[Activities (Society)] [Activities (Other)] [Technical Reviewer] [Consulting] [Projects] [Theses (Master)] [Awards]
NAME: Chin-Chen Chang
PERSONAL
Place of Birth
Taiwan
Citizenship
Taiwan, R.O.C.
Marital Status
Married
ADDRESS
Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan, R.O.C.
Phone: +886-4-24517250 ext. 3790
Fax: +886-4-27066495
E-mail: alan3c@gmail.com
EDUCATION
Ph.D. in Computer
Engineering, National Chiao Tung University, 1982.
M.S. in Computer and Decision Sciences, National Tsing Hua University, 1979.
B. S. in Mathematics, National Tsing Hua University, 1977.
SPECIALIZED FIELDS
Cryptography and Network Security, Database Design, Image Processing
MEMBERSHIPS IN ACADEMIC AND PROFESSIONAL SOCIETIES
1. 2006/05-Present Member of IEICE Communications Society and Information & Systems Society, Japan
2. 2004/07-Present Member of European Association for Computer Graphics
3. 2001/08-Present Member of Chinese Institute of Electrical Engineering
4. 2001/06-Present Member of SPIE-The International Society for Optical Engineering
5. 2000/04-Present Member of Chinese Language Computer Society
6. 1987/12-Present Member of IEEE Computer Society
7. 1999/07-Present Member of Institute of Information & Computing Machinery of the R.O.C.
8. 1999/03-Present Member of ACM Society
9. 1998/04-Present Member of the IEE Society
10. 1994/05-Present Member of Chinese Cryptography and Information Security Association of the R.O.C.
11. 1993-Present Member of International Association for Cryptologic Research (IACR)
12. 1988-Present Member of Computer Society of the R.O.C.
13. 1984/09-Present Member of Chinese Institute of Engineers of the R.O.C.
14. 1979/06-Present Member of Phi Tau Phi Honorary Society of the R.O.C.
Professional
Experiences¡G
1. Adjunct Chair Professor, National Chung Hsing University (2009/02~Present)
2. Honorary Chair Professor, Tung Hai University (2006/02~Present)
3. Honorary Professor, National Chung Cheng University (2005/02~Present)
4. Joint Appointment Professor, National Chung Cheng University, (2004/08~Present)
5. Chair Professor, National Chung Cheng University (2003/01~2005/01)
6. Joint Appointment Professor, National Tsing Hua University (2002/08~Present)
7. Adjunct Chair Professor, Providence University (2002/08~2005/07)
8. Director, Advisory Office, Ministry of Education of the R.O.C. (1998/07~2000/06)
9. Adjunct Chair Professor of Information Management, ChaoYang University of Technology (1997/08~1998/07)
10. Acting President, National Chung Cheng University (1996/09~1997/10)
11. Dean of Academic Affairs, National Chung Cheng University (1995/08~1997/10)
12. Chairman of Common Courses, National Chung Cheng University (1995/08~1997/10)
13. Chairman of Automation Research Center, National Chung Cheng University (1993/08~1995/07)
14. Dean of Engineering, National Chung Cheng University (1992/08~1995/07)
15. Acting Dean of Engineering, National Chung Cheng University (1991/10~1992/07)
16. Chairman of Automation Research Center, National Chung Cheng University (1990/08~1992/07)
17. Acting Chairman of Automation Research Center, National Chung Cheng University (1989/10~1990/07)
18. Acting Chairman of Computer Center, National Chung Cheng University (1989/08~1990/02)
19. Chairman of Computer Science and Information Engineering, National Chung Cheng University (1989/08~1992/07)
20. Adjunct Professor in Computer Science, Tung Hai University (1987/08~1989/07)
21. Adjunct Professor in Statistics, Tung Hai University (1986/08~1987/07)
22. Professor in Applied Mathematics, National Chung Hsing University (1985/08~1989/07)
23. Associate Professor in Applied Mathematics, National Chung Hsing University (1983/08~1985/07)
24. Associate Professor in Computer Engineering, National Chiao Tung University (1982/08~1983/07)
25. Lecturer in Computer Engineering, National Chiao Tung University( 1980/08~1982/07)
26. Lecturer in Applied Mathematics, National Chung Hsing University (1980/02~1980/07)
27. System Consulting Engineer, Institute of Information Industry (1979/06~1980/01)
28. System Engineer, Hewlett Packard Computer Company (1978/12~1979/05)
Incumbency¡G
Chair Professor, Feng Chia University
Honorary and Hopewell Appointed Professor, National Chung Cheng University
Hopewell Appointed Professor, National Tsing Hua University
1. The Excellent Paper Award of International management engineering, software engineering and service science conference, Jan. 2017
1. Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of Taiwanese Association for Consumer Electronics, Oct. 2015
2. The Leadership Award of 2014 IEEE Reliability Society, Jun. 2014
3. The Best Paper Award of 2014 International Conference on Knowledge Engineering and Applications (ICKEA 2014), Jun. 2014
4. The Best Paper Award of 2013 National Computer Symposium (NSC 2013), Dec. 2013
5. The Distinguished Research Award of IET, Sep. 2013
6. 2013 Supervised Honorable Mention for MATLAB/Simulink of TeraSoft, May 2013
7. The Best Paper Award of the 2012 Seventh Asia Joint Conference on Information Security, Tokyo, Japan, Aug. 2012
8. AsiaJCIS Lifetime Achivement Award, Aug. 2012
9. 2012 Supervised Honorable Mention for MATLAB Programing of TeraSoft, May 2012
10. 2011 Supervised Dissertation Awarded for Outstanding M.S. Dissertation of Taiwanese Association for Consumer Electronics, 2011
11. The Best Paper Award of 2011 International Conference on Information Mangement (ICIM 2011), May 2011
12. The Top Cited Paper Award of Pattern Recognition Letters, Mar. 2011
13. The 2010 Honorary Medal of Information of Institute of Information & Computing Machinery of the R. O. C., Mar. 2011
14. Ranked 2nd in the Most Prolific DBLP Authors (http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/prolific/index.html), Aug. 2010
15. Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 2002 and 2006 [Ref: J. Systems and Software, Vol. 82 , pp. 1370¡V1373, 2009], Jun 2009
16. Chair Professor in Information Security of the National Chung Hsing University, Feb. 1, 2009
17. The Best Paper Award of the IEEE International Symposium on Electronic Commerce and Security, Aug. 2008
18. The Best Paper Award of GESTS International Transactions on Computer Science and Engineering by Global Engineering, Science, and Technology Society (GESTS), Sept. 2006
19. The Best Paper Award of the 2006 International Conference on Innovative Computing, Information and Control, Beijing, China, Aug. 2006
20. Research Merit Award of the 2006 International Workshop on Computer Science (IWCS¡¦06) by International Association of Engineers (IAENG), Hong Kong, Jul. 2006
21. Year 2006 Top 500 World¡¦s Most Influential Scientist Award by the International Academy of Biographies, 2006
22. The First Class National Science Council Project Grant within Three Years, Aug. 2005-Jul. 2008
23. The Outstanding Contribution Award of Chinese Cryptology and Information Security Association, Jun. 2005
24. Honorary Professor of the National Chung Cheng University, Jan. 2005
25. The Excellent Paper Award of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Kyusyu, Japan, Mar. 2004
26. Champion of the 2003 Campus Website Competition in the Teachers Group, National Chung Cheng University, Jul. 2003
27. Research Outstanding Award of the Pan Wen Yuan Foundation, Jun. 2003
28. Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 1998 and 2002 [Ref: J. Systems and Software, Vol. 68, pp. 77-84, 2003], May 2003
29. Outstanding Alumni Award of the National Chiao Tung University, Mar. 2003
30. Merit NSC Research Fellow Award of the National Science Council (NSC) of the Executive Yuan, Jan. 2003
31. The International Association for Cryptologic Research Gratefully Acknowledges Chin-Chen Chang for His Contribution to the Worldwide Cryptologic Community Through His Role General Chair of AsiaCrypt 2003, Taiwan, 2003
32. Winner of Top 15 Scholars in the World in the Field of Systems and Software Engineering During 1997 and 2001 [Ref: J. Systems and Software, Vol. 64, pp. 79-86, 2002], May 2002
33. Outstanding Alumni Award of the College of Electrical Engineering and Computer Science (EECS), National Tsing Hua University, Apr. 2002
34. Chair Professor of the National Chung Cheng University, Jan. 18, 2002
35. TECO Technology Award of the TECO Technology Foundation, 2002
36. Top Fifteen Scholars in Systems and Software Engineering of the Journal of Systems and Software, 2001
37. Outstanding Electrical Engineering Professor Award of Chinese Institute of Electrical Engineering, 2001
38. Best Paper Award at the 2001 International Workshop on Cryptography and Network Security, Sept. 2001
39. IEE Fellow, IEE Society, 2000-Present
40. IEEE Fellow (Membership# 08601379), IEEE Society, 1999-Present
41. Outstanding Scholar Award of Foundation for the Advancement of Outstanding Scholarship, 1999-2003
42. Outstanding Engineering Professor Award of Chinese Institute of Engineers of the R.O.C., 1999
43. Research Fellow, National Science Council of the R.O.C., 1996-Present
44. Research Fellow, National Science Council of the R.O.C., 1996-Present
45. AceR Dragon Award for the Most Ten Outstanding Talents, 1996
46. Distinguished Paper Award of the Information and Education Bimonthly, 1995
47. Outstanding Academic Research Award of the National Chung Cheng University, 1994
48. Research Achievement Award of the Ministry of Transportation and Communication of the R.O.C., 1993
49. Outstanding Teaching Materials Award of the Ministry of Education of the R.O.C., 1992
50. Supervised Dissertation Awarded for Outstanding Ph.D. Dissertation of the Xerox Company, 1992
51. Best Paper Award at the Second International Conference on CISNA Sponsored by British Council, 1991
52. AceR Dragon Dissertation Award for Outstanding Ph.D. Dissertation Study Supervision, 1990, 1997, 1998
53. AceR Dragon Thesis Award for Outstanding M.S. Thesis Supervision, 1990, 1991, 1992, 1997
54. Chung-Shan Academic Publication Award of the Chung-Shan Academic Foundation of the R.O.C., 1987, 1997
55. Distinguished Research Awards of the National Science Council of the R.O.C., 1986-1987, 1988-1989, 1990-1991, 1992-1994, 1995-1996
56. Outstanding Talent in Information Science of the R.O.C., 1984
57. Outstanding Youth Award of the R.O.C., 1984
58. Best Paper Award of the Society of Electrical Engineering of the R.O.C., 1982
59.
Honorary
member of the Phi Tau Phi Scholastic Honor Society of the Republic of China,
1980
PROFESSIONAL SOCIETY ACTIVITIES
1. 2017/01-Present Editorial Board Member of Applied Computing and Informatics
1. 2015/06-Present Editorial Board Member of International Journal of Engineering & Allied Sciences
1. 2015/01-Present Editorial Board Member of BPIT International Journal of Technology and Management
1. 2014/01-Present Editorial Board Member of Smart Computing Review
2. 2013/10-Present Editorial Board Member of International Journal of Information Security Science (IJISS)
3. 2013/08-Present Editorial Board Member of International Journal of Cloud-Computing and Super-Computing (IJCS)
4. 2013/07-Present Guest Editor of Recent Advances in Information Technology for Scientific World Journal, U.S.A.
5. 2013/06-Present Editorial Board Member of Current Advances in Information Security (CAIS)
6. 2013/01-Present Co-Editor-in-Chief of International Journal of Network Security
7. 2012/12-Academic Editor of British Journal of Mathematics & Computer Science
8. 2012/12-Present Editorial Board Member of Multimedia Technology
9. 2012/12-Present Advisory Board of FTRA Journal of Convergence
10. 2012/05-Present Editorial Board Member of Recent Patents on Telecommunications
11. 2012/05-Present Editorial Board Member of International Journal of Digital Contents and Applications (IJDCA)
12. 2012/01-Present Editorial Board Member of Journal of Information Security and Applications (JISA)
13. 2011/11-Present Editorial Board Member of Journal of Information & Communication Technology
14. 2011/06-Present Editor of Information Security Letter (ISL)
15. 2011/05-Present Associate Editor of Communications in Information Science and Management Engineering (CISME)
16. 2011/03-Present Editorial Board Member of International Journal of Communication and Security
17. 2011/01-Present Editor of Tamsui Oxford Journal of Information and Mathematical Sciences (TOJIMS)
18. 2011/01-Present Editorial Board Member of the Journal of Electronic Science and Technology (JEST)
19. 2010/12-Academic Editor of EURASIP Journal on Information Security
20. 2010/09-Present Editor of International Journal of Engineering and Industries (IJEI)
21. 2010/09-Present Associate Editor of International Journal of Advancements in Computing Technology (IJACT)
22. 2010/09-Present Associate Editor of the Advances in Information Sciences and Service Sciences (AISS)
23. 2010/07-Present Editorial Board Member of the KSII Transactions on Internet and Information Systems (TIIS)
24. 2010/07-Present Editor of International Journal of Intelligent Information Processing (IJIIP)
25. 2010/05-Present Editorial Board Member of the Innovative Computing Information and Control - Express Letters, Part B: Applications (ICIC-ELB)
26. 2010/03-Present Editorial Board Member of the Journal of Computer Research and Development
27. 2009/12-Present Editorial Board Member of the Wireless Engineering and Technology (WET)
28. 2009/10-Present Editorial Board Member of the International Journal of Multimedia Intelligence and Security (IJMIS)
29. 2009/10-Present Editorial Advisory Board Member of the International Journal of Information Technology, Communications and Convergence (IJITCC)
30. 2009/09-Present Associate Editor of the International Journal of Information Sciences and Computer Engineering (IJISCE), Malaysia
31. 2009/08-Present Editorial Advisory Committee Member of Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development and Verification, America
32. 2009/06-Present Guest Editor for the Special Issue¡ÐRecent Advances in Networked Computing for Journal of Networks
33. 2009/01-Present Guest Editor for the Special Issue of Journal of Internet Technology
34. 2009/01-Present Guest Editor of the Journal of Software
35. 2009/01-Present Co-Editor-in-Chief of International Journal of Information Hiding and Multimedia Signal Processing
36. 2009/01-Present Editor of the Journal of Future Generation Information Technology, Korea
37. 2009/01-Present Editorial Advisory Committee Member of Kansei Engineering and Soft Computing: Theory and Practice
38. 2009/01-Present Associate Editor of International Journal on Advances in Internet Technology
39. 2008/08-Present Guest Editor of the Special Issue¡ÐElectronic Commerce and Security for Journal of Communications, Finland
40. 2008/07-Present Advisor of International Journal of Intelligent Information Technology Application, Hong Kong
41. 2008/01-Present Guest Editor of Journal of Supercomputing, Korea
42. 2008/01-Present Co-editor of the Proceedings of International Conference on Intelligent Systems Design and Applications (ISDA08)
43. 2008/01-Present Guest Editor of the Special Issue-Mobile Computing for Journal of Pervasive Computing and Communications (JPCC)
44. 2007/10-Present Editorial Board Member of International Journal of Internet Technology and Secured Transactions, Switzerland
45. 2007/10-Present Editorial Board Member of International Journal of Knowledge Engineering and Soft Data Paradigms (KESDP), Japan
46. 2007/10-Present Editorial Board Member of The Open Information Science Journal
47. 2007/08-Present Guest Editor of Journal of Shanghai University: Applied Science, China
48. 2007/02-Present Program Committee Member of Journal of Automation, Mobile Robotics and Intelligent Systems, Poland
49. 2007/01 Editor of Antarctica Journal of Mathematics, India
50. 2006/06-Present Editorial Advisory Board Member of Recent Patents on Engineering, U.S.A.
51. 2006/01-Present Co-Editor-in-Chief of International Journal of Computer Sciences and Engineering Systems, India
52. 2006/03-2011/09 Editor-in-Chief of Journal of Computers of the R.O.C.
53. 2005/11-Present Associated Editor of Advisory Board of the International Journal of Autonomic and Trusted Computing
54. 2005/11-Present Member of Advisory Board of the International Journal of Innovational Computing and Information Control
55. 2005/01-Present Member of Guest Editorial Board of the International Journal of Pervasive Computing and Communications
56. 2004/06-Present Editorial and Advisory Board Member of International Journal of Information and Computer Security
57. 2003/12-Present Editorial Consultant of Communications of Chinese Cryptography Information Security Association (CCISA)
58. 2002/07-Present Associate Editor of Chaoyang Business and Management Review
59. 1999/11-Present Advisory Board Member of International Journal of Information Security
60. 1994/05-1997/05 Chairman of the Board of Directors, Chinese Cryptography and Information Security Association of the R.O.C.
61. 1994/01-1997/12 Editor of Information Sciences, U.S.A.
62. 1992/02 Editor of Advance Database Research and Development Series (World Scientific Publishing Co., Singapore)-Vol. 1 Database Systems for Next-Generation Application Principles and Practice; Vol. 2 Database Systems for Advanced Application&rsquo91; Vol. 3 Future Database&rsquo92
63. 1990/12-1994/01 Associate Editor and Computer Science Coordinator of Journal of the Chinese Institute of Engineers
64. 1990/12-Present Associate Editor of International Journal of Information and Management Science
65. 1990/09-Present Member of the Board of Directors, Computer Society of the R.O.C.
66. 1989/01-Present Associate Editor of Journal of Computers
67. 1989/01-1990/11 Associate Editor of International Journal of Policy and Information
68. 1987/10-Present Editor-in-Chief of Information and Education Bimonthly
69. 1987/01-1994/01 Associate Editor of Journal of the Chinese Institute of Engineers
70. 1986/04-1993/01 Associate Editor of Journal of Information Science and Engineering
71. 1986/11-1988/12 Associate Editor of Computer Quarterly
72. 1986/04-1988/03 Associate Editor of Journal of Electrical
Engineering
1. ACM Transactions on Database System
2. BIT
3. Communications of ACM
4. Computer Journal
5. Computer Processing of Chinese and Oriental Languages
6. Computer Systems Science and Engineering
7. Cryptologia
8. Electronics Letters
9. Fundamenta Informaticae
10. IEE Proceedings-Part E
11. IEEE Transactions on Computers
12. IEEE Transactions on Information Forensics and Security
13. IEEE Transactions on Information Theory
14. IEEE Transactions on Image Processing
15. IEEE Transactions on Knowledge and Data Engineering
16. IEEE Transactions on Pattern Analysis and Machine Intelligence
17. Information Systems
18. Information Processing Letters
19. Information Sciences
20. International Journal of Information and Management Sciences
21. International Journal of Foundations of Computer Science
22. International Journal of Pattern Recognition and Artificial Intelligence
23. Journal of Systems and Software
24. Journal of Visual communication and Image Representation
25. Pattern Recognition Letters
26. Signal Processing
27. Software Practice and Experience
28. VLSI Journal
Fields of review include database design, data structure, information security, data compression, algorithms design and analysis, image compression, and parallel computing.
CONSULTING MEMBERSHIPS IN ACADEMIC AND PROFESSIONAL
SOCIETIES
1.
2015/1/1-Present Consultative Advisor of National Chung Cheng University, Taiwan
1.
2011/3/4-Present
Consultant of International Communication Center, Beijing, China
2.
2007/10/18-Present
Consultant of National Kaohsiung University, Taiwan
3.
2007/10/01-Present
Consultant of National Chung Cheng University, Taiwan
4.
2007/08/01-Present
Consultant of Asia University, Taiwan
5.
2006/09/01-2008/12/31
Honorary Consultant of Taiwan Information Security Center (TWISC), National Chiao Tong University, Taiwan
6.
2006/08-2007/07
Consultant of Chung Chou Institute of Technology, Taiwan
7.
2005/08-2008/07
Top Consultant
of Information and Communication Security Research Center, Feng
Chia University, Taiwan
8.
2005/01-Present
Consultant of National Management Consultant Association, Taiwan
9.
2003/08-Present
Honorary Consultant of Chinese Cryptography and Information Security
Association of the R.O.C.
10.
2002/08-2004/07
Consultant of Taichung Health management University
11.
1998/12-2001/08
Consultant of Preparatory Office of Mingdao
University
12.
1998/07-2000/06
Director of Advisory Office of Ministry of Education, R.O.C.
13.
1994/03-2001/12
Coordinator of the Consultant Group of the County Government Affairs of Chiayi County, R.O.C.
14.
1993/02-1995/12
Consultant
of China File and Micrographic Information Management Institute, R.O.C.
15.
1988/07-1989/06
Consultant of Preparatory Office of National Chung Cheng University, R.O.C.
16.
1986/08-1988/07
Consultant of Computer Center of Chin-Yi Institute of Technology, R.O.C
17.
1986/03-1989/07
Consultant of Aerospace Industrial Development Center of Chung-shan Institute of Science and
Technology
18.
1985/08-1989/07
Consultant of Computer Center of National Chung Hsin
University, R.O.C.
No. |
Project Title |
Time Period |
Sponsor |
Title |
Grant Number |
1 |
Minimal Perfect Hashing Scheme Based Upon Number Theory |
71.12.20-72.11.19 |
National Science Council |
Principle Investigator |
NSC72-0404-E009-013 |
2 |
Optimal Multi-attribute Hashing Scheme when Quires are not Ran |
72.08.01-73.05.31 |
National Science Council |
Principle Investigator |
NSC73-0208-M005-01 |
3 |
The Design and Implementation of a Database Management System |
72.06.01-73.05.31 |
Control Data Cooperation, Taiwan |
Principle Investigator |
|
4 |
Some Design and Allocation Problems for Concurrent Disk Accessing |
73.08.01-74.07.31 |
National Science Council |
Principle Investigator |
NSC74-0408-E005-01 |
5 |
The Study of an Letter-oriented Minimal Perfect Hashing Scheme |
73.11.01-74.10.31 |
National Science Council |
Principle Investigator |
NSC74-0408-E005-02 |
6 |
An Information Protection Scheme Based upon Number Theory |
74.08.01-75.07.31 |
National Science Council |
Principle Investigator |
NSC75-0408-E005-01 |
7 |
Symbolic Solver for Recurrence Relations |
74.08.31-75.07.31 |
National Science Council |
Principle Investigator |
NSC75-0408-E005-02 |
8 |
The Design and Development of a Chinese Visual Form Oriented Programming System |
74.08.01-75.07.31 |
Control Data Cooperation, Taiwan |
Principle Investigator |
|
9 |
The Development of a CAI System for Structured Assembly Language Programming |
74.12.01-75.11.30 |
National Science Council |
Co-Investigator |
NSC75-0408-E005-03 |
10 |
Optimal Cartesian Product Files for Concurrent Disk Accessing |
75.04.01-76.03.31 |
National Science Council |
Co-Investigator |
NSC75-0408-E035-02 |
11 |
The Study of Allocating Multiple Key Hashing File System Among Multiple Disks |
75.04.01-76.03.31 |
National Science Council |
Principle Investigator |
NSC75-0408-E005-04 |
12 |
The Development and Evaluation of a Secure Broadcasting System |
75.08.01-76.07.31 |
National Science Council |
Principle Investigator |
NSC76-0408-E005-01 |
13 |
The Difficulty of Construction Perfect Hashing Functions |
75.12.01-76.11.30 |
National Science Council |
Principle Investigator |
NSC76-0408-E005-02 |
14 |
The Study and Development of Approximate Patten Matching in Large Textual Files |
75.12.01-76.11.30 |
National Science Council |
Co-Investigator |
NSC76-0408-E035-01 |
15 |
The Study of Inductive Question Answering and Data Integrity |
75.12.01-76.11.30 |
National Science Council |
Co-Investigator |
NSC76-0408-E005-03 |
16 |
On the Design and Analysis of Multi-disk File Allocation Method for Concurrent Retrieval |
76.01.01-77.03.31 |
National Science Council |
Co-Investigator |
NSC76-0408-E035-03 |
17 |
The Study of Retrieving Techniques of Phonetic Syllables |
76.04.01-77.03.31 |
National Science Council |
Co-Investigator |
NSC76-0408-E005-04 |
18 |
The Study of a Dynamic Access Control Scheme |
76.08.01-77.07.31 |
National Science Council |
Principle Investigator |
NSC77-0408-E005-01 |
19 |
Some Properties of Multi-attribute File Systems for Orthogonal Range Retrieval |
76.12.01-77.11.30 |
National Science Council |
Co-Investigator |
NSC77-0408-E035-02 |
20 |
Applying Multi-variant Analysis Techniques to Information Storage and Retrieval |
76.12.01-77.11.30 |
National Science Council |
Principle Investigator |
NSC77-0408-E005-02 |
21 |
The Design of an Automatic Terrain Map Generator |
76.10.01-77.09.30 |
Control Data Cooperation, Taiwan |
Principle Investigator |
|
22 |
Visual Form Conversion Expert System-Design and Development |
77301.01-78.03.31 |
National Science Council |
Co-Investigator |
NSC77-0408-E005-03 |
23 |
The Studies of Pattern Near-Matching Both in Chinese and in English |
77.04.01-78.03.31 |
National Science Council |
Co-Investigator |
NSC77-0408-E005-04 |
24 |
The Study of Information Security Schemes |
77.08.01-78.07.31 |
National Science Council |
Principle Investigator |
NSC78-0408-E005-01 |
25 |
The Application of Computers to Courses for Home Economics |
77.01.01-77.07.20 |
Department Taiwan Provincial Government of Education |
Principle Investigator |
|
26 |
The Application of Computers to Courses Agriculture |
77.01.01-77.07.20 |
Department Taiwan Provincial Government of Education |
Principle Investigator |
|
27 |
Planning the City Government Information System for Taichung City Government |
77.07.01-78.06.30 |
Taichung City Government |
Principle Investigator |
|
28 |
The Study of Chinese Computing Technology and the Development of Chinese Information System |
77.07.01-78.04.30 |
Chung-Shan Institute of Science and Technology |
Principle Investigator |
|
29 |
The Study of Data Compression in Chinese Textual Files |
78.02.01-79.01.31 |
National Science Council |
Co-Investigator |
NSC78-0408-E005-03 |
30 |
Some Cryptosystems Based upon Euclidean Geometry |
77.12.01-79.01.31 |
National Science Council |
Principle Investigator |
NSC78-0408-E005-02 |
31 |
A Compression Method for Chinese and English Data |
78.08.01-79.07.31 |
National Science Council |
Principle Investigator |
NSC79-0408-E194-01 |
32 |
On the Design of Password Authentication Systems |
79.02.01-80.01.31 |
National Science Council |
Principle Investigator |
NSC79-0408-E194-03 |
33 |
Planning the County Government Information System for Taitung County Government |
79.11.01-80.06.30 |
Taitung Country Government |
Principle Investigator |
|
34 |
The Studies of Designing Optimal Multi-attribute File Systems by the MMI Method for Orthogonal Range Retrieval |
79.02.01-80.01.31 |
National Science Council |
Co-Investigator |
|
35 |
The Research and Development of a Palm Carried Electronic Memory Card |
78.12.01-79.05.31 |
Pusan Technology Cooperation |
Principle Investigator |
|
36 |
The Study of Dynamic Key-Lock-Pair Access Control Schemes |
79.08.01-80.07.31 |
National Science Council |
Co-Investigato |
|
37 |
Design and Performance Comparison of Some Signature Extraction Schemes for Symbolic Pictures |
79.08.01--80.07.31 |
National Science Council |
Principle Investigator |
NSC80-0408-E194-02 |
38 |
A Study of Advanced Communication Protocol for Its Security and Verification |
79.08.01-80.07.31 |
Directorate General of Telecommunications, Ministry of Transportation and Communications |
Principle Investigator |
TL-81-3105 |
39 |
A Design of Security Architecture on Message Handing System and Directory System |
79.08.01-80.07.31 |
Directorate General of Telecommunications, Ministry of Transportation and Communications |
Principle Investigator |
TL-81-3201 |
40 |
Planning the Computer Cryptological Research |
79.08.01-79.12.31 |
National Science Council |
Principle Investigator |
NSC80-0408-E194-06 |
41 |
On Research and Development of Dictionary Compressing and Searching Technologies |
80.02.01-81.01.31 |
National Science Council |
Principle Investigator |
NSC80-0408-E194-12 |
42 |
A Secure Broadcasted System for Military Secret Data |
80.02.01-81.01.31 |
Chung-Shan Institute of Science and Technology |
Principle Investigator |
CS80-0210-D194-01 |
43 |
The Status and Requirements of Computer System Security |
80.03.01-80.06.30 |
Institute for Information Industry |
Principle Investigator |
|
44 |
The Design of a Database for Service Control Points |
80.07.01-81.06.30 |
Chunghwa Telecom Laboratories, Ministry of Transportation and Communications |
Principle Investigator |
TL-81-1101 |
45 |
On Research and Development of a Content-Independent Data Compression Scheme |
80.08.01-81.07.31 |
National Science Council |
Principle Investigator |
NSC81-0408-E-194-03 |
46 |
Parallel Computation-Theories , Systems and Applications |
80.08.01-83.07.31 |
National Science Council |
Co-Investigator |
|
47 |
The Study of an Open De-Virus System |
80.09.01-81.06.30 |
Ministry of Education |
Principle Investigator |
MOECC81-A003 |
48 |
New Concepts for Multiple Stack System: Born and Reborn |
81.02.01-82.01.31 |
National Science Council |
Principle Investigator |
NSC81-0K08-E-194-507 |
49 |
Identity-Based Cryptosystem Design and Implementation |
81.08.01-82.07.31 |
National Science Council |
Co-Investigator |
|
50 |
The Study of a Storage and Retrieval Scheme for Chinese Multi-Character Words |
81.08.01-82.07.31 |
National Science Council |
Principle Investigator |
NSC82-0408-E-194-009 |
51 |
Digital Signature Based on the Error-Correcting Codes |
81.08.01-82.07.31 |
National Science Council |
Co-Investigator |
NSC82-0408-E-194-003 |
52 |
The Study of Generalized Group-Oriented Secret Sharing |
82.02.01-83.01.31 |
National Science Council |
Principle Investigator |
NSC82-0408-E-194-027 |
53 |
The Study of Compressing in Chinese Computing Environment |
82.08.01-83.07.31 |
National Science Council |
Principle Investigator |
NSC82-0408-E-194-002 |
54 |
An Information Management System for Middle and Long-term Projects of Province Affairs |
83.08.01-84.05.31 |
Research, Development, and Evaluation Commission, Taiwan Provincial Government |
Principle Investigator |
|
55 |
The Study of a Secret Voting System on Computer Networks |
83.02.01-84.07.31 |
National Science Council |
Principle Investigator |
NSC83-0408-E-194-013 |
56 |
The Development of a New Digital Multisignature System |
83.07.01-84.06.30 |
Chung-Shan Institute of Science and Technology |
Principle Investigator |
CS84-0210-D-194-001 |
57 |
The Study of a Fast Cascade Exponentiation Evaluating Scheme |
83.08.01-84.07.31 |
National Science Council |
Principle Investigator |
NSC84-2213-E-194-001 |
58 |
The Resource Allocations in Multi-processor Systems |
83.02.01-84.07.31 |
National Science Council |
Co-Investigator |
|
59 |
Setting High Speed Network and the Application Platform for National Chung Cheng University |
83.12.01-84.06.30 |
Ministry of Education |
Co-Investigator |
|
60 |
The Editing of Outlines of Localized Teaching Materials for Contemporary Computer Cryptography |
83.12.01-84.05.31 |
Advisory Office, Ministry of Education |
Principle Investigator |
¥x(84)ÅU005535 |
61 |
The Computation of the Modular Multi-Exponentiation |
84.08.01-85.07.31 |
National Science Council |
Principle Investigator |
NSC85-2213-E-194-010 |
62 |
A Design of Spatial Data Structure and Spatial Data Filters |
85.08.01-86.07.31 |
National Science Council |
Principle Investigator |
NSC86-2213-E-194-003 |
63 |
Toward the Research and Development of Key Technology for RSA-type Public Key Cryptoschemes |
85.08.01-88.07.31 |
National Science Council |
Principle Investigator |
NSC86-2213-E-194-001 |
64 |
A Study on Encryption and Decryption Technologies in Satellite Communications |
85.08.01-86.07.31 |
National Space Program Office |
Principle Investigator |
NSC86-NSPO(A)-PC-FA06-02 |
65 |
The Design of Large Pictorial Database System |
86.08.01-87.07.31 |
National Science Council |
Principle Investigator |
NSC87-2213-E-194-003 |
66 |
The Design of Compression Method for Large Sparse Matrices |
86.08.01-87.07.31 |
National Science Council |
Principle Investigator |
NSC87-2213-E-194-001 |
67 |
The Proposal of Information Security Management for Government Organization |
86.03.01-86.06.30 |
Research, Development, and Evaluation Commission, Taiwan Provincial Government |
Principle Investigator |
|
68 |
The Proposal of Information Security Standards |
86.09.01-87.05.31 |
National Bureau of Standards, Ministry of Economic Affairs |
Principle Investigator |
|
69 |
Towards Indexing and Normalizing of Iconics for Image Similarity Retrieval |
87.08.01-88.07.31 |
National Science Council |
Principle Investigator |
NSC88-2213-E-194-005 |
70 |
The Study of Secret Sharing Schemes for Secret Image and Cheater Identification Scheme |
87.08.01-88.07.31 |
National Science Council |
Principle Investigator |
NSC88-2213-E-194-003 |
71 |
Planning the Draft Proposal of Information Security Standards |
87.08.01-88.05.31 |
National Bureau of Standards, Ministry of Economic Affairs |
Researcher |
|
72 |
On the Study and Development of Technical Rule, Management Mechanism and Validation for Cryptographic Modules in Communication Security |
87.08.01-88.05.31 |
Directorate General of Telecommunications, Ministry of Transportation and Communications |
Associate Program Director |
|
73 |
A Mechanism of Treating Emergent Events of Information Security for E-Government |
Research, Development and Evaluation Commission, Executive Yuan |
¡@ |
||
74 |
The Study of Some Image Compression Mechanisms (3/1) |
88.08.01-91.07.31 |
National Science Council |
Principle Investigator |
NSC89-2213-E-194-020 |
75 |
Spatial Similarity Retrieval in Video Database |
88.08.01-89.07.31 |
National Science Council |
Principle Investigator |
NSC89-2213-E-194-003 |
76 |
Speeding up the Computations of Lucas Function and Elliptic Curve Cryptosystems |
88.08.01-89.07.31 |
National Science Council |
Principle Investigator |
NSC89-2213-E-194-002 |
77 |
A Study on Color Image Cryptosystems |
89.08.01-90.07.31 |
National Science Council |
Principle Investigator |
NSC89-2218-E-194-007 |
78 |
The Study of Some Image Compression Mechanisms (3/2) |
89.08.01-90.07.31 |
National Science Council |
Principle Investigator |
NSC89-2218-E-194-012 |
79 |
A Video Retrieval Technique Based on Piecewise Matching Method |
89.08.01-90.07.31 |
National Science Council |
Principle Investigator |
NSC89-2218-E-194-008 |
80 |
A study of Similar Color Image Retrieval Using RCM-Wavelet-Based Features |
90.08.01-91.07.31 |
National Science Council |
Principle Investigator |
NSC90-2213-E-194-026 |
81 |
A Study of Image Compression Schemes with Error Correction Capability |
90.08.01-91.07.31 |
National Science Council |
Principle Investigator |
NSC90-2213-E-194-041 ¡@ |
82 |
The Study of Some Image Compression Mechanisms (3/3) |
90.08.01-91.07.31 |
National Science Council |
Principle Investigator |
NSC90-2213-E-194-013 |
83 |
A Study on Information Hiding Techniques for Various Types of Digital Images (1/3) |
91.08.01-92.07.31 |
National Science Council |
Principle Investigator |
NSC91-2213-E-194-016 |
84 |
A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (1/3) |
91.08.01-92.07.31 |
National Science Council |
Principle Investigator |
NSC91-2213-E-194-017 |
85 |
A Study on Information Hiding Techniques for Various Types of Digital Images (2/3) |
92.08.01-93.07.31 |
National Science Council |
Principle Investigator |
NSC92-2213-E-194-005 |
86 |
A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (2/3) |
92.08.01-93.07.31 |
National Science Council |
Principle Investigator |
NSC92-2213-E-194-004 |
87 |
A Study on Information Hiding Techniques for Various Types of Digital Images (3/3) |
93.08.01-94.07.31 |
National Science Council |
Principle Investigator |
NSC93-2213-E-194-004 |
88 |
A Study on Progressive Image Transmission Techniques for Various Types of Digital Images (3/3) |
93.08.01-94.07.31 |
National Science Council |
Principle Investigator |
NSC93-2213-E-194-003 |
89 |
Information Hiding Techniques for Various Data Compression mechanisms(1/3) |
94.08.01-95.07.31 |
National Science Council |
Principle Investigator |
NSC94-2213-E-194-038 |
90 |
The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (1/3) |
94.08.01-95.07.31 |
National Science Council |
Principle Investigator |
NSC94-2213-E-194-039 |
91 |
Information Hiding Techniques for Various Data Compression mechanisms(2/3) |
95.08.01-96.07.31 |
National Science Council |
Principle Investigator |
NSC95-2221-E-035-140 |
92 |
The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (2/3) |
95.08.01-96.07.31 |
National Science Council |
Principle Investigator |
NSC95-2221-E-035-141 |
93 |
The Intellectual Property Rights University Campus Visit Project |
96.04.01-96.09.30 |
Ministry of Education |
Co-Investigator |
|
94 |
Information Hiding Techniques for Various Data Compression mechanisms(3/3) |
96.08.01-97.07.31 |
National Science Council |
Principle Investigator |
|
95 |
The Design of High-Speed Computation Mechanisms in Residual Number Systems for Cryptoschemes (3/3) |
96.08.01-97.07.31 |
National Science Council |
Principle Investigator |
|
96 |
The Study of Secure Electronic Transaction Mechanisms in Internet (1/3) |
97.08.01-98.07.31 |
National Science Council |
Principle Investigator |
NSC 97-2221-E-035-039-MY3 |
97 |
Reversible and Removable Data Embedding Techniques for Digital Images (1/3) |
97.08.01-98.07.31 |
National Science Council |
Principle Investigator |
NSC 97-2221-E-035-084-MY3 |
98 |
The Study of Secure Electronic Transaction Mechanisms in Internet (2/3) |
98.08.01-99.07.31 |
National Science Council |
Principle Investigator |
NSC 97-2221-E-035-039-MY3 |
99 |
Reversible and Removable Data Embedding Techniques for Digital Images (2/3) |
98.08.01-99.07.31 |
National Science Council |
Principle Investigator |
NSC 97-2221-E-035-084-MY3 |
100 |
The Study of Secure Electronic Transaction Mechanisms in Internet (3/3) |
99.08.01-100.07.31 |
National Science Council |
Principle Investigator |
NSC 97-2221-E-035-039-MY3 |
101 |
Reversible and Removable Data Embedding Techniques for Digital Images (3/3) |
99.08.01-100.07.31 |
National Science Council |
Principle Investigator |
NSC 97-2221-E-035-084-MY3 |
102 |
The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (1/3) |
100.08.01-101.07.31 |
National Science Council |
Principle Investigator |
NSC 100-2221-E-035-049-MY3 |
103 |
The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (1/3) |
100.08.01-101.07.31 |
National Science Council |
Principle Investigator |
NSC 100-2221-E-035-093-MY3 |
104 |
The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (2/3) |
101.08.01-102.07.31 |
National Science Council |
Principle Investigator |
NSC 100-2221-E-035-049-MY3 |
105 |
The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (2/3) |
101.08.01-102.07.31 |
National Science Council |
Principle Investigator |
NSC 100-2221-E-035-093-MY3 |
106 |
The Research and Applications on High Secure and Efficient Threshold Cryptography Techniques (3/3) |
102.08.01-103.07.31 |
National Science Council |
Principle Investigator |
NSC 100-2221-E-035-049-MY3 |
107 |
The Study of Digital Image Editing Techniques and Their Applications to Multimedia Security (3/3) |
102.08.01-103.07.31 |
National Science Council |
Principle Investigator |
NSC 100-2221-E-035-093-MY3 |
108 |
Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (1/3) |
103.08.01-104.07.31 |
Ministry of Science and Technology |
Principle Investigator |
MOST 103-2221-E-035 -046 -MY3 |
109 |
The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (1/2) |
103.08.01-104.07.31 |
Ministry of Science and Technology |
Principle Investigator |
MOST 103-2221-E-035 -102 -MY2 |
110 |
Secure and Efficient Authentication Mechanisms and Their Applications in Electronic Commerce (2/3) |
104.08.01-105.07.31 |
Ministry of Science and Technology |
Principle Investigator |
MOST 103-2221-E-035 -046 -MY3 |
111 |
The Study of Sharing Digital Secret Images and Its Applications in Mobile Communication Environments (2/2) |
104.08.01-105.07.31 |
Ministry of Science and Technology |
Principle Investigator |
MOST 103-2221-E-035 -102 -MY2 |
No. |
Name |
Thesis Title |
Completion Date |
1 |
Su, D. H. |
Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries |
5/1984 |
2 |
Lian, L. S. |
Toward the Strict Optimality Study on Concurrent Disk Accessing |
5/1984 |
3 |
Shen, Jau-Ji |
Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System |
5/1984 |
4 |
Liang, J. |
Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions |
5/1984 |
5 |
Yuan, S. T. |
A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems |
5/1985 |
6 |
Tsai, W. H. |
A Branch and Bound Algorithm for Allocating Multi-attribute File Systems |
5/1985 |
7 |
Shieh, J. C. |
On the Design of Letter Oriented Minimal Perfect Hashing Functions |
5/1985 |
8 |
Hung, M. F. |
An Access Control Mechanism for Information Protection System |
5/1986 |
9 |
Chen, C. P. |
A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem |
5/1986 |
10 |
Chen, H. Y. |
Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems |
5/1986 |
11 |
Hsiao, M. D. |
The Study of File Allocation Strategies for Concurrent Retrieval |
5/1986 |
12 |
Lee, Y. P. |
A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing |
5/1986 |
13 |
Lin, C. H. |
A Strategy of Information Secure Broadcasting |
5/1986 |
14 |
Cheng, W. Y. |
The Study of a User-Hierarchy Mechanism for Computer System Resources |
5/1987 |
15 |
Chang, C. H. |
A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem |
5/1987 |
16 |
Chen, C. H. |
The Study of Data Missing and Data Integrity |
5/1987 |
17 |
Wu, H.C. |
The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System |
5/1987 |
18 |
Wang, C. T. |
The Development of a Computer Assisted Instruction System for Structure Assembly Languages |
5/1987 |
19 |
Mong, I. H. |
A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm |
5/1988 |
20 |
Chang, S. S. |
Optimal Properties of Binary Cartesian Product File System |
5/1988 |
21 |
Chen, C. H. |
Organizing Distributed Data Based for Parallel Searching |
5/1988 |
22 |
Hsiao, J. Y. |
Strings Near-Matching Techniques for Large Textual Files |
5/1988 |
23 |
Leu, D. F. |
Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely |
5/1988 |
24 |
Chou, A. Y. H. |
The Study of File Systems Suitable for Queries |
5/1989 |
25 |
Chow, L. C. |
The Study of Visual Form Transformation System |
5/1989 |
26 |
Wu, T. C. |
The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry |
5/1989 |
27 |
Liao, H. T. |
A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control |
5/1989 |
28 |
Wu, L. H. |
An Arithmetic Coding Oriented Single Key Access Control Scheme |
5/1989 |
29 |
Wu, C. H. |
The Study of Security Technologies for Broadcasted Network Systems |
5/1989 |
30 |
Lin, J. C. |
A Fast Spatial Match Accessing Scheme for Symbolic Pictures |
5/1990 |
31 |
Dai, J. Y. |
Sharing a Circular Storage for Multiple Stacks |
5/1990 |
32 |
Chen, D. C. |
A Modified Arithmetic Coding Scheme Suitable for Binary Search |
5/1990 |
33 |
Hwang, S. M. |
A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid |
5/1990 |
34 |
Lin, J. F. |
A Chinese Syllables Compression Scheme Based Upon Perfect Hashing |
5/1990 |
35 |
Wang, S. J. |
A Dynamic Key-Lock-Pair Access Control Scheme |
5/1991 |
36 |
Hwang, R. J. |
Controlling Access in Hierarchical Structures Using Cryptographic Keys |
11/1991 |
37 |
Hwang, S. J. |
Sharing a Dynamic Secret |
11/1991 |
38 |
Lee, H.C. |
A Solution to Generalized Group Oriented Cryptography |
5/1992 |
39 |
Chen, C. Y. |
A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method |
5/1992 |
40 |
Chen, Y. W. |
A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis |
5/1992 |
41 |
Kowng, H. C. |
A Digital Signature Scheme Based Upon Theory of Quadratic Residues |
5/1992 |
42 |
Lee, W. B. |
On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses |
5/1993 |
43 |
Liou, F. Y. |
A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme |
5/1993 |
44 |
Wang, C. H. |
A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters |
5/1993 |
45 |
Liao, W. Y. |
A Remote password authentication scheme based upon ElGamal's signature scheme |
5/1993 |
46 |
Lin, T. H. |
A Secure Group-Oriented Secret Sharing Scheme |
5/1993 |
47 |
Lee, C. F. |
A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems |
5/1994 |
48 |
Tsu, S. M. |
An Improvement on a Probabilistic Encryption Scheme and Its Applications |
5/1994 |
49 |
Jiang, J. H. |
A Spatial Filter for Similarity Retrieval |
5/1994 |
50 |
Wu, W. B. |
A Secure Voting System on a Public Network |
5/1994 |
51 |
Horng, W. J. |
A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm |
5/1994 |
52 |
Lin, D. C. |
Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters |
5/1995 |
53 |
Li, W. T. |
A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique |
5/1995 |
54 |
Leu, JJyh-Jong |
The Performance Analysis of Bloom and Random Filters |
5/1995 |
55 |
Kuo, C. L. |
Fast Codeword Search Techniques for Vector Quantization |
6/1996 |
56 |
Chou, J. S. |
An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook |
6/1996 |
57 |
Sung, C. H. |
Locally Adaptive Schemes for Data Compression Using Multilist Structure |
6/1997 |
58 |
Chen, L. L. |
Some Searching Techniques for Block Motion Estimation for Video Compression |
6/1997 |
59 |
Jau, J. J. |
Image Compression and Transmission Using Vector Quantization and S-tree |
6/1998 |
60 |
Hwang, P. C. |
Accessing Shared Secrets in a Hierarchy |
6/1998 |
61 |
Shine, F. C. |
Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane |
6/1998 |
62 |
Chen, Kuo-Lun |
Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme |
6/1999 |
63 |
Kuo, Y. T. |
Fast Algorithm for Some Meta-Operations in Cryptographic Systems |
6/1999 |
64 |
Chung, P. F. |
Two Copyright Protection Scheme for Digital Images |
6/2000 |
65 |
Xiao, G. X. |
Two Prediction Methods for Image Compression and Progressive Image Transmission |
6/2000 |
66 |
Lin, Y. |
Image Compression and Copyright Protection Using Edge Detection Methods |
6/2000 |
67 |
Hsia, H.C. |
Two Hiding Techniques for Data Security and Image Copyright Protection |
6/2000 |
68 |
Chuang, J. C. |
The Study of Image Tampering Detection |
6/2000 |
69 |
Hsieh, C. P. |
The Study of Denoising Technique for Digital Images |
6/2001 |
70 |
Lu, P. W. |
The Application of Vector Quantization Techniques to Digital Image Tamper Proofing |
6/2001 |
71 |
Jiang,J. L. |
The Design of Some Filter for Image Denoising |
6/2001 |
72 |
Yeh, J. C. |
The Study of Copyright Protection Schemes for Digital Images |
6/2001 |
73 |
Chan, C. S. |
Some Data Hiding Techniques for Digital Images |
6/2001 |
74 |
Yu, T. X. |
The Study of Digital Image Ciphering and Hiding Mechanisms |
6/2002 |
75 |
Pan,Y. P. |
The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy |
6/2002 |
76 |
Chung, C. Y. |
Some Protocols for Passing Messages Securely and Protecting Rightful Ownership |
6/2002 |
77 |
Chen, G. I. |
TheStudy of Lossless Image Compression an Image Magnification |
6/2002 |
78 |
Su, Y. Y. |
Two Color Image Quantization Schemes for Non-true-color Display |
6/2002 |
79 |
Lee, C. F. |
Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees |
6/2003 |
80 |
Wu, W. J. |
Data Hiding and Content Retrieval in Digital Image Database |
6/2003 |
81 |
Chen, G. M. |
Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding |
6/2003 |
82 |
Liao, C. T. |
Some Image Compression and Data Protection Techniques Using Support Vector Machines |
6/2003 |
83 |
Chou, H. C. |
Some Studies on Digital Image Steganographic and Watermarking Techniques |
7/2003 |
84 |
Hu, Y. H. |
Retrieving Digital Images from Frequency Domain Transformed Databases |
6/2004 |
85 |
Tai, W. L. |
Hiding a Digital Image into Two Cover Images |
6/2004 |
86 |
Liu, Y. L. |
The Techniques of Digital Image Transmission and Authentication |
6/2004 |
87 |
Lin, P. Y. |
Two Data Hiding Schemes for Grayscale Images and Image Compression Codes |
6/2004 |
88 |
Tseng, C. S. |
Various Secret Embedding Schemes for Binary and Gray Level Techniques |
6/2005 |
89 |
Wang, Y. Z. |
Some Image Steganography Schemes with High Embedding Capacity |
6/2005 |
90 |
Yeh, J. B. |
Hiding Secrets in Data Compression Codes |
6/2005 |
91 |
Kao, C. L. |
On Authentication Protocols for Communication Networks |
6/2005 |
92 |
Kuo, J. Y. |
Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures |
6/2005 |
93 |
Lin, K. C. |
Some Efficient Techniques for Secure Peer-to-Peer Networking |
6/2005 |
94 |
Chang, P. Y. |
Group Signature and Key Agreement Schemes Based on Diffie-Hellman Key Exchange Protocol |
6/2006 |
95 |
Shue, Y. W. |
Some Key Management Protocols for Insecure Networks |
6/2006 |
96 |
Cheng, Y. F. |
Some Information Security Applications using Symmetric and Asymmetric Crypto Schemes |
6/2006 |
97 |
Fan, Y. H. |
The Design and Analysis of Information Hiding and Secret Image Sharing Schemes |
6/2006 |
98 |
Chang, S. C. |
A Mutual Authentication Scheme and Its Application to Electronics Traveler Checks |
6/2007 |
99 |
Cheng, T. F. |
An IC-Card-Based Remote Login Mechanism and a Proxy Raffle System in Computer Networks |
|
100 |
Lin, C. H. |
Some Visual Cryptoschemes for Secret Images |
|
101 |
Chiu, Y. C. |
Some Authentication Schemes and Their Applications to Internet and Wireless Environments |
6/2007 |
102 |
Chang, K. J. |
Authentication Mechanisms and a Payment Protocol for Wireless Environment |
6/2007 |
103 |
Li, K. M. |
A Predictive SMVQ Scheme and Data Embedding for Digital Images |
6/2007 |
104 |
Lin, S. Y. |
Key Establishment and Agreement Protocols and Their Application to Internet and Wireless Environments |
6/2007 |
105 |
Yah, C. M. |
Reversible Data Hiding Schemes for Large Payload and Low Distortion |
6/2008 |
106 |
Yang, S. R. |
Scalable Key Assignment Protocols in Internet |
6/2008 |
107 |
Wang, G. H. |
The Study of High Quality Stego-image for Large Payload |
6/2008 |
108 |
Huang, W. H. |
Two Efficient Demosaicking Algorithms for Color Filter Array |
6/2008 |
109 |
Chuang, L. Y. |
The Optimal Solution and Improvement of Exploiting Modification Direction Embedding Method |
6/2008 |
110 |
Wang, Y. R. |
The Study of Data Hiding Based on Modification Direction Embedding Method |
6/2008 |
111 |
Liu, L. J. |
The Detection of Visual Secret Shadow Cheating and Digital Image Tampering |
6/2008 |
112 |
Le, T. H. N. |
Secret Sharing Using Multiple Shadow Images |
2/2009 |
113 |
Lai, Y. W. |
Message Broadcasting and Electronic Voting Schemes Based on Elliptic Curve Cryptosystem |
6/2009 |
114 |
Wu, Y. C. |
Authenticated Communication Systems for E-mail Protocal and Vehicular Ad Hoc Networks |
6/2009 |
115 |
Chen, C. H. |
Illumination-Balance Techniques for Text-photo Images |
6/2009 |
116 |
Chen, Y. C. |
Segmentation and Classification Techniques for Retinal Images |
6/2009 |
117 |
Wang, H. C. |
Embedding Secret Information in a Condenced Image and Multiple Image Files |
6/2009 |
118 |
Liao, C. C. |
The Study of Visually Sharing Secret Images |
6/2009 |
119 |
Li, Q. |
A Study on Reversible Watermarking |
4/2010 |
120 |
Lin, H. C. |
Some Secret Embedding Schemes for Different Entities |
6/2010 |
121 |
Huang, Y. C. |
Mobile Conference Mechanism for Wireless Communication Users |
6/2010 |
122 |
Hsieh, M. H. |
Preserving User-Participation in Insecure Networks Based on Visual Secret Sharing and Authentication Watermarking |
6/2010 |
123 |
Huynh, N. T. |
Visual Cryptography for Users Verification |
6/2010 |
124 |
Liu, T. C. |
The Study of Digital Images Embedding Techniques and Visual Secret Sharing Schemes |
6/2010 |
125 |
Tsai, M. C. |
Digital Copyright Protection and Image Authentication Using Watermarking Strategy |
6/2010 |
126 |
Wu, C. Y. |
Reversible Data Hiding Schemes Using Repeatedly Embedding Strategy with High Capacity |
6/2010 |
127 |
Yin, Z. X. |
Hiding Information in Digital Images |
6/2010 |
128 |
Tseng, W. T. |
Authentication Protocols for Heterogeneous Communication Network Environment |
6/2011 |
129 |
Chen, P. Y. |
Reversible High-payload Information Hiding Scheme for Digital Cover Images and VQ Index Tables |
6/2011 |
130 |
Chen, Y. W. |
User Authentication and Key Agreement Protocols for Wireless Network Environment |
6/2011 |
131 |
Liu, C. M. |
Non-Reversible and Reversible Data Hiding Based on Module Operation |
6/2011 |
132 |
Tsou, P. L. |
Perceptual Robust Image Hashing Scheme Based on Halftone Mechanism and Non-Uniform Sampling |
6/2011 |
133 |
Nguyen Thai Son |
Reversible Data Hiding Techniques for VQ-compressed Domain |
6/2011 |
134 |
Vo Phuoc Hung |
Sharing Secret Messages Using Meaningful Digital Shadow images |
6/2011 |
135 |
Marcos Pizzolatti |
The study of some reversible secret sharing schemes |
12/2011 |
136 |
Cui, S. Y. |
Image Data Hiding Based on Voronoi Diagram |
12/2011 |
137 |
Yue, S. |
Image Data Hiding Scheme Based on Graph Coloring |
12/2011 |
138 |
Lin, T. Y. |
Information Hiding Techniques for Script Files and Image Files |
06/2012 |
139 |
Chiu, Y. P. |
The study of Distortion and Distortion free Visual Secret Sharing Scheme |
06/2012 |
140 |
Liao, L. T. |
Two Steganographic Schemes for Embedding Large Secret Information |
06/2012 |
141 |
Wang, S. T. |
Novel Reversible Data Hiding Schemes for Secret Images and Traditional Chinese Text Files |
06/2012 |
142 |
Lin, C. C. |
Information Hiding and Visual Secret Sharing Based on Exploiting Modification Direction |
06/2012 |
143 |
Chang, C. H. |
Some Smart Card Oriented Authentication Protocols for Mobile Communication |
06/2012 |
144 |
Tsai, H. Y. |
Pixel Unexpanded Visual Cryptography Techniques Based on Meaningful Shadows |
06/2012 |
145 |
Sun, C. Y. |
Secure and Efficient Authentication Schemes for Wireless Communications |
06/2013 |
146 |
Chen, Y. C. |
Reversible Data Embedding Schemes for VQ-Compressed Images |
06/2013 |
147 |
Chen, W. Y. |
Authentication Protocols for Some E-commerce Applications |
06/2013 |
148 |
Hsu, T. J. |
Some Data Hiding Techniques and Their Applications |
06/2013 |
149 |
Jia, X. D. |
Research on Privacy-preserving Identity Authentication Protocols in Vehicular Ad Hoc Networks |
06/2014 |
150 |
Yang, H. R. |
Study on Data Hiding Algorithms Based on Compression Codes |
06/2014 |
151 |
Lin, M. C. |
Embedding Secret Information in
VQ Index Tables |
06/2014 |
152 |
Chung, T. F. |
Authentication and Data Hiding
Schemes for Digital Images |
06/2014 |
153 |
Chou, Y. C. |
A Study of Group Authentication
and Data Protection |
06/2014 |
154 |
Hsueh, W. Y. |
Multi-Server Remote User
Authentication Mechanisms Using Smart Card |
06/2014 |
155 |
Li, F. |
Reversible Image Hiding Algorithms based on Wavelet Transformation |
12/2014 |
156 |
Yang, X. Q. |
Semi-fragile Watermarking Algorithms for Tamper Detection and Image Authentication |
06/2015 |
157 |
Shih, T. H. |
The Study of Reversible Authentication Techniques for Digital Images |
06/2015 |
158 |
Hsueh, H. S. |
Data Hiding Schemes for Still Images and Videos |
06/2015 |
159 |
Chang, W. C. |
Reversible Data Hiding for Encrypted and Compressed Digital Image |
06/2015 |
160 |
Bai, J. l. |
Some Techniques for Information Hiding in Images(Chengdu University of Electronic Science and Technology) |
05/2016 |
161 |
Xia, B. B. |
Reversible Data Hiding Based on Vector Quantization(Taiyuan University of Science and Technology) |
06/2016 |
162 |
Jin, Q. |
Research on Optimized Block Truncation Coding and Data Hiding Algorithm Based on Compressed Images(Taiyuan University of Science and Technology) |
06/2016 |
163 | Hsu, C. I. | Research on Effective Color Image Retrieval Technology Based on Block Truncation Coding | 06/2016 |
164 | Wang, C. M. | Research on Reversible Data Hiding Technology of ABTC-EQ Compression Codes and AMBTC Decompression Images | 06/2016 |
165 | Wang, Y. K. | Embedded Information in the Absence of Distortion Data Compression Code, Compressed Images and Encrypted Image of the Study | 06/2016 |
166 | Chien, T. I. | Based on Image Sharpening and Image Compression and Encryption | 06/2016 |
167 | Lo, Y. Y. | Research on Key Agreement Authentication Method and Telemedicine Information System Authentication Method Based on Passing Code | 06/2016 |
168 | Wu, C. H. | Certificateless Authentication Method on Wireless Body Area Network | 06/2016 |
169 | Chang, K. L. | QR Code Landscaping Algorithm and Security Mechanism Research (Hangzhou Dianzi University) | 12/2016 |
170 | Peng, H. H. | Research on Credit Card Authentication Algorithm Based on Secret Sharing and Image Watermarking (Hangzhou Dianzi University) | 12/2016 |
171 | Kao, H | Research on the Application of Digital Watermarking in Privacy in Cloud Environment (Northwestern Polytechnical University) | 04/2017 |
172 | Kuo, P | Research on Multi-Feature Data Routing Strategy in Deduplication (Northwestern Polytechnical University) | 04/2017 |
173 | Kuo, I | Research on Information Hiding Technology for Cloud Computing Security Application (Northwestern Polytechnical University) | 04/2017 |
174 | Hsu, W. L. | Research on Key Technology of Information Hiding Based on Image Space Domain (Anhui University) | 04/2017 |
175 | Mao, K. | Research on Image Information Hiding Technology Based on Hamming Code (Anhui University) | 04/2017 |
Ph.
D. DISSERTATION SUPERVISION
No. |
Name |
Thesis Title |
Completion Date |
1 |
Lin, C. H. |
Some Control Mechanisms for Data Security in Computer Systems |
06/1991 |
2 |
Wu, T. C. |
The Study of Encryption and Control Techniques for Information System |
06/1992 |
3 |
Chen, Y. J. |
Some Properties on Vectorial Addition Chains |
12/1994 |
4 |
Chen, C. Y. |
The Study of Properties for Local Queries in Multi-Key File Systems |
06/1995 |
5 |
Hwang, S. J. |
The Design and Server-Aided Secret Computation of Digital Signatures |
04/1996 |
6 |
Chen, C. Y. |
The Study of Properties and Applications for Public Key Cryptosystem Based on Number Theorem |
04/1996 |
7 |
Lou, D. C. |
Fast Computations for Some Public Key Cryptosystems |
05/1997 |
8 |
Lee, W. B. |
Designing Some Digital Signature Schemes and Extending Their Applications to Information Security Systems |
03/1997 |
9 |
Hwang, R. J. |
Some Secret Sharing Schemes and Their Applications |
04/1998 |
10 |
Lee, C. F. |
Some Indexing Design and File Organizations for Spatial Match Retrieval |
06/1998 |
11 |
Hu, Y. C. |
Some Image Encoding Schemes Based on Vector Quantization |
12/1999 |
12 |
Jiang, J. H. |
Effective Algorithms for Compressing Various Data |
12/1999 |
13 |
Wang, C. T. |
Designing Some Cryptographic Schemes for Group Communication Systems |
12/1999 |
14 |
Chan, Y. K. |
Similar Image and Video Retrieval Systems Based on Spatial and Color Attributes |
12/2000 |
15 |
Hung, K. L. |
Block Reconstruction Techniques for Image Recovery |
11/2001 |
16 |
Tsai, C. S. |
A Study of Image Intellectual Property Rights Protection and Image Camouflage |
05/2002 |
17 |
Wu, H. C. |
Copyright Protection Techniques for Digital Images and Their Applications to Tampering Proof and Recovery |
06/2002 |
18 |
Hwang, K. F. |
Secure Encryption and Authentication Schemes for Text Data and Digital Images |
06/2002 |
19 |
Tsai, P. Y. |
The Study of Image Protection Mechanisms for Image Hiding and Image Authentication |
01/2004 |
20 |
Lin, I. C. |
Data Communication and Security in Mobile Computing Environment |
03/2004 |
21 |
Lai, Y. P. |
Fast Exponentiation Computations and Number System Transformations |
07/2004 |
22 |
Chuang, J. C. |
Steganography and Watermarking in Digital Images |
10/2004 |
23 |
Yu, Y. H. |
The Study of Digital Image Hiding and Recognition |
01/2005 |
24 |
Tseng, H. W. |
Image Coding Schemes for Data Hiding and Error Resiliency |
01/2005 |
25 |
Chan, C. W. |
The Enhancements of Some Public Key Cryptosystems and Their Applications in Electronic Commerce |
01/2005 |
26 |
Huang, H. F. |
The Design and Applications of Some Digital Signatures |
01/2005 |
27 |
Lu, T. C. |
The Study of Information Hiding Mechanisms |
12/2005 |
28 |
Chang, Y. F. |
Authentication and Digital Signature Schemes and Their Applications to E-commerce |
12/2005 |
29 |
Chan, C. S. |
The Study of Image Steganography and Digital Watermarking |
12/2005 |
30 |
Lin, C. Y. |
Data Mining and Its Applications to Image Processing |
10/2006 |
31 |
Lee, Y. C. |
Fast Algorithms for Mining Frequent Itemsets |
05/2007 |
32 |
Wu, W. C. |
The Study of Vector Quantization and Its Applications to Information Hiding |
07/2007 |
33 |
Wu, M. N. |
Some Information Hiding Schemes for Various Image Types |
11/2007 |
34 |
Lee, J. S. |
Security Technologies on Wireless Communications and Applications in Electronic Commerce |
03/2008 |
35 |
Chou, Y. C. |
A Study of Digital Image Coding and Retrieving Techniques |
12/2008 |
36 |
Tai, W. L. |
Image Steganography and Reversible Data Embedding Techniques |
12/2008 |
37 |
Yang, J. H. |
Authentication Protocols for E-Commerce Applications |
06/2009 |
38 |
Lin, P. Y. |
Removable Digital Watermarking and Image Protection Mechanisms |
06/2009 |
39 |
Chen, Y. H. |
Secret Hiding and Retrieval Techniques for Digital Media |
06/2009 |
40 |
Hsieh, Y. P. |
Embedding Secrets in Digital Images and Their Compression Codes |
06/2009 |
41 |
Kieu, T. D. |
Reversible Information Hiding Techniques for Digital Watermarking and Steganographic Applications |
06/2009 |
42 |
Wang, C. C. |
The Study of Stegnography and Watermark on Binary Images |
01/2010 |
43 |
Wang, Z. H. |
The Research on Reversible Data Embedding Techniques |
04/2010 |
44 |
Chen, C. C. |
Efficient Image Encoding and Information Embedding Techniques |
06/2010 |
45 |
Tsai, H. C. |
Authentication and Key Agreement Schemes for Network Applications |
12/2010 |
46 |
Lee, C. Y. |
Secure Communication Schemes in Network Environments |
12/2010 |
47 |
Wu, C. C. |
Security Mechanisms for Electronic Business Applications |
01/2011 |
48 |
Pai, P. Y. |
The Study of Segmentation and Hiding Techniques for Medical Images |
04/2011 |
49 |
Chen, K. N. |
Hiding Secret Information in Image Compression Code and Image Protection Techniques |
12/2011 |
50 |
Chang, S. C. |
The Study of Authentication Schemes in Wireless Environment and their Applications to E-Commerce |
06/2013 |
51 |
Cheng, T. F. |
Secure Authentication Protocols and Their Applications |
06/2013 |
52 |
Wang, X. T. |
Research on Data Embedding Methods Based on Grayscale Image |
06/2015 |
53 |
Nguyen, T. S. |
Reversible Information Hiding Techniques and Their Applications in Image Protection |
06/2015 |
54 |
Huynh, N. T. |
Verifiable Lossless Multi-Image Sharing Schemes for Secret Image Embedding |
06/2015 |
55 |
Huang, Y. H. |
(k, n)-Image Reversible Data Hiding |
07/2015 |
56 |
Le, H. D. |
Smart Card Based Authenticated Key Agreement Schemes |
07/2015 |
PATENTS
No. |
Title |
Patent No. |
Country |
Date |
1 |
Cryptosystem for Encrypting Digital Image or Voice File |
6023511 |
U.S.A. |
2000.2.8 |
2 |
An Encryption Device for Digital Image and Voice Files |
103202 |
R.O.C. |
1999.5.11 |
3 |
A Method for Sharing Color Confidential Images |
129581 |
R.O.C. |
2001.3.1 |
4 |
A Robust Digital Watermark Method for Multimedia |
140692 |
R.O.C. |
2001.8.21 |
5 |
A Secure Protocol for End-to-End Mobile Users with Double Authentication |
140313 |
R.O.C. |
2001.7.31 |
6 |
Feature-Oriented Digital Watermark for Multimedia |
140057 |
R.O.C. |
2001.8.1 |
7 |
A Speech Hiding Method Based upon Sub-band Coding |
141279 |
R.O.C. |
2001.9.1 |
8 |
A Digital Watermark Method Based on Neural Networks |
145485 |
R.O.C. |
2001.10.21 |
9 |
A Robust Method of Gray-Scale Watermark Embedding and Retrieval |
178825 |
R.O.C. |
2003.11.11 |
10 |
A Progressive Image Transmission Method Based on Guessing Neighbors |
199178 |
R.O.C. |
2004.7.22 |
11 |
A Irregular Sampling Coding Method Suitable for Image Authentication and Recoverable Tamper Proofing |
I248037 |
R.O.C. |
2006.1.21 |
12 |
A Meaningful Image Sharing Technique Based on Color Visual Secret Sharing |
I434245 |
R.O.C. |
2014.2.21 |
13 |
A (2,2) Circular Sharing Techniques for Two Color Secret Images |
I410908 |
R.O.C. |
2013.10.01 |
14 |
A Digital Watermarking Technique Based on Random Halftoning |
Under examining |
R.O.C. |
|
15 |
A High-Payload Data Hiding Technique Based on Side-Match Vector Quantization with Adaptive Alternatives |
Under examining |
R.O.C. |
|
16 |
An Efficient Image Authentication Method Based on Hamming Code |
Under examining |
R.O.C. |
|
17 |
A Switching Machine for Digital Watermarks |
M319592 |
R.O.C. |
2007.9.21 |
18 |
A Montgomery Multiplier in Finite Fields |
I340915 |
R.O.C. |
2011.4.21 |
19 |
An Efficient Medical Image Segmentation Algorithm Based on Game-Theoretic Framework |
ZL 2013 1 0452311.7 |
China |
2015.12.23 |
20 |
Progressive Secret Image Sharing Scheme Based on Sudoku |
2013104863316 |
China |
2016.2.16 |
LECTURE
No. |
Subject |
Date |
Location |
1 |
A Design of an Efficient Hashing Function |
1982.01.07 |
Institute of Computer and Decision Sciences, National Tsing Hua University |
2 |
Compiler Construction Techniques |
1982.03.11 |
National Chung Hsing University, Department of Applied Math |
3 |
Design of an Optimal Multi-key File System |
1982.06.19 |
Institute for Information Industry |
4 |
Data Recovery Automation |
1982.12.11 |
National Chung Hsing University, Department of Applied Math |
5 |
A
Design of a Multi-key File System |
1982.12.18 |
Feng Chia University, Department of
Applied Math |
6 |
Recent
Developments of of Perfect Hash Functions |
1983.04.29 |
National
Taiwan University, Department of Computer Science and Information Engineering |
7 |
Application
of Database Management Systems |
1983.11.26 |
Tax
Administratration of Taichung Government |
8 |
Recent
Developments of Multi-key Hashing File Systems |
1984.02.29 |
National
Taiwan University, Department of Electrical Engineering |
9 |
Constructing
an Optimal Information Retrieval Method |
1984.05.11 |
Feng Chia University, Department of
Information Engineering |
10 |
Experiences
in Designing a Database Management System |
1984.09.22 |
Institude for Information Industry |
11 |
Designing
a Minimal Perfect Hash Function |
1984.10.08 |
Institute
of Computer and Decision Sciences, National Tsing Hua University |
12 |
Recent
Development of Text Retrieval |
1984.10.19 |
National
Taiwan University, Department of Computer Science and Information Engineering |
13 |
Data
Structure and Information Security - from the Perspective of Sun-Tzu Theorem |
1984.11.28 |
Department
of Electrical Data Processing, National Taichung Institude
of Commerce |
14 |
Experiences
in Designing an Interactive Database Management System |
1984.12.21 |
Providence
College of Arts and Sciences for Women, Department of Information Science |
15 |
Recent
Developments of Key-Lock Pair Access Control Mechanism |
1985.03.15 |
National
Taiwan University, Department of Computer Science and Information Engineering |
16 |
Methodology
of Computer Software Engineering |
1985.03.27 |
Providence
College of Arts and Sciences for Women, Department of Information Science |
17 |
Information
Management Techniques |
1985.04.18 |
Taichung
First Senior High School |
18 |
Constructing
a Symbolic Database and Information Security System |
1985.04.20 |
National
Cheng Kung University, Department of Electrical Engineering |
19 |
On
Design of a Symbolic Database - from the Perspective of Theory of Numbers |
1985.05.02 |
National
Chiao Tung University, Department of Computer
Science and Information Engineering, and Department of Computer Information
and Science |
20 |
Computer
Security Technology |
1985.06.07 |
Feng Chia University, Department of
Information Engineering |
21 |
How
to Design a Symbolic Database |
1985.08.02 |
CDC
Computer Company: Workshop on Maintenance and Application of the User System |
22 |
How
to Manage Enterprise Databases |
1985.09.10 |
YMCA-IMC
Workshop on Computer Research and Study |
23 |
On
Developments of Theory and Techniques |
1985.10.14 |
Feng Chia University, Department of
Civil Engineering |
24 |
Computer
and Information Management |
1985.10.20/10.26 |
Tunghai University, International Bussiness Administration |
25 |
Information
Protection Systems |
1986.01.23 |
Academia
Sinica, Institute of Information Science |
26 |
Information
Security Systems |
1986.01.24 |
Aeronautics
Developement Center |
27 |
Recent
Developments of Data Structures and Information Security |
1986.03.06 |
Chung-Shan
Institute of Science and Technology |
28 |
Recent
Developments of Searching Techniques |
1986.03.13 |
Providence
College of Arts and Sciences for Women, Department of Information Science |
29 |
A
Chinese Form-oriented Visual Programming System |
1986.03.18 |
National
Chung Hsing University |
30 |
Recent
Developments of Data Structure Techniques |
1986.03.24 |
National
Taiwan Institute of Technology, Department of Electronic Technology |
31 |
How
to Construct a Symbolic Database |
1986.03.25 |
Institute
of Computer and Decision Sciences, National Tsing Hua University |
32 |
An
Efficient Data Searching Technique |
1986.03.31 |
Chung
Yuan Christian University, Department of Information and Computer Engineering |
33 |
Computer
Communications Security System |
1986.04.17 |
National
Chiao Tung University, Department of Computer
Science and Information Engineering |
34 |
Computers
and Data Processing |
1986.05.04 |
Tunghai University, International Bussiness Administration |
35 |
Public-Key
Cryptography |
1986.06.12 |
Taiwan
Province Government, Electrical Data Processing Center |
36 |
Advanced
GPSS/S |
1986.06.16-06.17 |
Workshop
on Software Packages and Application Systems, sponsored by Ministry of
Education |
37 |
Searching
Techniques for Static Data |
1986.08.20 |
Aeronautics
Developement Center |
38 |
Computers
and Data Processing |
1986.09.13 |
Tunghai University, International Bussiness Administration |
39 |
Visual
Programming |
1986.09.20 |
Institude for Information Industry |
40 |
Computers
and Passwords |
1986.10.05 |
Taiwan
Provincial Taichung Libarary |
41 |
Visual
Programming |
1986.10.06 |
National
Chung Hsing University, Computer and Information
Network Center |
42 |
Office
Automation |
1986.10.18 |
Tunghai University, International Bussiness Administration |
43 |
Visual
Programming |
1986.10.21 |
Department
of Electrical Data Processing, National Taichung Institude
of Technology |
44 |
Information
Security |
1986.10.29 |
National
Chung Hsing University, Computer and Information
Network Center |
45 |
Data
Encryption Techniques |
1986.11.14 |
World
Technology Consultant Industry |
46 |
Information
Access Control Techniques |
1986.11.14 |
World
Technology Consultant Industry |
47 |
Secure
Secret Broadcasting |
1986.11.15 |
World
Technology Consultant Industry |
48 |
Recent
Developments of Data Structures and Searching Techniques |
1986.11.19 |
National
Central University, Department of Computer Science and Information
Engineering |
49 |
Information
Access Control Techniques |
1986.12.03 |
National
Tsing Hua University,
Department of Industrial Engineering |
50 |
Computers
and Communications |
1986.12.12 |
National
Taiwan Normal University, Department of Industrial Education |
51 |
Computers
and Communications |
1986.12.13 |
Taichung
County, Ching-Shui Junior High School |
52 |
The
Past, Present, and Future of Information Technology |
1986.12.22 |
National
Chin-Yi Institute of Technology |
53 |
Implementation
and Application of a Test Items Bank for Information Courses |
1986.12.23 |
Taichung
Home Economical and Commercial Senior Vocational School |
54 |
Information
Era |
1987.01.15 |
Victory
High School |
55 |
Recent
Developments of Data Structures and Searching Techniques |
1987.02.24 |
National/
Panasonic Taiwan |
56 |
Sun-Tzu
as a Computer Scientist |
1987.03.15 |
Taiwan
Provincial Taichung Libarary |
57 |
Advanced
GPSS/S |
1987.03.17-03.18 |
Workshop
on Software Packages and Application Systems, sponsored by Ministry of
Education |
58 |
Computers
and Information |
1987.03.21 |
Chia-Yi
YMCA |
59 |
Computers
and Information |
1987.03.22 |
Tunghai University, International Bussiness Administration |
60 |
The
Developments of Information Retrieval Techniques |
1987.03.24 |
Tatung
Institute of Technology, Department of Computer Science and Engineering |
61 |
A
Design of Secure Computer Passwords |
1987.03.26 |
National
Cheng Kung University, Department of Engineering Science |
62 |
Database
Design - From the Perspective of Data Analysis |
1987.04.14 |
Computer
Society of the Republic of China |
63 |
Data
Retrieval and Information Security |
1987.04.20 |
National
Chung Hsing University, Computer and Information
Network Center |
64 |
Information
Science - from the Perspective of Data Analysis |
1987.04.21 |
National
Chung Hsing University, Computer and Information
Network Center |
65 |
Information
Science - from the Perspective of Data Analysis |
1987.04.23 |
Aeronautics
Developement Center |
66 |
Information
Science - from the Perspective of Dicrete
Mathematics |
1987.04.28 |
Tunghai University, Department of
Computer Science Information Engineering |
67 |
Key
to the Treasury of Life |
1987.05.11 |
Taichung
Second Senior High School |
68 |
Advanced
GPSS/S |
1987.05.26-05.27 |
Workshop
on Software Packages and Application Systems, sponsored by Ministry of
Education |
69 |
Information
Era |
1987.06.23/07.07 |
Ming
Dao High School |
70 |
Visual
Programming - FORMOSA |
1987.07.09 |
World
Technology Consultant Industry |
71 |
A
Database Management System - System-Bee |
1987.07.10 |
World
Technology Consultant Industry |
72 |
Information
Security |
1987.07.23 |
Aeronautics
Developement Center |
73 |
Workshop
on Data Structures and Data Analyses |
1987.08.24-08.26 |
World
Technology Consultant Industry |
74 |
Workshop
on Information Systems and Information Auditing |
1987.08.27-08.28 |
Harvard
Management Services |
75 |
Workshop
on Information Engineering Technology |
1987.09.21-09.23 |
Chin-Peng Management Consulting Company |
76 |
Information
Access Control Techniques |
1987.10.28 |
National
Tsing Hua University,
Department of Industrial Engineering |
77 |
Designing
an Information Query System |
1987.11.02 |
Institute
of Computer and Decision Sciences, National Tsing Hua University |
78 |
Design
Principles of an Information Query System |
1987.11.04 |
Tunghai University, Department of
Computer Science Information Engineering |
79 |
System
Simulation |
1987.11.10 |
Institute
of Harbor and Marine Technology |
80 |
Clustering
Analysis and Its Applications |
1987.11.26 |
Department
of Computer Engineering, National Chiao Tung
University |
81 |
Workshop
on Compilers |
1987.11.30-12.02 |
World
Technology Consultant Industry |
82 |
Clustering
Analysis and Its Applications |
1987.12.08 |
Department
of Computer Science and Information Engineering, National Cheng Kung
University |
83 |
A
Step to Information Society - Using Computers |
1987.12.12 |
Feng-Yuan Junior High School, Feng Yuan |
84 |
A
Step to Information Society - Using Computers |
1987.12.15 |
Chang-Ann
Junior High School, Chang-Hua |
85 |
Data
Compression |
1987.12.16 |
Computer
and Information Network Center, National Chung Hsing
University |
86 |
Design
of Distributed Databases |
1988.03.14 |
Department
of Computer Science and Engineering, Tatung Institute of Technology |
87 |
Visual
Programming |
1988.03.28 |
Department
of Industrial Engineering and Enterprise Information, Tunghai
University |
88 |
On
Developments of Theory and Techniques |
1988.04.11 |
Tunghai University, Department of
Computer Science Information Engineering |
89 |
Visual
Programming |
1988.04.13 |
Aeronautic
Development Center |
90 |
Electronic
Data Compression |
1988.04.14 |
Department
of Electrical Data Processing, National Taichung Institude
of Commerce |
91 |
Database
Management Systems and Office Automation |
1988.04.18 |
Yung-Jing
Industrial Vocational Senior School |
92 |
Database
Management System and Office Automation |
1988.04.20 |
Taichung
Home Economical and Commercial Senior Vocational School |
93 |
Information
Era |
1988.08.15 |
Taichung
Home Economical and Commercial Senior Vocational School |
94 |
Information
Era |
19888.08.18 |
Taichung
Agricultural Vocational Senior High School |
95 |
Database
Management Systems |
1988.10.05 |
Aeronautic
Development Center |
96 |
Chinese
String Searching |
1988.10.12 |
Department
of Computer Science and Information Engineering/Electrical Engineering, National
Central University |
97 |
Approximate
String Searching |
1988.11.01 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
98 |
A
User Identification Scheme on Computer Networks |
1988.11.10 |
Academia
Sinica |
99 |
Workshop
on Information System Technology |
1988.11.24-11.26 |
World
Technology Consultant Industry |
100 |
Recent
Developments of Information Security Technology |
1988.12.01 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
101 |
Towards
Information Society - Universal Information Education |
1988.12.08 |
Taichung
First Senior High School |
102 |
Towards
Information Society - Universal Information Education |
1988.12.10 |
Taichung
Girls' Senior High School |
103 |
Introduction
to Computer Passwords |
1989.03.15 |
Department
of Electrical Data Processing, National Taichung Institude
of Commerce |
104 |
Public-Key
Encryption |
1989.04.24 |
Aeronautics
Developement Center |
105 |
An
Experience in Designing a Database Management System |
1989.04.26 |
Computer
Society of the Republic of China |
106 |
Data
Analysis Technology and Its Applications |
1989.04.28 |
Department
of Computer Science and Information Engineering, National Taiwan University |
107 |
Data
Analysis Technology and Its Applications |
1989.05.10 |
Department
of Industrial Education, National Taiwan Normal University |
108 |
Information
and Computers |
1989.06.07 |
National
Chung Hsing University |
109 |
On
Developments of Theory and Techniques |
1989.06.09 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
110 |
Information
Security |
1989.06.14 |
National
Chung Hsing University |
111 |
Workshop
on Data Engineering Technology |
1989.08.28-08.30 |
Center
of Public and Business Administration Education, National Chengchi
University |
112 |
Data
Compression |
1989.10.05 |
Department
of Engineering Science, National Cheng Kung University |
113 |
Computer
Crime and Computer Viruses |
1989.10.15 |
Taiwan
Provincial Taichung Library |
114 |
Computer
Crime and Countermeasures |
1989.11.01 |
Tunghai University, Department of
Computer Science Information Engineering |
115 |
Clustering
Analysis and Its Applications |
1989.12.08 |
Institute
of Information Science, Academia Sinica |
116 |
Information
Security |
1989.12.11 |
Department
of Mathematics and Science Education, National Chiayi
Teachers College |
117 |
Information
and Computers |
1990.02.06 |
Taichung
Agricultural Vocational Senior High School |
118 |
Introduction
to Computer Password Design |
1990.03.01 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
119 |
Computer
Cryptology |
1990.03.02 |
Department
of Information Engineering, Feng Chia University |
120 |
Data
Encryption |
1990.03.08 |
Department
of Electrical Engineering, Tatung Institute of Technology |
121 |
Information
Security |
1990.03.09 |
Department
of Electronical Data Processing, Ming Chuan College |
122 |
Data
Encryption |
1990.03.28 |
Application
Mathematics Department, Chinese Culture University |
123 |
Design
of a Chinese String Searching Machine |
1990.03.30 |
Department
of Electrical Data Processing, National Taichung Institude
of Commerce |
124 |
Data
Encryption |
1990.04.12 |
Taichung
Home Economical and Commercial Senior Vocational School |
125 |
Information
Security |
1990.04.12 |
Taichung
Home Economical and Commercial Senior Vocational School |
126 |
Data
Compression |
1990.04.14 |
Taichung
Home Economical and Commercial Senior Vocational School |
127 |
Computer
Security |
1990.04.18 |
College
of Medicine, National Cheng Kung University |
128 |
Computer
Crime and Computer Viruses |
1990.05.17 |
Taichung
Museum of Art |
129 |
Information
Management and Applications |
1990.06.04 |
Chia-Yi
City Government |
130 |
Information
Management and Applications |
1990.06.22 |
Chia-Yi
City Government |
131 |
Management
Computerization |
1990.07.11 |
National
Yunlin Institute of Industry |
132 |
Information
Access and Control |
1990.09.27 |
Department
of Applied Mathematics, National Chung Hsing
University |
133 |
Strategies
for Chinese Compression |
1990.10.18 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
134 |
Computer
Crime and Countermeasures |
1990.10.18 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
135 |
Computer
Crime and Countermeasures |
1990.10.30 |
National
Chung Cheng University |
136 |
Compression-Based
Perfect Hashing Strategies |
1990.11.26 |
Department
of Computer Science, National Tsing Hua University |
137 |
Countermesures against Computer Crime and
Computer Viruses |
1990.11.27 |
Taiwan
Cooperative Bank |
138 |
Data
Engineering Technology |
1990.11.28 |
National
Defense Management College |
139 |
The Design of Computer Password |
1990.12.12 |
Department
of Electrical Engineering, National Yunlin
Institute of Industry |
140 |
Applications
of Clustering Technology in Information Science |
1990.12.20 |
Department
of Electrical Engineering, National Cheng Kung University |
141 |
Information
Security |
1991.01.22 |
YMCA,
Chia-Yi |
142 |
Design
of a Minimal Perfect Hashing Function |
1991.02.11 |
Department
of Computer Science and Engineering, The Chinese University of Hong Kong |
143 |
Office
Automation |
1991.03.06 |
Computer
Center, National Chung Cheng University |
144 |
Computer
Crime and Prevention |
1991.04.20 |
Exhibition
Center of Computer Science, National Science Council |
145 |
Computers
and Passwords |
1991.06.14 |
Department
of Electronic Engineering, National Taipei Institute of Technology |
146 |
On
File Systems |
1991.09.21 |
Department
of Computer Science and Information Engineering, National Cheng Kung
University |
147 |
Applications
of Cryptography in Computer Security |
1991.11.09 |
Department
of Computer Science and Information Engineering, National Cheng Kung
University |
148 |
The Road to Success |
1991.11.27 |
Tunghai University, Department of
Computer Science Information Engineering |
149 |
Design
of Image Databases |
1991.12.04 |
Department
of Electrical Data Processing, National Taichung Institude
of Commerce |
150 |
Dynamic
Secret Sharing |
1992.01.10 |
Department
of Applied Mathematics, National Sun Yat-sen
University |
151 |
Introduction
to Computer Passwords |
1992.02.21 |
Sieh-Chih Industrial and
Commercial Senior Vocational School |
152 |
Key
to Emerging |
1992.03.11 |
Taiwan
Provincial Wen-Hua Senior High School |
153 |
Information
Security |
1992.04.14 |
Provincial
Chang-Hua Senior School of Commerence |
154 |
The
Past, Present, and Future of Science and Technology Education |
1992.04.16 |
National
Chung Cheng University |
155 |
Methodology |
1992.05.14 |
Tunghai University, Department of
Computer Science Information Engineering |
156 |
Information
Security |
1992.05.18 |
Ta
Tung Technological College of Commerce |
157 |
Group
Secret Strategies |
1992.06.15 |
Computer
Science and Engineering Research Center, National Sun Yat-sen
University |
158 |
Group
Secret Techniques |
1992.10.02 |
Department
of Electrical Data Processing, National Taichung Institude
of Commerce |
159 |
Secret
Sharing |
1992.10.06 |
Department
of Information and Computer Education, National Taiwan Normal University |
160 |
Generalized
Group Secret Cryptography |
1992.10.07 |
National
Security Bureau |
161 |
Methodology |
1992.10.22 |
Department
of Information Management, Ming Chuan College |
162 |
Methodology |
1992.10.28 |
Department
of Computer and Information Science, National Chiao
Tung University |
163 |
The Design of Computer Password |
1992.11.18 |
Department
of Computer Science and Engineering, National Sun Yat-sen
University |
164 |
Evolution
and Applications of Mathematics |
1992.11.23 |
Department
of Mathematics, National Tsing Hua
University |
165 |
Data
Compression |
1992.11.24 |
Provincial
Chang-Hua Senior School of Commerence |
166 |
Developments
of Contemporary Cryptology |
1992.12.01 |
Taichung
Home Economical and Commercial Senior Vocational School |
167 |
Career
Planning of Computer People |
1992.12.07 |
Department
of Computer Science and Information Engineering, National Chung Cheng
University |
168 |
A
Secured Computer Center Management |
1993.01.07 |
Taichung
Home Economical and Commercial Senior Vocational School |
169 |
A
Secured Computer Center Management |
1993.01.14 |
Taichung
Home Economical and Commercial Senior Vocational School |
170 |
A
Secured Computer Center Management |
1993.02.04 |
Taichung
Home Economical and Commercial Senior Vocational School |
171 |
A
Secured Computer Center Management |
1993.02.11 |
Taichung
Home Economical and Commercial Senior Vocational School |
172 |
Key
to Emerging |
1993.03.04 |
Department
of Information Management, National Taiwan Institute of Technology |
173 |
Chinese
Retrieval and Searching |
1993.03.24 |
Provincial
Chang-Hua Senior School of Commerence |
174 |
An
Image Similar Retrieval Method Based on Modulo Arithmetics |
1993.04.23 |
Workshop
on Computer Applications Sponsored by National Chung Hsing
University |
175 |
Information
Security |
1993.05.04 |
Department
of Information Science and Management, Providence University |
176 |
Key
to Emerging |
1993.05.24 |
Chia-Yi
Home Vocational School |
177 |
Information
Security |
1993.06.02 |
Department
of Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C. |
178 |
A
Master Key for an M3 Cryptoscheme |
1993.06.08 |
Department
of Electrical Engineering, National Defense University, Chung Cheng Institute
of Technology |
179 |
Introduction
to Computer Passwords |
1993.06.10 |
Taichung
Home Economical and Commercial Senior Vocational School |
180 |
Military
Information Security |
1993.09.07 |
National
Defense Management College |
181 |
Information
Searching Techniques |
1993.10.29 |
National
Chung Cheng University |
182 |
Evolution
of Computer Cryptography |
1993.11.18 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
183 |
Project
Planning Information System Design |
1993.11.23 |
Research,
Development, and Evaluation Commission, Taiwan Provincial Government |
184 |
Career
Planning |
1993.11.25 |
College
of Engineering, National Chung Cheng University (for the students of Department
of Business Education, National Changhua University
of Education) |
185 |
Information
Security |
1993.12.01 |
Provincial
Training Center of Taiwan Provincial Government |
186 |
Developments
of Computer Cryptography |
1993.12.08 |
National
Defense University, Chung Cheng Institute of Technology |
187 |
Information
Security |
1993.12.27 |
Provincial
Training Center of Taiwan Provincial Government |
188 |
Applications
of Instruction Network and Information Security |
1994.01.07 |
Szu-Yu Junior High School |
189 |
Evaluation
of Computer-Aided Instruction (CAI) |
1994.01.17 |
Fooyin College of Nursing |
190 |
Evolution
of Contemporary Cryptography |
1994.02.22 |
Chung-Shan
Institute of Science and Technology |
191 |
Project
Planning Information System Design |
1994.03.10 |
Research,
Development, and Evaluation Commission, Taiwan Province |
192 |
Group
Secret Technology |
1994.03.18 |
Department
of Computer Science. and Information Engineering, National Taiwan University |
193 |
Artificial
Intelligence |
1994.03.25 |
Tsau Ton Commercial and Technical
Vocational School |
194 |
Artificial
Intelligence |
1994.04.02 |
Center
of Automated Engineering, Da-Yeh University |
195 |
The Design of Computer Password |
1994.04.13 |
Wu
Feng Institute of Technology |
196 |
Key
to Emerging |
1994.04.14 |
Rotary
Club of Taichung East District |
197 |
The Design of Computer Password |
1994.04.30 |
National
Central University |
198 |
Introduction
to Cryptanalysis |
1994.05.06 |
Department
of Applied Mathematics, Feng Chia University |
199 |
Introduction
to Cryptanalysis |
1994.05.20 |
Department
of Industrial Education, National Taiwan Normal University |
200 |
Chinese
Database Management Systems |
1994.05.25 |
Training
Center for High School Teachers |
201 |
Efficient
Information Retrieval |
1994.08.03 |
Graduate
Institute of Computer Science, National Chung Hsing
University |
202 |
Introduction
to Cryptanalysis |
1994.11.03 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
203 |
Information
Security |
1994.12.14 |
Department
of Information Management, Chaoyang Institute of
Technology |
204 |
Information
Security |
1994.12.17 |
Computer
and Information Network Center, National Chung Hsing
University |
205 |
Developments
of Contemporary Cryptography |
1995.03.03 |
Department
of Computer Science and Engineering, National Sun Yat-Sen
University |
206 |
A
Step to Information Society - Using Computers |
1995.04.24 |
National
Chung Cheng University |
207 |
Image
Compression Technology |
1995.04.27 |
Department
of Information Science and Management, Providence University |
208 |
Technology
and Our Life |
1995.07.27 |
National
Chiayi Senior Hight
School |
209 |
Information
Security and Management |
1995.08.06 |
Taiwan
Regional Development Institute |
210 |
Information
Security |
1995.11.03 |
Provincial
Training Center of Taiwan Provincial Government |
211 |
The
Present and Prospect of Information Security |
1995.11.09 |
Department
of Applied Mathematics, National Chung Hsing
University |
212 |
Developments
of Computer Cryptography |
1995.12.20 |
Department
of Computer Science and Information Engineering, National Dong Hwa University |
213 |
Developments
of Computer Cryptography |
1995.12.28 |
Department
of Computer and Information Science, National Chiao
Tung University |
214 |
Information
Security |
1996.04.19 |
Refining
& Manufacturing Research Center of Chinese Petroleum Corp |
215 |
Contemporary
Cryptography |
1996.05.03 |
Department
of Computer Science and Information Engineering, National Cheng Kung
University |
216 |
Information
Security |
1996.06.06 |
National
Changhua University of Education |
217 |
Information
Security |
1996.08.14 |
Department
of Computer Science and Engineering, National Sun Yat-Sen
University |
218 |
How
to Share a Common Secret Document |
1996.12.03 |
Department
of Information Engineering, Feng Chia University |
219 |
Efficient
Join Operation of Time-domain Databases |
1996.12.19 |
Department
of Computer Science and Information Engineering, National Chiao
Tung University |
220 |
The Road to Success |
1997.03.26 |
Department
of Information Management, Chaoyang University of
Technology |
221 |
Efficient
Join Operation of Time-domain Databases |
1997.04.16 |
Department
of Computer Science, National Tsing Hua University |
222 |
Evolution
of Information Security Technology |
1997.05.07 |
National
Defense University, Chung Cheng Institute of Technology |
223 |
Information
Security |
1997.06.05 |
Department
of Mathematics, Chung Yuan Christian University |
224 |
Evolution
of Information Security Technology |
1997.07.11 |
National
Defense Management College |
225 |
The
Present and Prospect of Information Education of Universities in Taiwan |
1997.11.04 |
Beijing
University of Posts and Telecommunications, People¡¦s Republic of China |
226 |
Hot
Issues of International Information Security Research - Theory, Techniques,
and Market Trend |
1997.11.04 |
Beijing
University of Posts and Telecommunications, People¡¦s Republic of China |
227 |
Secret
Sharing |
1997.11.05 |
Beijing
University of Posts and Telecommunications, People¡¦s Republic of China |
228 |
Fast
Computation of Modulo Exponents |
1997.11.05 |
Beijing
University of Posts and Telecommunications, People¡¦s Republic of China |
229 |
Digital
Signatures |
1997.11.06 |
Beijing
University of Posts and Telecommunications, People¡¦s Republic of China |
230 |
Image
Hiding Technology |
1997.11.06 |
Beijing
University of Posts and Telecommunications, People¡¦s Republic of China |
231 |
Applications
of Chinese Remainder Theorem |
1997.11.07 |
Beijing
University of Posts and Telecommunications, People¡¦s Republic of China |
232 |
Essential
Qualities of a Successful Scientist |
1997.11.07 |
Beijing University of Posts and Telecommunications, People¡¦s Republic of China |