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen:
A New Scheme for ID-Based Cryptosystems and Signature. INFOCOM 1989: 998-1002
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-10-01 22:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint