default search action
Chi-Sung Laih
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j43]Hsiao-Ching Lin, Ching-Nung Yang, Chi-Sung Laih, Hui-Tang Lin:
Natural language letter based visual cryptography scheme. J. Vis. Commun. Image Represent. 24(3): 318-331 (2013) - [j42]Chia-Yu Lu, Shang-Ming Jen, Chi-Sung Laih:
A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication. IEEE Trans. Computers 62(3): 428-438 (2013) - 2012
- [j41]Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu:
Long-term confidentiality of PKI. Commun. ACM 55(1): 91-95 (2012) - [j40]Ming-Kung Sun, Michael Chang, Hsiao-Ching Lin, Chi-Sung Laih, Hui-Tang Lin:
A Trust Distributed DRM System Using Smart Cards. IEICE Trans. Inf. Syst. 95-D(12): 2991-3000 (2012) - [j39]Chin-Feng Lee, Hung-Yu Chien, Chi-Sung Laih:
Server-less RFID authentication and searching protocol with enhanced security. Int. J. Commun. Syst. 25(3): 376-385 (2012) - 2011
- [j38]Pei-Te Chen, Chi-Sung Laih:
A challenge-based trust establishment protocol for peer-to-peer networks. Secur. Commun. Networks 4(1): 71-78 (2011) - [c28]Ming-Kung Sun, Mao-Jie Lin, Michael Chang, Chi-Sung Laih, Hui-Tang Lin:
Malware Virtualization-Resistant Behavior Detection. ICPADS 2011: 912-917 - 2010
- [j37]Yung-Tsung Hou, Yimeng Chang, Tsuhan Chen, Chi-Sung Laih, Chia-Mei Chen:
Malicious web content detection by machine learning. Expert Syst. Appl. 37(1): 55-60 (2010) - [c27]Chia-Yu Lu, Wu-Chuan Yang, Chi-Sung Laih:
Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems. BWCCA 2010: 401-406
2000 – 2009
- 2009
- [j36]Gu Hsin Lai, Chia-Mei Chen, Chi-Sung Laih, Tsuhan Chen:
A collaborative anti-spam system. Expert Syst. Appl. 36(3): 6645-6653 (2009) - [j35]Chi-Sung Laih, Ming-Kung Sun, Chen-Chung Chang, Yunghsiang Han:
Adaptive key pre-distribution model for distributed sensor networks. IET Commun. 3(5): 723-732 (2009) - [j34]Jiin-Chiou Cheng, Chi-Sung Laih:
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. Int. J. Inf. Sec. 8(1): 37-48 (2009) - [j33]Hung-Yu Chien, Chi-Sung Laih:
ECC-based lightweight authentication protocol with untraceability for low-cost RFID. J. Parallel Distributed Comput. 69(10): 848-853 (2009) - [j32]Shang-Ming Jen, Chi-Sung Laih, Wen-Chung Kuo:
A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET. Sensors 9(6): 5022-5039 (2009) - [c26]Ming-Kung Sun, Chi-Sung Laih, Hong-Yi Yen, Jyun-Rong Kuo:
A Ticket Based Digital Rights Management Model. CCNC 2009: 1-5 - 2008
- [j31]Pei-Te Chen, Chi-Sung Laih:
IDSIC: an intrusion detection system with identification capability. Int. J. Inf. Sec. 7(3): 185-197 (2008) - [j30]Shyh-Yih Wang, Chi-Sung Laih:
Efficient Key Distribution for Access Control in Pay-TV Systems. IEEE Trans. Multim. 10(3): 480-492 (2008) - [c25]Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen:
Defending On-Line Web Application Security with User-Behavior Surveillance. ARES 2008: 410-415 - [c24]Ching-Huang Lin, Chih-Hao Chen, Chi-Sung Laih:
A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection. APSCC 2008: 1252-1257 - [c23]Ya-Ting Carolyn Yang, Wan-Chi Wu, Pei-Yun Chung, Chi-Sung Laih, Jia-Rong Wen, Chi-San Lin, Jian-Bin Gao:
The Practice and Experience Sharing of Three-Year Peer Coaching Program in Taiwan. ICWL 2008: 87-98 - [c22]Shih-Fen Lin, Yung-Tsung Hou, Chia-Mei Chen, Bingchiang Jeng, Chi-Sung Laih:
Malicious Webpage Detection by Semantics-Aware Reasoning. ISDA (1) 2008: 115-120 - 2007
- [j29]Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:
Fast Multicomputation with Asynchronous Strategy. IEEE Trans. Computers 56(2): 234-242 (2007) - [c21]Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang, Chi-Sung Laih:
Generating Attack Scenarios with Causal Relationship. GrC 2007: 368-373 - 2006
- [j28]Shyh-Yih Wang, Chi-Sung Laih:
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Dependable Secur. Comput. 3(1): 91-100 (2006) - [c20]Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih:
Authorized Tracking and Tracing for RFID Tags. EUC Workshops 2006: 435-444 - [c19]Chi-Sung Laih, Chun-Ju Fu, Wen-Chung Kuo:
Design a Secure and Practical Metering Scheme. International Conference on Internet Computing 2006: 443-447 - 2005
- [j27]Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:
Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation. Appl. Math. Comput. 167(1): 108-117 (2005) - [j26]Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalyses of two key assignment schemes based on polynomial interpolations. Comput. Secur. 24(2): 134-138 (2005) - [j25]Shyh-Yih Wang, Chi-Sung Laih:
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies. J. Syst. Softw. 75(1-2): 189-192 (2005) - [c18]Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:
Fast Multi-computations with Integer Similarity Strategy. Public Key Cryptography 2005: 138-153 - [c17]Pei-Te Chen, Chi-Sung Laih, Fabien Pouget, Marc Dacier:
Comparative Survey of Local Honeypot Sensors to Assist Network Forensics. SADFE 2005: 120-134 - [c16]I-Chuan Chang, Bor-Wen Hsu, Chi-Sung Laih:
A DCT Quantization-Based Image Authentication System for Digital Forensics. SADFE 2005: 223-235 - 2004
- [j24]Chi-Sung Laih, K. Y. Chen:
Generating visible RSA public keys for PKI. Int. J. Inf. Sec. 2(2): 103-109 (2004) - [c15]Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih:
Design of AES Based on Dual Cipher and Composite Field. CT-RSA 2004: 25-38 - 2003
- [j23]Chen-Chi Lin, Chi-Sung Laih:
The GPKI developing status of Taiwan and some major Asia countries. Comput. Commun. 26(16): 1884-1892 (2003) - [j22]Shin-Yan Chiou, Chi-Sung Laih:
A Tempo-Based t-out-of-n Audio Cryptography Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(8): 2091-2098 (2003) - [j21]Chi-Sung Laih, Shin Yan Chiou:
Cryptanalysis of an optimized protocol for mobile network authentication and security. Inf. Process. Lett. 85(6): 339-341 (2003) - [j20]Chen-Chi Lin, Chi-Sung Laih, Ching-Nung Yang:
New Audio Secret Sharing Schemes With Time Division Technique. J. Inf. Sci. Eng. 19(4): 605-614 (2003) - [e1]Chi-Sung Laih:
Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings. Lecture Notes in Computer Science 2894, Springer 2003, ISBN 3-540-20592-6 [contents] - 2002
- [j19]Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih:
On the Design of RSA With Short Secret Exponent. J. Inf. Sci. Eng. 18(1): 1-18 (2002) - 2000
- [j18]Ching-Nung Yang, Chi-Sung Laih:
New Colored Visual Secret Sharing Schemes. Des. Codes Cryptogr. 20(3): 325-336 (2000) - [j17]Chen-Chi Lin, Chi-Sung Laih:
Cryptanalysis of Nyberg-Rueppel's message recovery scheme. IEEE Commun. Lett. 4(7): 231-232 (2000) - [c14]Lih-Yang Wang, Chi-Sung Laih, Hang-Geng Tsai, Nern-Min Huang:
On the hardware design for DES cipher in tamper resistant devices against differential fault analysis. ISCAS 2000: 697-700
1990 – 1999
- 1999
- [j16]Wen-Chung Kuo, Chi-Sung Laih, Min-Jea Gau:
On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes. J. Inf. Sci. Eng. 15(5): 701-713 (1999) - [j15]Fu-Kuan Tu, Chi-Sung Laih, Hsu-Hung Tung:
On key distribution management for conditional access system on pay-TV system. IEEE Trans. Consumer Electron. 45(1): 151-158 (1999) - [c13]Hung-Min Sun, Wu-Chuan Yang, Chi-Sung Laih:
On the Design of RSA with Short Secret Exponent. ASIACRYPT 1999: 150-164 - [c12]Chi-Sung Laih, Fu-Kuan Tu:
Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. ICPP Workshops 1999: 167-173 - 1998
- [j14]Ching-Nung Yang, Chi-Sung Laih:
DCm Codes for Constructing t-EC/AUED Codes. IEEE Trans. Computers 47(4): 492 (1998) - 1997
- [j13]Ching-Nung Yang, Chi-Sung Laih:
A Note on Error-Correcting Codes for Authentication and Subliminal Channels. Inf. Process. Lett. 62(3): 141-143 (1997) - [j12]Chi-Sung Laih, Min-Jea Gau:
Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. IEEE Trans. Computers 46(4): 511 (1997) - [c11]Yung-Cheng Lee, Chi-Sung Laih:
On the Key Recovery of the Key Escrow System. ACSAC 1997: 216-220 - 1996
- [j11]Chi-Sung Laih, Sung-Ming Yen:
Multi-Signature for Specified Group of Verifiers. J. Inf. Sci. Eng. 12(1): 143-152 (1996) - [j10]Chi-Sung Laih, Ching-Nung Yang:
On the Analysis and Design of Group Theoretical T-syEC/AUED Codes. IEEE Trans. Computers 45(1): 103-108 (1996) - 1995
- [j9]Chin-Chen Chang, Tzong-Chen Wu, Chi-Sung Laih:
Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues. Comput. Commun. 18(1): 45-47 (1995) - [j8]Chi-Sung Laih, Fu-Kuan Tu, Wen-Chung Tai:
On the Security of the Lucas Function. Inf. Process. Lett. 53(5): 243-247 (1995) - [j7]Sung-Ming Yen, Chi-Sung Laih:
Improved Digital Signature Algorithm. IEEE Trans. Computers 44(5): 729-730 (1995) - [j6]Sung-Ming Yen, Chi-Sung Laih:
Improved Digital Signature Suitable for Batch Verification. IEEE Trans. Computers 44(7): 957-959 (1995) - [c10]Chi-Sung Laih, Wen-Chung Kuo:
Cryptanalysis of the Enhanced ElGamal's Signature Scheme. Cryptography: Policy and Algorithms 1995: 228-231 - 1994
- [j5]Chi-Sung Laih, Wen-Hong Chiou, Chin-Chen Chang:
Authentication and protection of public keys. Comput. Secur. 13(7): 581-585 (1994) - 1993
- [c9]Chi-Sung Laih, Sung-Ming Yen:
On the Design of Conference Key Distribution Systems for the Broadcasting Networks. INFOCOM 1993: 1406-1413 - 1992
- [j4]Chi-Sung Laih:
Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle. J. Inf. Sci. Eng. 8(4): 633-640 (1992) - [c8]Chi-Sung Laih, Sung-Ming Yen:
Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols. AUSCRYPT 1992: 219-230 - [c7]Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen:
On Verifiable Implicit Asking Protocols for RSA Computation. AUSCRYPT 1992: 296-307 - [c6]Sung-Ming Yen, Chi-Sung Laih:
The Fast Cascade Exponentation Algorithm and its Applications on Cryptography. AUSCRYPT 1992: 447-456 - 1991
- [c5]Chi-Sung Laih, Lein Harn:
Generalized Threshold Cryptosystems. ASIACRYPT 1991: 159-166 - [c4]Chi-Sung Laih, Sung-Ming Yen, Lein Harn:
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence. ASIACRYPT 1991: 450-459
1980 – 1989
- 1989
- [j3]Chi-Sung Laih, Jau-Yien Lee, Lein Harn:
A new threshold scheme and its application in designing the conference key distribution cryptosystem. Inf. Process. Lett. 32(3): 95-99 (1989) - [j2]Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Yan-Kuin Su:
Linearly shift knapsack public-key cryptosystem. IEEE J. Sel. Areas Commun. 7(4): 534-539 (1989) - [j1]Chi-Sung Laih, Lein Harn, Jau-Yien Lee:
On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. IEEE Trans. Software Eng. 15(9): 1135-1137 (1989) - [c3]Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang:
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. CRYPTO 1989: 286-298 - [c2]Lein Harn, David Huang, Chi-Sung Laih:
Password Authentication Based On Public-Key Distribution Cryptosystem. ICDE 1989: 332-338 - [c1]Chi-Sung Laih, Jau-Yien Lee, Lein Harn, Chin-Hsing Chen:
A New Scheme for ID-Based Cryptosystems and Signature. INFOCOM 1989: 998-1002
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint