No. | Project Title | Time Period | Sponsor | Title | Grant Number |
1 | Minimal Perfect Hashing Scheme Based Upon Number Theory | 71.12.20-72.11.19 | National Science Council | Principle Investigator | NSC72-0404-E009-013 |
2 | Optimal Multi-attribute Hashing Scheme when Quires are not Ran | 72.08.01-73.05.31 | National Science Council | Principle Investigator | NSC73-0208-M005-01 |
3 | The Design and Implementation of a Database Management System | 72.06.01-73.05.31 | Control Data Cooperation, Taiwan | Principle Investigator | |
4 | Some Design and Allocation Problems for Concurrent Disk Accessing | 73.08.01-74.07.31 | National Science Council | Principle Investigator | NSC74-0408-E005-01 |
5 | The Study of an Letter-oriented Minimal Perfect Hashing Scheme | 73.11.01-74.10.31 | National Science Council | Principle Investigator | NSC74-0408-E005-02 |
6 | An Information Protection Scheme Based upon Number Theory | 74.08.01-75.07.31 | National Science Council | Principle Investigator | NSC75-0408-E005-01 |
7 | Symbolic Solver for Recurrence Relations | 74.08.31-75.07.31 | National Science Council | Principle Investigator | NSC75-0408-E005-02 |
8 | The Design and Development of a Chinese Visual Form Oriented Programming System | 74.08.01-75.07.31 | Control Data Cooperation, Taiwan | Principle Investigator | |
9 | The Development of a CAI System for Structured Assembly Language Programming | 74.12.01-75.11.30 | National Science Council | Co-Investigator | NSC75-0408-E005-03 |
10 | Optimal Cartesian Product Files for Concurrent Disk Accessing | 75.04.01-76.03.31 | National Science Council | Co-Investigator | NSC75-0408-E035-02 |
11 | The Study of Allocating Multiple Key Hashing File System Among Multiple Disks | 75.04.01-76.03.31 | National Science Council | Principle Investigator | NSC75-0408-E005-04 |
12 | The Development and Evaluation of a Secure Broadcasting System | 75.08.01-76.07.31 | National Science Council | Principle Investigator | NSC76-0408-E005-01 |
13 | The Difficulty of Construction Perfect Hashing Functions | 75.12.01-76.11.30 | National Science Council | Principle Investigator | NSC76-0408-E005-02 |
14 | The Study and Development of Approximate Patten Matching in Large Textual Files | 75.12.01-76.11.30 | National Science Council | Co-Investigator | NSC76-0408-E035-01 |
15 | The Study of Inductive Question Answering and Data Integrity | 75.12.01-76.11.30 | National Science Council | Co-Investigator | NSC76-0408-E005-03 |
16 | On the Design and Analysis of Multi-disk File Allocation Method for Concurrent Retrieval | 76.01.01-77.03.31 | National Science Council | Co-Investigator | NSC76-0408-E035-03 |
17 | The Study of Retrieving Techniques of Phonetic Syllables | 76.04.01-77.03.31 | National Science Council | Co-Investigator | NSC76-0408-E005-04 |
18 | The Study of a Dynamic Access Control Scheme | 76.08.01-77.07.31 | National Science Council | Principle Investigator | NSC77-0408-E005-01 |
19 | Some Properties of Multi-attribute File Systems for Orthogonal Range Retrieval | 76.12.01-77.11.30 | National Science Council | Co-Investigator | NSC77-0408-E035-02 |
20 | Applying Multi-variant Analysis Techniques to Information Storage and Retrieval | 76.12.01-77.11.30 | National Science Council | Principle Investigator | NSC77-0408-E005-02 |
21 | The Design of an Automatic Terrain Map Generator | 76.10.01-77.09.30 | Control Data Cooperation, Taiwan | Principle Investigator | |
22 | Visual Form Conversion Expert System-Design and Development | 77301.01-78.03.31 | National Science Council | Co-Investigator | NSC77-0408-E005-03 |
23 | The Studies of Pattern Near-Matching Both in Chinese and in English | 77.04.01-78.03.31 | National Science Council | Co-Investigator | NSC77-0408-E005-04 |
24 | The Study of Information Security Schemes | 77.08.01-78.07.31 | National Science Council | Principle Investigator | NSC78-0408-E005-01 |
25 | The Application of Computers to Courses for Home Economics | 77.01.01-77.07.20 | Department Taiwan Provincial Government of Education | Principle Investigator | |
26 | The Application of Computers to Courses Agriculture | 77.01.01-77.07.20 | Department Taiwan Provincial Government of Education | Principle Investigator | |
27 | Planning the City Government Information System for Taichung City Government | 77.07.01-78.06.30 | Taichung City Government | Principle Investigator | |
28 | The Study of Chinese Computing Technology and the Development of Chinese Information System | 77.07.01-78.04.30 | Chung-Shan Institute of Science and Technology | Principle Investigator | |
29 | The Study of Data Compression in Chinese Textual Files | 78.02.01-79.01.31 | National Science Council | Co-Investigator | NSC78-0408-E005-03 |
30 | Some Cryptosystems Based upon Euclidean Geometry | 77.12.01-79.01.31 | National Science Council | Principle Investigator | NSC78-0408-E005-02 |
31 | A Compression Method for Chinese and English Data | 78.08.01-79.07.31 | National Science Council | Principle Investigator | NSC79-0408-E194-01 |
32 | On the Design of Password Authentication Systems | 79.02.01-80.01.31 | National Science Council | Principle Investigator | NSC79-0408-E194-03 |
33 | Planning the County Government Information System for Taitung County Government | 79.11.01-80.06.30 | Taitung Country Government | Principle Investigator | |
34 | The Studies of Designing Optimal Multi-attribute File Systems by the MMI Method for Orthogonal Range Retrieval | 79.02.01-80.01.31 | National Science Council | Co-Investigator | |
35 | The Research and Development of a Palm Carried Electronic Memory Card | 78.12.01-79.05.31 | Pusan Technology Cooperation | Principle Investigator | |
36 | The Study of Dynamic Key-Lock-Pair Access Control Schemes | 79.08.01-80.07.31 | National Science Council | Co-Investigato | |
37 | Design and Performance Comparison of Some Signature Extraction Schemes for Symbolic Pictures | 79.08.01--80.07.31 | National Science Council | Principle Investigator | NSC80-0408-E194-02 |
38 | A Study of Advanced Communication Protocol for Its Security and Verification | 79.08.01-80.07.31 | Directorate General of Telecommunications, Ministry of Transportation and Communications | Principle Investigator | TL-81-3105 |
39 | A Design of Security Architecture on Message Handing System and Directory System | 79.08.01-80.07.31 | Directorate General of Telecommunications, Ministry of Transportation and Communications | Principle Investigator | TL-81-3201 |
40 | Planning the Computer Cryptological Research | 79.08.01-79.12.31 | National Science Council | Principle Investigator | NSC80-0408-E194-06 |
41 | On Research and Development of Dictionary Compressing and Searching Technologies | 80.02.01-81.01.31 | National Science Council | Principle Investigator | NSC80-0408-E194-12 |
42 | A Secure Broadcasted System for Military Secret Data | 80.02.01-81.01.31 | Chung-Shan Institute of Science and Technology | Principle Investigator | CS80-0210-D194-01 |
43 | The Status and Requirements of Computer System Security | 80.03.01-80.06.30 | Institute for Information Industry | Principle Investigator | |
44 | The Design of a Database for Service Control Points | 80.07.01-81.06.30 | Chunghwa Telecom Laboratories, Ministry of Transportation and Communications | Principle Investigator | TL-81-1101 |
45 | On Research and Development of a Content-Independent Data Compression Scheme | 80.08.01-81.07.31 | National Science Council | Principle Investigator | NSC81-0408-E-194-03 |
46 | Parallel Computation-Theories , Systems and Applications | 80.08.01-83.07.31 | National Science Council | Co-Investigator | |
47 | The Study of an Open De-Virus System | 80.09.01-81.06.30 | Ministry of Education | Principle Investigator | MOECC81-A003 |
48 | New Concepts for Multiple Stack System: Born and Reborn | 81.02.01-82.01.31 | National Science Council | Principle Investigator | NSC81-0K08-E-194-507 |
49 | Identity-Based Cryptosystem Design and Implementation | 81.08.01-82.07.31 | National Science Council | Co-Investigator | |
50 | The Study of a Storage and Retrieval Scheme for Chinese Multi-Character Words | 81.08.01-82.07.31 | National Science Council | Principle Investigator | NSC82-0408-E-194-009 |
51 | Digital Signature Based on the Error-Correcting Codes | 81.08.01-82.07.31 | National Science Council | Co-Investigator | NSC82-0408-E-194-003 |
52 | The Study of Generalized Group-Oriented Secret Sharing | 82.02.01-83.01.31 | National Science Council | Principle Investigator | NSC82-0408-E-194-027 |
53 | The Study of Compressing in Chinese Computing Environment | 82.08.01-83.07.31 | National Science Council | Principle Investigator | NSC82-0408-E-194-002 |
54 | An Information Management System for Middle and Long-term Projects of Province Affairs | 83.08.01-84.05.31 | Research, Development, and Evaluation Commission, Taiwan Provincial Government | Principle Investigator | |
55 | The Study of a Secret Voting System on Computer Networks | 83.02.01-84.07.31 | National Science Council | Principle Investigator | NSC83-0408-E-194-013
NSC84-0408-E-194-006 |
56 | The Development of a New Digital Multisignature System | 83.07.01-84.06.30 | Chung-Shan Institute of Science and Technology | Principle Investigator | CS84-0210-D-194-001 |
57 | The Study of a Fast Cascade Exponentiation Evaluating Scheme | 83.08.01-84.07.31 | National Science Council | Principle Investigator | NSC84-2213-E-194-001 |
58 | The Resource Allocations in Multi-processor Systems | 83.02.01-84.07.31 | National Science Council | Co-Investigator | |
59 | Setting High Speed Network and the Application Platform for National Chung Cheng University | 83.12.01-84.06.30 | Ministry of Education | Co-Investigator | |
60 | The Editing of Outlines of Localized Teaching Materials for Contemporary Computer Cryptography | 83.12.01-84.05.31 | Advisory Office, Ministry of Education | Principle Investigator | 台(84)顧005535 |
61 | The Computation of the Modular Multi-Exponentiation | 84.08.01-85.07.31 | National Science Council | Principle Investigator | NSC85-2213-E-194-010 |
62 | A Design of Spatial Data Structure and Spatial Data Filters | 85.08.01-86.07.31 | National Science Council | Principle Investigator | NSC86-2213-E-194-003 |
63 | Toward the Research and Development of Key Technology for RSA-type Public Key Cryptoschemes | 85.08.01-88.07.31 | National Science Council | Principle Investigator | NSC86-2213-E-194-001 |
64 | A Study on Encryption and Decryption Technologies in Satellite Communications | 85.08.01-86.07.31 | National Space Program Office | Principle Investigator | NSC86-NSPO(A)-PC-FA06-02 |
65 | The Design of Large Pictorial Database System | 86.08.01-87.07.31 | National Science Council | Principle Investigator | NSC87-2213-E-194-003 |
66 | The Design of Compression Method for Large Sparse Matrices | 86.08.01-87.07.31 | National Science Council | Principle Investigator | NSC87-2213-E-194-001 |
67 | The Proposal of Information Security Management for Government Organization | 86.03.01-86.06.30 | Research, Development, and Evaluation Commission, Taiwan Provincial Government | Principle Investigator | |
68 | The Proposal of Information Security Standards | 86.09.01-87.05.31 | National Bureau of Standards, Ministry of Economic Affairs | Principle Investigator | |
69 | Towards Indexing and Normalizing of Iconics for Image Similarity Retrieval | 87.08.01-88.07.31 | National Science Council | Principle Investigator | NSC88-2213-E-194-005 |
70 | The Study of Secret Sharing Schemes for Secret Image and Cheater Identification Scheme | 87.08.01-88.07.31 | National Science Council | Principle Investigator | NSC88-2213-E-194-003 |
71 | Planning the Draft Proposal of Information Security Standards | 87.08.01-88.05.31 | National Bureau of Standards, Ministry of Economic Affairs | Researcher | |
72 | On the Study and Development of Technical Rule, Management Mechanism and Validation for Cryptographic Modules in Communication Security | 87.08.01-88.05.31 | Directorate General of Telecommunications, Ministry of Transportation and Communications | Associate Program Director | |
73 | A Mechanism of Treating Emergent Events of Information Security for E-Government | 87.09.01-88.02.28 | Research, Development and Evaluation Commission, Executive Yuan | Co-Investigator | |
74 | The Study of Some Image Compression Mechanisms (3/1) | 88.08.01-91.07.31 | National Science Council | Principle Investigator | NSC89-2213-E-194-020 |
75 | Spatial Similarity Retrieval in Video Database | 88.08.01-89.07.31 | National Science Council | Principle Investigator | NSC89-2213-E-194-003 |
76 | Speeding up the Computations of Lucas Function and Elliptic Curve Cryptosystems | 88.08.01-89.07.31 | National Science Council | Principle Investigator | NSC89-2213-E-194-002 |
77 | A Study on Color Image Cryptosystems | 89.08.01-90.07.31 | National Science Council | Principle Investigator | NSC89-2218-E-194-007 |
78 | The Study of Some Image Compression Mechanisms (3/2) | 89.08.01-90.07.31 | National Science Council | Principle Investigator | NSC89-2218-E-194-012 |
79 | A Video Retrieval Technique Based on Piecewise Matching Method | 89.08.01-90.07.31 | National Science Council | Principle Investigator | NSC89-2218-E-194-008 |
80 | A study of Similar Color Image Retrieval Using RCM-Wavelet-Based Features | 90.08.01-91.07.31 | National Science Council | Principle Investigator | NSC90-2213-E-194-026 |
81 | A Study of Image Compression Schemes with Error Correction Capability | 90.08.01-91.07.31 | National Science Council | Principle Investigator | NSC90-2213-E-194-041 |
82 | The Study of Some Image Compression Mechanisms (3/3) | 90.08.01-91.07.31 | National Science Council | Principle Investigator | NSC90-2213-E-194-013 |
83 | A Study on Information Hiding Techniques for Various Types of Digital Images (1/3) | 91.08.01-92.07.31 | National Science Council | Principle Investigator | NSC91-2213-E-194-016 |
84 | A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (1/3) | 91.08.01-92.07.31 | National Science Council | Principle Investigator | NSC91-2213-E-194-017 |
85 | A Study on Information Hiding Techniques for Various Types of Digital Images (2/3) | 92.08.01-93.07.31 | National Science Council | Principle Investigator | NSC92-2213-E-194-005 |
86 | A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (2/3) | 92.08.01-93.07.31 | National Science Council | Principle Investigator | NSC92-2213-E-194-004 |
87 | Multi-function digital watermarking system | 92.09.01-93.08.31 | 鉦霖資訊有限公司 | Principle Investigator | |
88 | A Study on Information Hiding Techniques for Various Types of Digital Images (3/3) | 93.08.01-94.07.31 | National Science Council | Principle Investigator | NSC93-2213-E-194-004 |
89 | A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (3/3) | 93.08.01-94.07.31 | National Science Council | Principle Investigator | NSC93-2213-E-194-003 |
90 | Information Hiding Techniques for Various Data Compression mechanisms(1/3) | 94.08.01-95.07.31 | National Science Council | Principle Investigator | NSC94-2213-E-194-038 |
91 | The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (1/3) | 94.08.01-95.07.31 | National Science Council | Principle Investigator | NSC94-2213-E-194-039 |
92 | Information Hiding Techniques for Various Data Compression mechanisms(2/3) | 95.08.01-96.07.31 | National Science Council | Principle Investigator | NSC95-2221-E-035-140 |
93 | The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (2/3) | 95.08.01-96.07.31 | National Science Council | Principle Investigator | NSC95-2221-E-035-141 |
94 | The Intellectual Property Rights University Campus Visit Project | 96.04.01-96.09.30 | Ministry of Education | Co-Investigator | 95 | Information Hiding Techniques for Various Data Compression mechanisms(3/3) | 96.08.01-97.07.31 | National Science Council | Principle Investigator | NSC 96-2221-E-035-009 |
96 | The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (3/3) | 96.08.01-97.07.31 | National Science Council | Principle Investigator | NSC 96-2221-E-035-010 |
97 | The Study of Secure Electronic Transaction Mechanisms in Internet (1/3) | 97.08.01-98.07.31 | National Science Council | Principle Investigator | NSC 97-2221-E-035-039-MY3 |
98 | Reversible and Removable Data Embedding Techniques for Digital Images (1/3) | 97.08.01-98.07.31 | National Science Council | Principle Investigator | NSC 97-2221-E-035-084-MY3 |
99 | The Study of Secure Electronic Transaction Mechanisms in Internet (2/3) | 98.08.01-99.07.31 | National Science Council | Principle Investigator | NSC 97-2221-E-035-039-MY3 |
100 | Reversible and Removable Data Embedding Techniques for Digital Images (2/3) | 98.08.01-99.07.31 | National Science Council | Principle Investigator | NSC 97-2221-E-035-084-MY3 |
101 | The Study of Secure Electronic Transaction Mechanisms in Internet (3/3) | 99.08.01-100.07.31 | National Science Council | Principle Investigator | NSC 97-2221-E-035-039-MY3 |
102 | Reversible and Removable Data Embedding Techniques for Digital Images (3/3) | 99.08.01-100.07.31 | National Science Council | Principle Investigator | NSC 97-2221-E-035-084-MY3 |
103 | The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (1/3) | 100.08.01-101.07.31 | National Science Council | Principle Investigator | NSC 100-2221-E-035-049-MY3 |
104 | The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (1/3) | 100.08.01-101.07.31 | National Science Council | Principle Investigator | NSC 100-2221-E-035-093-MY3 |
105 | The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (2/3) | 101.08.01-102.07.31 | National Science Council | Principle Investigator | NSC 100-2221-E-035-049-MY3 |
106 | The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (2/3) | 101.08.01-102.07.31 | National Science Council | Principle Investigator | NSC 100-2221-E-035-093-MY3 |
107 | The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (3/3) | 102.08.01-103.07.31 | National Science Council | Principle Investigator | NSC 100-2221-E-035-049-MY3 |
108 | The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (3/3) | 102.08.01-103.07.31 | National Science Council | Principle Investigator | NSC 100-2221-E-035-093-MY3 |
109 | Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (1/3) | 103.08.01-104.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 103-2221-E-035 -046 -MY3 |
110 | The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (1/2) | 103.08.01-104.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 103-2221-E-035 -102 -MY2 |
111 | Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (2/3) | 104.08.01-105.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 103-2221-E-035 -046 -MY3 |
112 | The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (2/2) | 104.08.01-105.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 103-2221-E-035 -102 -MY2 |
113 | Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (3/3) | 104.08.01-105.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 103-2221-E-035 -102 -MY3 |
114 | Reversible Information Hiding Techniques Based on Coding Strategy | 105.08.01-106.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 105-2221-E-035-051- |
115 | Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (1/3) | 106.08.01-107.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 106-2221-E-035 -013 -MY3 |
116 | Research on Reversible Data Hiding in Encryption Domain (1/3) | 106.08.01-107.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 106-2221-E-035 -018 -MY3 |
117 | Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (2/3) | 107.08.01-108.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 106-2221-E-035 -013 -MY3 |
118 | Research on Reversible Data Hiding in Encryption Domain (2/3) | 107.08.01-108.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 106-2221-E-035 -018 -MY3 | 119 | Print-Cam Resilient Watermarking Algorithms with High Robustness and Beautification of Visible Watermarks in QR Codes (3/3) | 108.08.01-109.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 106-2221-E-035 -013 -MY3 |
120 | Research on Reversible Data Hiding in Encryption Domain (3/3) | 108.08.01-109.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 106-2221-E-035 -018 -MY3 |
121 | Secret Sharing Techniques on High-Payload QR Codes, Visually Cryptographic QR Codes, and Rich QR Codes(1/2) | 109.08.01-110.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 109-2221-E-035-059-MY2 |
122 | Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images(1/3) | 109.08.01-110.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 109-2221-E-035-060-MY3 |
123 | Secret Sharing Techniques on High-Payload QR Codes, Visually Cryptographic QR Codes, and Rich QR Codes(2/2) | 110.08.01-111.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 109-2221-E-035-059-MY2 |
124 | Research on Copyright Authentication, Tamper Detection, and Privacy Protection of Medical Images(2/3) | 110.08.01-111.07.31 | Ministry of Science and Technology | Principle Investigator | MOST 109-2221-E-035-060-MY3 |