Chin-Chen Chang

From MaRDI portal
Revision as of 15:18, 10 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Chin-Chen Chang to Chin-Chen Chang: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:287119

Available identifiers

zbMath Open chang.chin-chenDBLPc/ChinChenChangWikidataQ102308196 ScholiaQ102308196MaRDI QIDQ287119

List of research outcomes





PublicationDate of PublicationType
A dynamic secret sharing scheme with cheater detection2024-07-11Paper
A group-oriented \((t, n)\) undeniable signature scheme without trusted center2024-07-11Paper
Connected proper interval graphs and the guard problem in spiral polygons (extended abstract)2024-07-05Paper
A video watermark algorithm based on tensor decomposition2022-08-03Paper
High-capacity reversible data hiding in encrypted images based on two-phase histogram shifting2022-08-03Paper
AMBTC based high payload data hiding with modulo-2 operation and Hamming code2021-08-13Paper
An improved integer transform combining with an irregular block partition2019-11-13Paper
Real-time error-free reversible data hiding in encrypted images using \((7,4)\) Hamming code and most significant bit prediction2019-11-13Paper
An information theoretically secure e-lottery scheme based on symmetric bivariate polynomials2019-11-13Paper
Some active attacks on fast server-aided secret computation protocols for modular exponentiation2019-10-10Paper
Public audit for operation behavior logs with error locating in cloud storage2019-08-14Paper
A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting2017-11-20Paper
https://portal.mardi4nfdi.de/entity/Q52714462017-07-11Paper
Authenticated encryption schemes with linkage between message blocks2016-06-01Paper
A simple approach for generating RSA keys2016-05-26Paper
https://portal.mardi4nfdi.de/entity/Q34480182015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q34480702015-10-28Paper
Provably secure three party encrypted key exchange scheme with explicit authentication2015-09-23Paper
A Reliable Real-time Multicast Authentication Protocol with Provable Accuracy2014-05-12Paper
Chaotic maps-based password-authenticated key agreement using smart cards2014-01-08Paper
High capacity SMVQ-based hiding scheme using adaptive index2010-08-06Paper
A Data Hiding Method for Text Documents Using Multiple-Base Encoding2010-06-15Paper
Lossless image compression based on multiple-tables arithmetic coding2009-11-13Paper
Removing blocking effects using an artificial neural network2009-10-29Paper
https://portal.mardi4nfdi.de/entity/Q31849182009-10-22Paper
https://portal.mardi4nfdi.de/entity/Q31849192009-10-22Paper
https://portal.mardi4nfdi.de/entity/Q31830752009-10-16Paper
An on-line electronic check system with mutual authentication2009-10-15Paper
Robust non-interactivet-out-of-noblivious transfer based on the RSA cryptosystem2009-07-14Paper
Attacks on provably secure proxy-protected signature schemes based on factoring2009-07-14Paper
Preventing Cheating in Computational Visual Cryptography2009-06-30Paper
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique2009-06-23Paper
A Fragile Digital Image Authentication Scheme Inspired by Wet Paper Codes2009-05-22Paper
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns2009-05-22Paper
A lossless data embedding technique by joint neighboring coding2009-05-07Paper
Authors reply ``Sharing secrets in stego images with authentication2009-05-07Paper
Distortion-free secret image sharing mechanism using modulus operator2009-04-03Paper
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce2009-03-25Paper
A New (t,n) −Threshold Scheme Based on Difference Equations2009-03-03Paper
https://portal.mardi4nfdi.de/entity/Q36018442009-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36018842009-02-12Paper
Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control2009-02-10Paper
A mutual authenticated key agreement scheme over insecure networks2008-12-11Paper
https://portal.mardi4nfdi.de/entity/Q35360822008-11-17Paper
A color image watermarking scheme based on color quantization2008-10-16Paper
A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity2008-08-13Paper
Sharing secrets in stego images with authentication2008-08-13Paper
https://portal.mardi4nfdi.de/entity/Q35127942008-07-21Paper
Lossless data hiding for color images based on block truncation coding2008-05-09Paper
https://portal.mardi4nfdi.de/entity/Q54595512008-04-29Paper
https://portal.mardi4nfdi.de/entity/Q54501072008-03-19Paper
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery2007-11-07Paper
https://portal.mardi4nfdi.de/entity/Q54228212007-10-30Paper
https://portal.mardi4nfdi.de/entity/Q54225912007-10-29Paper
Security enhancement of key authentication schemes based on discrete logarithms2007-10-22Paper
Security enhancement for digital signature schemes with fault tolerance in RSA2007-10-10Paper
An efficient ID-based user identification scheme for mutual authentication in mobile environments2007-09-18Paper
Comments on WLT attack on an enhanced timestamp-based password authentication scheme2007-09-18Paper
Security enhancement of Yang-Li hierarchical access control mechanism2007-09-18Paper
Comments on e-mail protocols providing forward secrecy2007-09-18Paper
https://portal.mardi4nfdi.de/entity/Q52941692007-07-24Paper
https://portal.mardi4nfdi.de/entity/Q52941732007-07-24Paper
Security enhancement of an IC-card-based remote login mechanism2007-06-04Paper
https://portal.mardi4nfdi.de/entity/Q34379592007-05-10Paper
https://portal.mardi4nfdi.de/entity/Q34296352007-04-02Paper
https://portal.mardi4nfdi.de/entity/Q34296362007-04-02Paper
https://portal.mardi4nfdi.de/entity/Q34246342007-03-07Paper
https://portal.mardi4nfdi.de/entity/Q34160792007-01-19Paper
A parallel residue-to-binary conversion algorithm without trial division2007-01-09Paper
An efficient image authentication method based on Hamming code2006-12-07Paper
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels2006-08-14Paper
https://portal.mardi4nfdi.de/entity/Q54806552006-08-03Paper
https://portal.mardi4nfdi.de/entity/Q54801732006-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54801752006-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54801782006-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54728602006-06-19Paper
https://portal.mardi4nfdi.de/entity/Q54728632006-06-19Paper
https://portal.mardi4nfdi.de/entity/Q54728892006-06-19Paper
https://portal.mardi4nfdi.de/entity/Q54729012006-06-19Paper
An anonymous and flexible í-out-of-n electronic voting scheme2006-06-19Paper
A novel efficient \((t,n)\) threshold proxy signature scheme2006-05-16Paper
A division algorithm for residue numbers2006-04-28Paper
An iterative modular multiplication algorithm in RNS2006-02-07Paper
https://portal.mardi4nfdi.de/entity/Q33673632006-01-24Paper
https://portal.mardi4nfdi.de/entity/Q57066722005-11-21Paper
A time-stamping protocol for digital watermarking2005-11-14Paper
Authentication schemes with no verification table2005-10-28Paper
SIMILAR IMAGE RETRIEVAL BASED ON WAVELET TRANSFORMATION2005-09-27Paper
The general pay-word: A micro-payment scheme based on \(n\)-dimension one-way hash chain2005-08-17Paper
A scheme for threshold multi-secret sharing2005-08-05Paper
https://portal.mardi4nfdi.de/entity/Q54615942005-07-26Paper
https://portal.mardi4nfdi.de/entity/Q54616002005-07-26Paper
https://portal.mardi4nfdi.de/entity/Q46680612005-04-18Paper
https://portal.mardi4nfdi.de/entity/Q46680622005-04-18Paper
https://portal.mardi4nfdi.de/entity/Q46595142005-03-21Paper
https://portal.mardi4nfdi.de/entity/Q46542662005-03-03Paper
https://portal.mardi4nfdi.de/entity/Q46542782005-03-03Paper
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli2005-02-22Paper
Digital signature with message recovery using self-certified public keys without trustworthy system authority2005-02-22Paper
A high-speed division algorithm in residue number system using parity-checking technique2005-01-14Paper
https://portal.mardi4nfdi.de/entity/Q48316892005-01-03Paper
https://portal.mardi4nfdi.de/entity/Q48282952004-11-25Paper
https://portal.mardi4nfdi.de/entity/Q48282982004-11-25Paper
https://portal.mardi4nfdi.de/entity/Q48282992004-11-25Paper
https://portal.mardi4nfdi.de/entity/Q48257222004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q48259652004-11-05Paper
https://portal.mardi4nfdi.de/entity/Q48236442004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48236592004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q48236872004-10-28Paper
PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION2004-10-06Paper
https://portal.mardi4nfdi.de/entity/Q48184182004-09-28Paper
https://portal.mardi4nfdi.de/entity/Q44735702004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44735712004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44626302004-05-18Paper
Parallel computational algorithms for generalized Chinese remainder theorem.2004-03-14Paper
https://portal.mardi4nfdi.de/entity/Q44500342004-02-15Paper
https://portal.mardi4nfdi.de/entity/Q44519482004-02-11Paper
https://portal.mardi4nfdi.de/entity/Q44459662004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44463462004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44463842004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44464202004-02-02Paper
https://portal.mardi4nfdi.de/entity/Q44421732004-01-20Paper
https://portal.mardi4nfdi.de/entity/Q44361092003-11-23Paper
https://portal.mardi4nfdi.de/entity/Q44309792003-10-13Paper
Construction of Symmetrical Reversible Variable Length Codes Using Backtracking2003-08-07Paper
A steganographic method based upon JPEG and quantization table modification2003-06-25Paper
An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images2003-04-03Paper
A threshold decryption scheme without session keys2003-02-20Paper
Image matching using run-length feature2003-02-20Paper
A fast pixel mapping algorithm using principal component analysis2003-02-11Paper
Cryptanalysis of an encryption scheme for binary images2003-02-11Paper
A novel progressive modelling algorithm for 3D models2003-02-04Paper
Error prevention and resilience of VQ encoded images2003-01-22Paper
An efficient protocol for anonymous multicast and reception.2003-01-21Paper
Two 2D search filters and their performance analyses2002-12-19Paper
https://portal.mardi4nfdi.de/entity/Q45357592002-11-05Paper
https://portal.mardi4nfdi.de/entity/Q31482892002-09-30Paper
A compact sparse matrix representation using random hash functions2002-07-29Paper
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\)2002-07-25Paper
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy2002-06-27Paper
https://portal.mardi4nfdi.de/entity/Q27832632002-04-15Paper
https://portal.mardi4nfdi.de/entity/Q27300882001-10-01Paper
A method for computing Lucas sequences2001-07-15Paper
A virtual image cryptosystem based upon vector quantization2000-09-06Paper
A multichannel storage arrangement scheme of pictorial databases for concurrent spatial match retrieval2000-07-09Paper
https://portal.mardi4nfdi.de/entity/Q42463382000-06-14Paper
https://portal.mardi4nfdi.de/entity/Q49529062000-05-10Paper
https://portal.mardi4nfdi.de/entity/Q42220421999-05-05Paper
A bin-tree oriented iconic indexing scheme for retrieving symbolic pictures1998-08-13Paper
A parallel two-list algorithm for the knapsack problem1998-07-23Paper
Some properties of optimal cartesian product files for orthogonal range queries1998-02-25Paper
https://portal.mardi4nfdi.de/entity/Q38400901998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43638241997-12-15Paper
A secure voting system on a public network1997-11-25Paper
https://portal.mardi4nfdi.de/entity/Q43638191997-11-12Paper
Proper interval graphs and the guard problem1997-08-10Paper
Parallel computation of the multi-exponentiation for cryptosystems1997-06-30Paper
https://portal.mardi4nfdi.de/entity/Q56901531997-05-11Paper
Integrating authentication in public key distribution system1997-02-27Paper
Authenticated encryption schemes with message linkage1997-02-27Paper
Efficient cheater identification method for threshold schemes1997-01-01Paper
Some properties of vectorial addition chains1996-05-28Paper
Arithmetic operations on encrypted data1996-05-01Paper
https://portal.mardi4nfdi.de/entity/Q48357791995-06-08Paper
Controlling access in tree hierarchies1995-02-05Paper
An authentication-combined access control scheme using a one-way function1994-10-04Paper
A refinement of a compression-oriented addressing scheme1994-03-22Paper
Optimal MMI file systems for orthogonal range retrieval1994-01-31Paper
Algebraic operations on encrypted relational databases1994-01-31Paper
Using smart cards to authenticate remote passwords1994-01-06Paper
Access control in a hierarchy using a one-way trap door function1994-01-06Paper
On GDM allocation method for partial range queries1993-12-20Paper
A fast algorithm to retrieve symbolic pictures1993-01-16Paper
A password authentication scheme based on discrete logarithms1992-06-28Paper
https://portal.mardi4nfdi.de/entity/Q39853451992-06-27Paper
A note on allocating k-ary multiple key hashing files among multiple disks1991-01-01Paper
A reciprocal confluence tree unit and its applications1990-01-01Paper
Application of principal component analysis to multi-disk concurrent accessing1988-01-01Paper
Short notes: A Recursive Performance Formula of the Disc Modulo Allocation Method for Binary Cartesian Product Files1988-01-01Paper
An Information Protection Scheme Based upon Number Theory1987-01-01Paper
An Information Protection Scheme Based upon Number Theory1987-01-01Paper
On the design of a key-lock-pair mechanism in information protection systems1986-01-01Paper
A scheme for constructing ordered minimal perfect hashing functions1986-01-01Paper
A Letter-oriented Minimal Perfect Hashing Scheme1986-01-01Paper
Query Processing in a Fragmented Relational Distributed System: Mermaid1985-01-01Paper
An ordered minimal perfect hashing scheme based upon Euler's theorem1984-01-01Paper
Optimal information retrieval when queries are not random1984-01-01Paper
Performance Analyses of Cartesian Product Files and Random Files1984-01-01Paper
https://portal.mardi4nfdi.de/entity/Q36786961984-01-01Paper
The hierarchical ordering in multiattribute files1983-01-01Paper
Symbolic Gray Code as a Perfect Multiattribute Hashing Scheme for Partial Match Queries1982-01-01Paper

Research outcomes over time

This page was built for person: Chin-Chen Chang