The following pages link to Chin-Chen Chang (Q287119):
Displaying 50 items.
- A simple approach for generating RSA keys (Q287121) (← links)
- Authenticated encryption schemes with linkage between message blocks (Q290252) (← links)
- Chaotic maps-based password-authenticated key agreement using smart cards (Q390649) (← links)
- Provably secure three party encrypted key exchange scheme with explicit authentication (Q497145) (← links)
- A reciprocal confluence tree unit and its applications (Q583886) (← links)
- (Q688274) (redirect page) (← links)
- On GDM allocation method for partial range queries (Q688275) (← links)
- Optimal MMI file systems for orthogonal range retrieval (Q688303) (← links)
- Algebraic operations on encrypted relational databases (Q688305) (← links)
- An on-line electronic check system with mutual authentication (Q733312) (← links)
- The hierarchical ordering in multiattribute files (Q760202) (← links)
- An iterative modular multiplication algorithm in RNS (Q814756) (← links)
- An efficient image authentication method based on Hamming code (Q854257) (← links)
- A parallel residue-to-binary conversion algorithm without trial division (Q861245) (← links)
- Security enhancement of an IC-card-based remote login mechanism (Q883250) (← links)
- A two-codebook combination and three-phase block matching based image-hiding scheme with high embedding capacity (Q936433) (← links)
- Sharing secrets in stego images with authentication (Q936437) (← links)
- A color image watermarking scheme based on color quantization (Q948350) (← links)
- High capacity SMVQ-based hiding scheme using adaptive index (Q985527) (← links)
- A countable and time-bound password-based user authentication scheme for the applications of electronic commerce (Q1006746) (← links)
- Distortion-free secret image sharing mechanism using modulus operator (Q1010099) (← links)
- A lossless data embedding technique by joint neighboring coding (Q1015235) (← links)
- Authors reply ``Sharing secrets in stego images with authentication'' (Q1015241) (← links)
- Removing blocking effects using an artificial neural network (Q1031292) (← links)
- Lossless image compression based on multiple-tables arithmetic coding (Q1036264) (← links)
- An ordered minimal perfect hashing scheme based upon Euler's theorem (Q1060014) (← links)
- Optimal information retrieval when queries are not random (Q1061507) (← links)
- On the design of a key-lock-pair mechanism in information protection systems (Q1090472) (← links)
- Application of principal component analysis to multi-disk concurrent accessing (Q1104736) (← links)
- (Q1309721) (redirect page) (← links)
- Using smart cards to authenticate remote passwords (Q1309723) (← links)
- Access control in a hierarchy using a one-way trap door function (Q1309742) (← links)
- A refinement of a compression-oriented addressing scheme (Q1317853) (← links)
- An authentication-combined access control scheme using a one-way function (Q1324344) (← links)
- Controlling access in tree hierarchies (Q1328542) (← links)
- Integrating authentication in public key distribution system (Q1350765) (← links)
- Authenticated encryption schemes with message linkage (Q1352011) (← links)
- Proper interval graphs and the guard problem (Q1363667) (← links)
- Some properties of optimal cartesian product files for orthogonal range queries (Q1369170) (← links)
- A parallel two-list algorithm for the knapsack problem (Q1392066) (← links)
- A steganographic method based upon JPEG and quantization table modification (Q1394840) (← links)
- Parallel computational algorithms for generalized Chinese remainder theorem. (Q1427328) (← links)
- A multichannel storage arrangement scheme of pictorial databases for concurrent spatial match retrieval (Q1570169) (← links)
- A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\) (Q1606999) (← links)
- A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli (Q1763231) (← links)
- Digital signature with message recovery using self-certified public keys without trustworthy system authority (Q1763234) (← links)
- A scheme for constructing ordered minimal perfect hashing functions (Q1820600) (← links)
- An efficient protocol for anonymous multicast and reception. (Q1853191) (← links)
- Error prevention and resilience of VQ encoded images (Q1853781) (← links)
- A threshold decryption scheme without session keys (Q1860020) (← links)