Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Chia-Yin Lee
@article{DBLP:journals/scn/LinLLHL15, author = {Ying{-}Dar Lin and Yuan{-}Cheng Lai and Chun{-}Nan Lu and Peng{-}Kai Hsu and Chia{-}Yin Lee}, title = {Three-phase behavior-based detection and classification of known and unknown malware}, journal = {Secur. Commun. Networks}, volume = {8}, number = {11}, pages = {2004--2015}, year = {2015}, url = {https://doi.org/10.1002/sec.1148}, doi = {10.1002/SEC.1148}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinLLHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LinLWHWT14, author = {Ying{-}Dar Lin and Chia{-}Yin Lee and Yu{-}Sung Wu and Pei{-}Hsiu Ho and Fu{-}Yu Wang and Yi{-}Lang Tsai}, title = {Active versus Passive Malware Collection}, journal = {Computer}, volume = {47}, number = {4}, pages = {59--65}, year = {2014}, url = {https://doi.org/10.1109/MC.2013.226}, doi = {10.1109/MC.2013.226}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LinLWHWT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LinLT14, author = {Ying{-}Dar Lin and Chia{-}Yin Lee and Hao{-}Chuan Tsai}, title = {Redefining Security Criteria for Networking Devices with Case Studies}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {43--53}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.76}, doi = {10.1109/MSP.2013.76}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LinLT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChangL13, author = {Chin{-}Chen Chang and Chia{-}Yin Lee}, title = {A Smart Card-based Authentication Scheme Using User Identify Cryptography}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {2}, pages = {139--147}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p139-147.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChangL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/ChangL12, author = {Chin{-}Chen Chang and Chia{-}Yin Lee}, title = {A Secure Single Sign-On Mechanism for Distributed Computer Networks}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {59}, number = {1}, pages = {629--637}, year = {2012}, url = {https://doi.org/10.1109/TIE.2011.2130500}, doi = {10.1109/TIE.2011.2130500}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/ChangL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HarnLLC11, author = {Lein Harn and Chia{-}Yin Lee and Changlu Lin and Chin{-}Chen Chang}, title = {Fully Deniable Message Authentication Protocols Preserving Confidentiality}, journal = {Comput. J.}, volume = {54}, number = {10}, pages = {1688--1699}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxr081}, doi = {10.1093/COMJNL/BXR081}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/HarnLLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeWHC11, author = {Chia{-}Yin Lee and Zhi{-}Hui Wang and Lein Harn and Chin{-}Chen Chang}, title = {Secure Key Transfer Protocol Based on Secret Sharing for Group Communications}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {11}, pages = {2069--2076}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.2069}, doi = {10.1587/TRANSINF.E94.D.2069}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/LeeWHC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ChangLLC11, author = {Chin{-}Chen Chang and Hai{-}Duong Le and Chia{-}Yin Lee and Ching{-}Hsiang Chang}, editor = {Xiamu Niu and Mingchu Li and Y{\^{o}}iti Suzuki and Jeng{-}Shyang Pan and Lakhmi C. Jain}, title = {A Robust and Efficient Smart Card Oriented Remote User Authentication Protocol}, booktitle = {Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, {IIH-MSP} 2011, Dalian, China, October 14-16, 2011}, pages = {252--255}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IIHMSP.2011.51}, doi = {10.1109/IIHMSP.2011.51}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ChangLLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ChangLC10, author = {Chin{-}Chen Chang and Chia{-}Yin Lee and Yen{-}Chang Chiu}, title = {An efficient e-mail protocol providing perfect forward secrecy for mobile devices}, journal = {Int. J. Commun. Syst.}, volume = {23}, number = {12}, pages = {1463--1473}, year = {2010}, url = {https://doi.org/10.1002/dac.1119}, doi = {10.1002/DAC.1119}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ChangLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmis/ChangLCW10, author = {Chin{-}Chen Chang and Chia{-}Yin Lee and Chang{-}Chu Chen and Zhi{-}Hui Wang}, title = {A data-hiding scheme based on one-way hash function}, journal = {Int. J. Multim. Intell. Secur.}, volume = {1}, number = {3}, pages = {285--297}, year = {2010}, url = {https://doi.org/10.1504/IJMIS.2010.037542}, doi = {10.1504/IJMIS.2010.037542}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmis/ChangLCW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ChangLC09, author = {Chin{-}Chen Chang and Chia{-}Yin Lee and Yen{-}Chang Chiu}, title = {Enhanced authentication scheme with anonymity for roaming service in global mobility networks}, journal = {Comput. Commun.}, volume = {32}, number = {4}, pages = {611--618}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2008.11.032}, doi = {10.1016/J.COMCOM.2008.11.032}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ChangLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iih-msp/ChangLL09, author = {Chin{-}Chen Chang and Chia{-}Yin Lee and Wei{-}Bin Lee}, editor = {Jeng{-}Shyang Pan and Yen{-}Wei Chen and Lakhmi C. Jain}, title = {Cryptanalysis and Improvement of a Secure Authentication Scheme with Anonymity for Wireless Communications}, booktitle = {Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing {(IIH-MSP} 2009), Kyoto, Japan, 12-14 September, 2009, Proceedings}, pages = {902--904}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IIH-MSP.2009.172}, doi = {10.1109/IIH-MSP.2009.172}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iih-msp/ChangLL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LeeLC05a, author = {Chia{-}Yin Lee and Chu{-}Hsing Lin and Chin{-}Chen Chang}, title = {An Improved Low Computation Cost User Authentication Scheme for Mobile Communication}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {249--252}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.106}, doi = {10.1109/AINA.2005.106}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LeeLC05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/HuangLLCC05, author = {Chi{-}Hsiung Huang and Chia{-}Yin Lee and Chu{-}Hsing Lin and Chin{-}Chen Chang and Kuo{-}Lun Chen}, title = {Authenticated Encryption Schemes with Message Linkage for Threshold Signatures}, booktitle = {19th International Conference on Advanced Information Networking and Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan}, pages = {261--264}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/AINA.2005.123}, doi = {10.1109/AINA.2005.123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/HuangLLCC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LinLL04, author = {Chu{-}Hsing Lin and Chia{-}Yin Lee and Wei Lee}, title = {Comments on the Yang-Chang-Hwang anonymous conference key distribution system}, journal = {Comput. Stand. Interfaces}, volume = {26}, number = {3}, pages = {171--174}, year = {2004}, url = {https://doi.org/10.1016/j.csi.2003.08.002}, doi = {10.1016/J.CSI.2003.08.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LinLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.