Emeritus Professors

雷欽隆 Lei, Chin-Laung

  • Professor, Department of Electrical Engineering, National Taiwan University
  • Ph.D. University of Texas at Austin, 1986
  • B.S. National Taiwan University, 1980
圖片
Publication's top

Major Research Areas

Network Security, Cryptography, Distributed Computing, Internet Technologies, Operating Systems

Research Summary

My research interests include cloud computing, network security, cryptography, distributed computing, design and analysis of algorithms, enabling technologies for e-commerce, privacy protection, and digital right management. Currently, my research is focus on cloud computing and network security.

To achieve both security and efficiency, we develop a user efficient blind signature scheme for digital cash and electronic voting services. By adopting this scheme, only several modular multiplications are required for a user to obtain and verify a digital signature, a digital cash, or an electronic vote. Compared with the blind signature schemes in the literatures, the computation overheads of users are greatly reduced by mire than 99% in our scheme. Furthermore, the proposed method not only copes with the unlimited growth problem of the network banks' databases but also resolves the possible misuse problem of the unlinkability property such as to launder money or to safely get a ransom. In addition, different payment mechanisms are needed for different types of transactions, we design several advanced digital cash services such as information attachable digital cash, divisible electronic cash, and anonymous rewarding services. By using these techniques, clients can obtain efficient and diversified financial services from the servers.

    Chin-Laung Lei received his B.S. degree in Electrical Engineering from National Taiwan University in 1980, and his Ph.D. degree in Computer Science from the University of Texas at Austin in 1986. From 1986 to 1988, he was an assistant professor in the Computer and Information Science Department at the Ohio State University, Columbus, Ohio, U.S.A. In 1988 he joined the faculty of the Department of Electrical Engineering, National Taiwan University, where he is now a professor. His current research interests include computer and network security, cryptography, parallel and distributed processing, design and analysis of algorithms, and operating system design. Dr. Lei has published over 200 technical articles in scientific journals and conference proceedings, and he is a co-winner of the first IEEE LICS test-of-time award. He was the vice president of the Chinese Cryptology and Information Security Association from 2006 to 2012. He is also a member of International Association for Cryptologic Research and the Institute of Electrical and Electronics Engineers.

     

     

     

     

     

top

Journal articles & book chapters

1. 1. Chih-Fan Hsu, Yu-Shuen Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Look at Me! Correcting Eye Gaze in Live Video Communication” , ACM Transactions on Multimedia Computing Communications and Applications , 2019

2. 2. Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho and Chuan-Ju Wang, “Assessing the profitability of timely opening range breakout breakout on index futures markets” , IEEE Access , Vol. Vol. 7, Issue 1, , 32061-32071, 2019

3. Po-Wen Chi, and Chin-Luang Lei,, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption” , IEEE Transactions on Cloud Computing, accepted , Vol. Vol. 6, Issue 2 , 414-427, Jun. 2018

4. Ming-Hung Wang and Chin-Laung Lei, “SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events” , Journal of Information Science and Engineering , Vol. Vol. 34, No. 6 , 1579-1598, 2018

5. 5. Hong-Bin Tsai and Chin-Laung Lei, “Time-Shift Replacement Algorithm for Main Memory Performance Optimization” , Journal of Supercomputing , Vol. Vol. 74, No. 6 , 2729-2746, 2018

6. 6. Chien-Ting Kuo, Po-Wen Chi, Victor Chang, and Chin-Laung Lei, “SFaaS: Keeping an Eye on IoT Fusion Environment with Security Fusion as a Service” , Future Generation Computer Systems , Vol. Vol. 86 , 1424-1436, 2018

7. 7. Yi-Cheng Tsai, Chuan-Ju Wang, William Cheung, Chung-Shu Wu, Jan-Ming Ho, and Chin-Laung Lei,, “Exploring the Persistent Behavior of Financial Markets” , Finance Research Letters , Vol. Vol. 24 , 199-220, 2018

8. 9. Ming-Hung Wang, Lung-Wen Chen, Po-Wen Chi, and Chin-Laung Lei, “SDUDP: A Reliable UDP-based Transmission Protocol over SDN” , IEEE Access , Vol. Volume 5, Issue 1 , 5904-5916, Dec. 2017

9. 10. Yen-Hwa Liao, Chin-Laung Lei, Ying-I Ko, Yu-Shian Chen, and Chien-Hua Chiu, “Enhanced Tame-based Key Predistribution Scheme for Sensor Networks” , Journal of Internet Technology , Vol. Vol. 18, No, 7 , 1499-1514, Dec. 2017

10. 11. Hung-Jr Shiu, Bor-Shing Lin, and Chin-Laung Lei, “Privacy Preserving of Online Digital Physiological Signals using Reversible Steganography” , Computer Methods and Programs in Biomedicine , Vol. Volume 151 , 159-170, Nov. 2017

11. 12. Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan” , The Computer Journal , Vol. Volume 60, Issue 11 , 1675-1686, Nov. 2017

12. 13. Ming-Hung Wang, Han-Chi Wang, and Chin-Laung Lei,, “Automatic Test Pattern Generator for Fuzzing Based on Finite State Machines” , Security and Communication Networks , Vol. vol. 2017 , Nov. 2017

13. 14. Hung-Jr Shiu, Bor-Shing Lin, Chia-Wei Cheng, Chien-Hung Huang, and Chin-Laung Lei, “High Capacity Information Protection of Synthesized Pitches using Amplitude Enhancement-A New Vision of Acoustic Steganography” , Symmetry , Vol. Vol. 9, No.6 , Jun. 2017

14. He-Ming Ruan, and Chin-Laung Lei,, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss” , Engineering Science & Technology Bulletin , Vol. No. 145 , pp. 45-47-, Apr. 2015

15. Yi-Cheng Tsai, Chin-Laung Lei, Jan-Ming Ho, Ming-Yang Kao, and Szu-Lang Liao, “Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing” , Journal of Information Science and Engineering , Vol. Vol. 31. No. 3 , pp. 925-942-, May 2015

16. Jing-Kai Lou, Fu-Min Wang, Chin-Hua Tsai, San-Chuan Hung, Perng-Hwa Kung, Shou-De Lin, Kuan-Ta Chen and Chin-Laung Lei, “A Social Diffusion Model with an Application on Election Simulation” , The Scientific World Journal , Vol. Volume 2014, Article ID 180590, 14 pages , Jan. 2014

17. H. J. Shiu, S. Y. Tang, C. H. Huang, R .C. T. Lee, and C. L. Lei, “A Reversible Acoustic Data Hiding Method Based on Analog Modulation” , Information Sciences , Vol. Volume 273 , pp. 233–246-, Jul. 2014

18. Yu-Shian Chen, He-Ming Ruan, and Chin-Laung Lei, “Stratus: Check and Share Encrypted Data among Heterogeneous Cloud Storage” , Journal of Internet Technology , Vol. Vol. 15, No. 6 , pp. 999-1011-, Nov. 2014

19. Yu-Shian Chen, and Chin-Laung Lei, “Aggregate Message Authentication Codes (AMACs) with On-the-fly Verification” , International Journal of Information Security , Vol. Vol. 12, No. 6, , pp. 495-504-, Nov. 2013

20. Chien-Hua Chiu and Chin-Laung Lei, “EtherAgent: Scaling Ethernet for Enterprise and Campus Networks” , International Journal of Innovative Computing, Information and Control , Vol. Vol. 9, No. 6 , pp. 2465-2483-, Jun. 2013

21. Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, and Chin-Laung Lei, “An Adaptive Sector-Based Routing Model over Structured Peer-to-Peer Networks” , Computer Networks , Vol. Volume 57, Issue 4 , pp. 887–896-, Mar. 2013

22. Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks” , International Journal of Innovative Computing, Information and Control , Vol. Vol. 9, No. 6 , pp. 2261-2282-, Jun. 2013

23. Jiunn-Jye Lee, Li-Yuan Lee and Chin-Laung Lei, “Aura: An Anonymous Universal Relay Architecture over Structured Peer-To-Peer Networks” , International Journal of Innovative Computing, Information and Control , Vol. Vol. 9, No. 6 , pp. 2327-2346-, Jun. 2013

24. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework” , IEEE Transactions on Multimedia , Vol. Vol. 15, No. 5 , pp. 1121-1137-, Aug. 2013

25. Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks” , International Journal of Innovative Computing, Information and Control , Vol. Vol. 9, No. 6 , pp. 2261-2282-, Jun. 2013

26. Yun-Hsin Chuang, Yuh-Min Tseng and Chin-Laung Lei, “Efficient Mutual Authentication And Key Agreement With User Anonymity For Roaming Services In Global Mobility Networks” , International Journal of Innovative Computing, Information and Control , Vol. Vol. 8, No. 9 , pp. 6415-6427-, Sep. 2012

27. Chien-Hua Chiu and Chin-Laung Lei, “A Decentralized Clustering Scheme for Transparent Mode Devices” , Journal of Clustering Computing , Vol. Volume 15, Issue 3 , 265-279, Sep. 2012

28. Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimension” , IEEE Network , Vol. Volume: 26, Issue: 4 , pp. 25-31-, Aug. 2012

29. Yun-Peng Chiu, Chun-Ying Huang and Chin-Laung Lei, “SEMPRE: Secure Multicast Architecture Using Proxy Re-Encryptio” , International Journal of Innovative Computing, Information and Control , Vol. Volume 8, Number 7(A) , pp. 4719-4748-, Jul. 2012

30. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks” , International Journal of Innovative Computing, Information and Control , Vol. Volume 8, Number 2 , pp. 1001-1024-, Feb. 2012

31. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity” , Journal of Computer and System Sciences , Vol. Volume 77, Issue 4 , pp. 790-798-, Jul. 2011

32. 13. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for CAPTCHA Usability Evaluation” , ACM Computer in Entertainment , Vol. Volume 9 Issue 1 , pp. 3-1~3-14-, Apr. 2011

33. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key” , Computer Communications , Vol. Vol. 34 , pp. 274-280-, Jan. 2011

34. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Smart Card-based Secure Web Services in the Three-party Setting” , International Journal of Innovative Computing, Information and Control , Vol. Vol. 6, No. 11 , pp. 5259-5274-, Nov. 2010

35. Kuan-Ta Chen, Chi-Jui Chang, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment” , IEEE Network , Vol. Vol. 24, No. 2 , pp.28-35-, Mar. 2010

36. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings” , International Journal of Innovative Computing Information and Control , Vol. Vol. 6, No. 2 , pp. 763-772-, Feb. 2010

37. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems” , International Journal of Ad Hoc and Ubiquitous Computing , Vol. Vol. 6, No. 3 , pp. 183-190-, Jan. 2010

38. Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, and Chin-Laung Lei, “Fair anonymous rewarding based on electronic cash” , Journal of Systems and Software , Vol. Volume 82 Issue 7 , pp. 1168-1176-, Jul. 2009

39. Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “A Robust Authentication Scheme with User Anonymity for Wireless Environments” , International Journal of Innovative Computing, Information and Control , Vol. Vol. 5, No. 4 , pp. 1069-1080-, Apr. 2009

40. Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “User Authentication Scheme with Privacy-preservation for Multi-server Environment” , IEEE Communications Letters , Vol. Vol. 13, No. 2 , pp, 157-159-, Feb. 2009

41. Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Hao-Hua Chu, Chin-Laung Lei and Wen-Chin Chen, “Identifying MMORPG Bots: A Traffic Analysis Approach” , EURASIP Journal on Advances in Signal Processing , Vol. Volume 2009 , Jan. 2009

42. Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “Effect of Network Quality on Player Departure Behavior in Online Games” , IEEE Transactions on Parallel and Distributed Systems , Vol. Vol. 20, No. 5 , pp. 593-606-, May 2009

43. Chen-Chi Wu, Kuan-Ta Chen, Chih-Ming Chen, Polly Huang, and Chin-Laung Lei, “On the Challenges and Designs of Transport Protocols for MMORPGs” , Multimedia Tools and Applications , Vol. Vol. 45 , pp. 7-32-, Jan. 2009

44. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions” , International Journal of Security and Its Applications , Vol. Vol. 2, No. 4 , pp. 49-56-, Oct. 2008

45. Te-Yuan Huang, Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “A Generalizable Methodology for Quantifying User Satisfaction” , IEICE Transactions on Communications , Vol. 91-B(5) , 1260-1268-, May 2008

46. Yu-Shian Chen, Hsu-Chun Hsiao, and Chin-Laung Lei, “A Survey of Secure Data Aggregation on Sensor Networks” , Communications of CCISA , Vol. Vol. 13, No. 4 , pp. 17-28-, Oct. 2007

47. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, and Chin-Laung Lei, “Secure Multicast in Dynamic Environments” , Computer Networks , Vol. Volume 51, Issue 10 , pp. 2805--2817-, Jul. 2007

48. Pan-Lung Tsai, and Chin-Laung Lei, “Analysis and Evaluation of a Multiple Gateway Traffic-Distribution Scheme for Gateway Clusters” , Computer Communications , Vol. Vol. 29, Issue 16 , pp. 3170-3181-, Dec. 2006

49. Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “How sensitive are online gamers to network quality?” , Communications of the ACM , Vol. Vol. 49, Issue 11 , pp. 34-38-, Nov. 2006

50. K. T. Chen, P. Huang, and C. L. Le, “Game Traffic Analysis: An MMORPG Perspective” , Computer Networks , Vol. Vol. 50, No. 16 , pp. 3002-3023-, Jan. 2006

51. C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains” , International Journal of Computers and Applications , Vol. Volume 26, Issue 1, , pp. 1-9,-, Jan. 2004

52. C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan, “An Efficient and Anonymous Buyer-Seller Watermarking Protocol” , IEEE Transactions on Image Processing, , Vol. Vol. 13 , No. 12 , pp. 1618 - 1626,-, Jan. 2004

53. W. S. Juang, C. L. Lei, and H. T. Liaw, “Privacy and Anonymity Protection wit Blind Threshold Signatures” , International Journal of Electronic Commerce , Vol. Vol. 7, No. 2 , pp. 145-159-, Jan. 2003

54. C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm” , Journal of Information Science and Engineering , Vol. Vol. 18 , pp. 23-39-, Jan. 2002

55. C. I. Fan, and C. L. Lei, “An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections” , Journal of Network and Computer Applications , Vol. Vol. 25, No. 2 , pp. 93-107-, Jan. 2002

56. T. H. Yeh, C. M. Kuo, C. L. Lei, and H. C. Yen, “Distributed and On-Line Routing on Tori” , Algorithmica , Vol. Vol. 32, No. 4 , pp. 562-593-, Jan. 2002

57. W. S. Juang, C. L. Lei, and H. T. Liaw, “A Verifiable Multi-Authorities Secret Election Allowing Abstaining from Voting” , The Computer Journal , Vol. Vol. 45, No. 6 , pp. 672-682-, Jan. 2002

58. C. I. Fan, and C. L. Lei, “A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash” , Journal of Information Science and Engineering , Vol. Vol. 18 , pp. 47-58-, Jan. 2002

59. C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains” , International Journal of Computers and Application , Vol. Vol. 24, Issue 3 , Jan. 2002

60. T. H. Yeh, and C. L. Lei, “Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes” , IEICE Trans. on Information and Systems , Vol. Vol. E84-D, No.1 , pp. 65-75-, Jan. 2001

61. W. S. Juang, C. L. Lei, and H. T. Liaw, “Fair Blind Threshold Signatures Based on Discrete Logarithms” , Computer Systems – Science and Engineering , Vol. Vol. 16, No. 6 , pp. 371-379-, Jan. 2001

62. C. I. Fan, and C. L. Lei,, “Cryptanalysis on improved user efficient blind signatures” , IEE Electronics Letters , Vol. Vol.37, No.10 , pp.630-631-, Jan. 2001

63. Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Fully Distributed Approach to Repositories of Reusable Components” , Journal of Information Science and Engineering , Vol. Vol. 17, No. 1 , pp. 147-158-, Jan. 2001

64. H. J. Chen, C. L. Lei, and P. L. Yu, “Fairness in E-cash Systems” , Information Security Newsletter , Vol. Vol. 7, No. 4 , pp. 82-95-, Jan. 2001

65. C. L. Lei, and C. E. Yin, “Smart Card Payment Today and Tomorrow” , Information Security Newsletter , Vol. Vol. 7, No. 4 , pp. 46-60-, Jan. 2001

66. Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Naming, Storage, and Retrieval Model for Software Assets” , IEICE Trans. on Information and Systems , Vol. Vol. E83-D, No. 4 , pp. 789-796-, Jan. 2000

67. A. Lai, C. L. Lei, and H. H. Chiou, “A False-Sharing Free Distributed Shared Memory Management Scheme” , IEICE Trans. on Information and Systems , Vol. Vol. E83-D, No. 4 , pp. 777-788-, Jan. 2000

68. W. S. Juang, C. L. Lei, and C. Y. Chang, “Anonymous Channel and Authentication in Wireless Communications” , Computer Communications , Vol. Vol. 22, No. 15-16 , pp. 1502-1511-, Jan. 1999

69. W. S. Juang, and C. L. Lei, “Partially Blind Threshold Signatures Based on Discrete Logarithms” , Computer Communications , Vol. Vol. 22, No. 1 , pp. 73-86-, Jan. 1999

top

Conference & proceeding papers:

1. Ming-Hung Wang, Meng-Han Tsai, Wei-Chieh Yang, and Chin-Laung Lei, “Infection Categorization Using Deep Autoencoder” , IEEE INFOCOM’18 Demo Session , Honolulu, HI, USA , Apr. 2018

2. Chih-Fan Hsu, Yu-Cheng Chen, Yu-Shuen Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Realizing the Real-time Gaze Redirection System with Convolutional Neural Network” , ACM Multimedia Systems Conference , Amsterdam, The Netherland , Jun. 2018

3. Meng-Han Tsai, Ming-Hung Wang, Wei-Chieh Yang, and Chin-Laung Lei,, “Uncovering Internal Threats Based on Open-source Intelligence” , International Computer Symposium , Yunlin, Taiwan , Dec. 2018

4. Albert Guan and Chin-Laung Lei, “Efficient Key Agreement Protocol for Smart Sensors” , IEEE Conference on Dependable an , Kaohsiung, Taiwan , Dec. 2018

5. Hong-Bin Tsai and Chin-Laung Lei, “A Page Replacement Algorithm Based on Frequency Derived From Reference History” , ACM SIGAPP Symposium On Applied Computing , Marrakesh, Morocco , Apr. 2017

6. 12. Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Temporal Dynamics of On-Line Political Ideology: Longitudinal Study on Facebook” , Annual Conference of the European Political Science Association , Milan, Italy , Jun. 2017

7. 11. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Toward High Throughput Backend Provision for Mobile Apps with a Microservice Approach” , International Conferance on Internet Computing and Internet of Things , Las Vegas, USA. , Jul. 2017

8. 10. Chien-Ting Kuo, Victor Chang, and Chin-Laung Lei,, “A Feasibility Analysis for Edge Computing Fusion in LPWA IoT Environment with SDN Structure” , InternationaWorkshop on Data Analytics and Emerging Services , Antalya, Turkey , Aug. 2017

9. 9. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang and Chin-Laung Lei, “Data Hiding on Social Media Communications Using Text Steganography” , International Conference on Risks and Security of Internet and System , Dinard, France , Sep. 2017

10. 8. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Wei-Chou Lai, Chien-Hung Huang and Chin-Laung Lei, “A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones” , Euro-China Conference on Intelligent Data Analysis and Application , Málaga, Spain , Oct. 2017

11. 7. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend System” , IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies , Amman, Jordan , Oct. 2017

12. 6. Chih-Fan Hsu, Anthony Chen, Cheng-Hsin Hsu, Chun-Ying Huang, Kuan-Ta Chen and Chin-Laung Lei, “Is Foveated Rendering Perceivable? A Study on the Efficiency and Consistency of Subjective Assessment Methods” , ACM Multimedia , Mountain View, CA USA. , Oct. 2017

13. Hong-Bin Tsai and Chin-Laung Lei, “CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network” , National Computer Symposium , Hualien, Taiwan , Dec. 2017

14. 17. Ming-Hung Wang, Po-Wen Chi, Jing-Wei Guoy, and Chin-Laung Lei,, “DN Storage: A Stream-based Storage System over Software-defined Networks” , IEEE International Conference on Computer Communications , San Francisco, CA, USA. , Apr. 2016

15. 16. Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei and Nen-Fu Huang, “SDNort: A Software Defined Network Testing Framework Using Openflow” , 11th Asia Joint Conference on Information Security , Fukuoka, Japan , Aug. 2016

16. 15. Ming-Hung Wang, Ting-Chieh Lai, Han-Chi Wang, Lung-Wen Chen, Chin-Wei Tien, Jian-Wei Liao and Chin-Laung Lei, “Investigating Vulnerabilities of HTML5 and HTTP/2.0 Websites Using Fuzzing” , Taiwan Academic Network Conference , Hualian, Taiwan , Oct. 2016

17. 14. Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, and Chin-Laung Lei,, “SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-enabled Networks” , International Computer Symposium , Chiayi, Taiwan , Dec. 2016

18. Ming-Hung Wang and Chin-Laung Lei, “Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums” , the 13th Annual IEEE Consumer Communications & Networking Conference , Las Vegas, USA. , Jan. 2016

19. Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, and Chin-Laung Lei, “How to Detect a Compromised SDN Switch” , IEEE Conference on Network Softwarization, Workshop on Security issues in SDN , London, U.K. , Apr. 2015

20. He-Ming Ruan, Ming-Hwa Tsai, Yen-Nun Huang, Yen-Hua Liao and Chin-Laung Lei, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss” , the 10th Asia Joint Conference on Information Security (Recipient of the Best Paper Award) , Kaohsiung, Taiwan , May 2015

21. Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Efficient NFV Deployment in Data Center Networks” , IEEE ICC 2015 - Next Generation Networking Symposium , London, UK. , Jun. 2015

22. Ming-Hung Wang and Chin-Laung Lei, “Modelling Articles Polarity and Identifying Influential Authors through Social Movements” , IEEE International Conference on Systems, Man, and Cybernetics , Hong Kong , Oct. 2015

23. Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, and Jan-Ming Ho, “Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA” , the 10th Annual Conference of the Asia-Pacific Association of Derivatives , Busan, Korea , Aug. 2014

24. He-Ming Ruan, and Chin-Laung Lei, “Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage” , The 9th Asia Joint Conference on Information Security , Wuhan, China. , Sep. 2014

25. Ming-Hung Wang, and Chin-Laung Lei,, “Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies” , ICS 2014 , Taichung Taiwan , Dec. 2014

26. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line” , Workshop on Cryptography and Information Security, ICS 2014 (Recipient of the Best Poster Award) , Taichung Taiwan , Dec. 2014

27. He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure” , Workshop on Cryptography and Information Security, ICS 2014 , Taichung Taiwan , Dec. 2014

28. Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “An AMI Threat Detection Mechanism Based on SDN Networks” , The Eighth International Conference on Emerging Security Information, Systems and Technologies , Lisbon, Portugal , Nov. 2014

29. Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Give Me a Broadcast-Free Network” , Globecom 2014 - Next Generation Networking Symposium , Austin, Texas, USA. , Dec. 2014

30. He-Ming Ruan, Yun-Hsin Chuang, and Chin-Laung Lei, “Access Control over Vulnerable Devices in Advanced Metering Infrastructure” , National Computer Symposium , Taichung, Taiwan. , Dec. 2013

31. Ming-Hung Wang, Kuan-Ta Chen, Shuo-Yang Wang, and Chin-Laung Lei, “Understanding Potential Microtask Workers for Paid Crowdsourcing” , Conference on Human Computation & Crowdsourcing , Palm Springs, California USA. , Nov. 2013

32. He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Security Event Handling Framework For Advanced Metering Infrastructure” , International Conference on Applied and Theoretical Information Systems Research , Taipei, Taiwan. , Nov. 2013

33. Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei and Kuan-Ta Chen, “Gender Swapping and User Behaviors in Online Social Games” , The 22nd International World Wide Web Conference (WWW2013) , Rio de Janeiro, Brazil , May 2013

34. Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach” , IGCVP 2013 , Ilan, Taiwan , Aug. 2013

35. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing” , International Computer Symposium, Advances in Intelligent Systems and Applications, Vol. 2 , Hualien, Taiwan , Dec. 2012

36. Christine Peijinn Chai, He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Yun-Hsin Chuang, Chin-Laung Lei, Chun-Ying Huang, Chi-Wen Teng, Yuh-Sheng Shaw and Minsiong Liang, “A Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure” , The 2nd. International Conference on Applied and Theoretical Information Systems Research , Taipei, Taiwan , Dec. 2012

37. Jing-Kai Lou, Kuan-Ta Chen, Hwai-Jung Hsu, and Chin-Laung Lei, “Foretelling Online Game Addictveness” , 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) , Venice, Italy , Nov. 2012

38. Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach” , 2012 International Workshop on Network and Systems Support for Games (NetGames 2012) , Venice, Italy , Nov. 2012

39. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “An Analysis of Security Patch Lifecycle Using Google Trend Tool” , 7th Asia Joint Conference on Information Security , Tokyo, Japan , Aug. 2012

40. He-Ming Ruan, Yu-Shian Chen and Chin-Laung Lei, “Data Integrity on Remote Storage for On-line Co-working” , 7th Asia Joint Conference on Information Security , Tokyo, Japan , Aug. 2012

41. He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Enabling Efficient Batch Verification on Data Integrity for Remote Storage” , The 13th International Conference on Internet Computing , Las Vegas, USA , Jul. 2012

42. Yi-Cheng Tsai, Zheng-Hui Chen, Jan-Ming Ho, Ming-Yang Kao, Chin-Laung Lei, and Szu-Lang Liao, “Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value” , IEEE Computational Intelligence , New York City, USA , Mar. 2012

43. Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying Huang, and Chin-Laung Lei, “Measuring the latency of cloud gaming systems” , ACM international conference on Multimedi , Scottsdale, Arizona, USA , Dec. 2011

44. Ren-Chiun Wang, Chun-Han Tung, and Chin-Laung Lei, “An Efficient Conference-Key Agreement Protocol for Mobile Devices” , National Computer Symposium , Chayi, Taiwan , Dec. 2011

45. Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Sen-Jeng Chen, “A Mechanism on Risk Analysis of Information Security with Dynamic Assessment” , 3rd International Workshop on Managing Insider Security Threats , Fukuoka, Japan , Nov. 2011

46. He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Christine Peijinn Chai, Chun-Ying Huang and Chin-Laung Lei, “Security Threats in Advanced Metering Infrastructure” , The 6th Joint Workshop on Information Security , Kaohsiung, Taiwan , Oct. 2011

47. Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Shih-Jen Chen, “AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security” , The 6th Joint Workshop on Information Security , Kaohsiung, Taiwan , Oct. 2011

48. Yu-Chun Chang, Kuan-Ta Chen, Po-Han Tseng, and Chin-Laung Lei, “Understanding the Performance of Thin-Client Gaming” , 2011 Annual IEEE Communications Quality and Reliability (CQR) International Workshop , Naples, Florida, USA , May 2011

49. He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework for Electronic Anonymous Auctions” , International Conference on Information Security , Hangchou, China , Apr. 2011

50. Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework” , ACM Multimedia Systems Conference (MMSys 2011) , San Jose, U.S.A. , Feb. 2011

51. Yeng-Ting Lee, Kuan-Ta Chen, Yun-Maw Cheng, and Chin-Laung Lei, “World of Warcraft Avatar History Dataset” , ACM Multimedia Systems Conferene , San Jose, U.S.A , Feb. 2011

52. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests” , 7th ACM International Conference on Advances in Computer Entertainment Technology , Taipei, Taiwan , Nov. 2010

53. Chia-Chang Hsu, and Chin-Laung Lei, “A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc Networks” , 8th ACM International Symposium on Mobility Management and Wireless Access , Bodrum, Turkey , Oct. 2010

54. Jing-Kai Lou, Shou-de Lin, Kuan-Ta Chen, and Chin-Laung Lei, “What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information” , The 2010 International Conference on Advances in Social Networks Analysis and Mining , Odense, Denmark , Aug. 2010

55. Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimensions” , 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop , Vancouver, British Columbia, Canada. , Jun. 2010

56. Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chien-Ju Ho, and Chin-Laung Lei, “Online Game QoE Evaluation using Paired Comparisons” , 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop , Vancouver, British Columbia, Canada , Jun. 2010

57. Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework Intimating Conventional Anonymous Auctions” , the 20th Cryptology & Information Security Conference , Hsinchu, Taiwan , May 2010

58. Yu-Shian Chen, and Chin-Laung Lei, “Filtering False Messages En-route in Wireless Multi-hop Networks” , IEEE Wireless Communications and Networking Conference , Sydney, Australia , Apr. 2010

59. Yen-Hua Liao, Chin-Laung Lei, and Wen-Chi Tsai, “A Robust Grid-based Key Predistribution Scheme for Sensor Networks” , Fourth International Conference on Innovative Computing, Information and Control , Kaohsiung, Taiwan , Dec. 2009

60. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems” , Workshop on Mobile Computing and Wireless Communication, NCS2009 (Recipient of the Excellent Paper Award) , Taipei, Taiwan , Nov. 2009

61. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks” , IEEE Global Communications Conference 2009 (GLOBECOM'09) , Hawaii USA , Nov. 2009

62. Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “A Crowdsourceable QoE Evaluation Methodology for Multimedia Content” , ACM Multimedia 2009 , Beijing, China , Oct. 2009

63. Chia-Chang Hsu, and Chin-Laung Lei, “A Geographic Scheme with Location Update for Ad Hoc Routing” , International Conference on Systems and Networks Communications (Recipient of the Best Paper Award) , Porto, Portugal , Sep. 2009

64. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “A Robust Hypercube-based Pairwise Key Establishment for Sensor Networks” , The 4th Joint Workshop on Information Security , Kaohsiung, Taiwan , Aug. 2009

65. Powen Chi, and Chin-Laung Lei, “A Prevention Approach to Scrambling Attack in WiMAX Networks” , The 10th IEEE International Symposium on a World of Wireless, Mobile and Multmedia Networks , Kos, Greece , Jul. 2009

66. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger” , The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video , Williamsburg, Virginia, USA , Jul. 2009

67. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Peer-to-Peer Application Recognition Based on Signaling Activity” , IEEE International Conference on Communications (ICC) , Dresden, Germany , Jun. 2009

68. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Security Enhancement for Two User Identification Schemes with Anonymity against Active Attacks” , the 19th Cryptology & Information Security Conference , Taipei, Taiwan , Jun. 2009

69. Jing-Kai Lou, Kuan-Ta Chen, and Chin-Laung Lei, “A Collusion-Resistant Automation Scheme for Social Moderation Systems” , the 6th annual IEEE Consumer Communications and Networking Conference , Las Vegas, Nevada, USA , Jan. 2009

70. Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, and Chin-Laung Lei, “Inferring Speech Activity from Encrypted Skype Traffic” , IEEE Global Telecommunications Conference, 2008 (GLOBECOM'08 , New Orleans, USA , Dec. 2008

71. Jiunn-Jye Lee, Hann-Huei Chiou, Yu-Sheng Yang, Yu-Cheng Su, and Chin-Laung Lei, “A Sector-Based Routing Model over Structured Peer-to-Peer Networks” , International Workshop on Wireless Technologies for Smart Homes , Ilan, Taiwan. , Sep. 2008

72. Li Chen, Chia-Chang Hsu, and Chin-Laung Lei, “A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks” , International Workshop on Wireless Technologies for Smart Homes , Ilan, Taiwan , Sep. 2008

73. Cheng-Chun Tu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “OneClick: A Framework for Capturing Users Network Experiences” , ACM SIGCOMM 2008 (poster) , Seattle, USA , Aug. 2008

74. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting Peer-to-Peer Activity by Signaling Packets” , ACM SIGCOMM 2008 (poster) , Seattle, USA , Aug. 2008

75. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings” , The 3rd Joint Workshop on Information Security , Seoul, Korea , Jul. 2008

76. Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Lightweight Broadcast Authentication for Multiple Senders in Sensor Networks” , The 3rd Joint Workshop on Information Security , Seoul, Korea , Jul. 2008

77. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting VoIP Traffic Based on Human Conversation Patterns” , IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications , Heidelberg, Germany , Jul. 2008

78. Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Broadcast Authentication in Sensor Networks using Compressed Bloom Filters” , the 4th IEEE International Conference on Distributed Computing in Sensor Systems , Santorini Island, Greece , Jun. 2008

79. 12. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions” , the 2nd International Conference on Information Security and Assurance , Busan, Korea , Apr. 2008

80. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “An Anonymous and Deniable Conversation for a Thin Client” , Fourth International Symposium on Frontiers in Networking with Applications (FINA2008) , Ginowan city, Okinawa , Mar. 2008

81. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem” , The Third International Symposium on Security in Ubiquitous Computing , Taipei, Taiwan , Dec. 2007

82. Li Yuan Lee, Jiunn Jye Lee, and Chin-Laung Lei, “A Universal Anonymous System for Structured Peer-to-Peer Networks” , IEEE TENCON 2007 , Taipei, Taiwan. , Oct. 2007

83. Chien-Hua Chiu, and Chin-Laung Lei, “A High-Performance Clustering Scheme with Application in Network Intrusion Prevention System” , the 7th IEEE International Symposium on Communications and Information Technologies , Sydney, Australia , Oct. 2007

84. Chun-Ying Huang, and Chin-Laung Lei, “Bounding Peer-to-Peer Upload Traffic in Client Networks” , 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007) , Edinburgh, UK , Jun. 2007

85. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments” , 2007 International Conference on Multimedia and Ubiquitous Engineering , Seoul, Korea , Apr. 2007

86. Jiunn-Jye Lee, Chun-Ying Huang, and Chin-Laung Lei, “Design and Implementation of Secure Communication Channels over UPnP Networks” , 2007 International Conference on Multimedia and Ubiquitous Engineering , Seoul, Korea. , Apr. 2007

87. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei,, “Quantifying Skype User Satisfaction” , ACM SIGCOMM 2006 , Pisa, Italy , Sep. 2006

88. Kuan-Ta Chen, and Chin-Laung Lei, “Network Game Design: Hints and Implications of Player Interaction” , NetGames 2006 , Singapore. , Oct. 2006

89. Yu-Shian Chen, Chin-Laung Lei, Yu-Peng Chiu, and Chun-Ying Huang, “Confessible Threshold Ring Signatures” , International Conference on Systems and Networks Communications (ICSNC 2006) , Tahiti, French Polynesia. , Oct. 2006

90. Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, and Chin-Laung Lei, “Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering” , International Conference on Systems and Networks Communications (ICSNC 2006) , Tahiti, French Polynesia. , Oct. 2006

91. Kuan-Ta Chen, and Chin-Laung Lei, “Design Implications of Social Interaction for Online Games” , IFIP 5th International Conference on Entertainment Computing (ICEC 2006) , Cambridge, UK , Sep. 2006

92. C. Y. Huang, K. T. Chen, and C. L. Lei,, “Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter” , 2006 International Conference on Dependable Systems and Networks (DSN-2006) , Philadelphia, PA, USA , Jun. 2006

93. C. Y. Huang, Y. P. Chiu, K. T. Chen, and C. L. Lei,, “A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography” , to appear in ACM Symposium on InformAtion, Computer and Communications Security , Taipei , Mar. 2006

94. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei, “On the Sensitivity of Online Game Playing Time to Network QoS” , to appear in the 25th Conference on Computer Communications (IEEE INFOCOM 2006) , Barcelona, Spain , Apr. 2006

95. J. H. Kuo, S. U. Te, P. T. Liao, C. Y. Huang, P. L. Tsai, C. L. Lei, Sy-Yen Kuo, Y. Huang, and Z. Tsai,, “An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing” , The 11th IEEE International Symposium Pacific Rim Dependable Computing (PRDC 05) , Changsha, China , Dec. 2005

96. P. L. Tsai, C. Y. Huang, Y. Y. Huang, C. C. Hsu, and C. L. Lei, “A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks\” , the 12th Annual IEEE International Conference on High Performance Computing , Goa, India , Dec. 2005

97. H. H. Chiou, P. L. Tsai, J. J. Lee, H. F. Tung, and C. L. Lei, “Extending Cluster File Systems beyond Last Miles” , IEEE TENCON’05, , Melbourne, Australia , Nov. 2005

98. C. Y. Huang, Y. P. Chiu, K. T. Chen, H. H. Chiou, and C. L. Lei, “Secure Content Delivery using Key Composition,”” , 30th Annual IEEE Conference on Local Computer Networks , Sydney, Australia , Nov. 2005

99. C. L. Chang, Y. P. Chiu and C. L. Lei, “Automatic Generation of Conflict-Free IPSec Policies” , International Conference on Formal Techniques for Networked and Distributed Systems , Taipei, , Oct. 2005

100. J. J Lee, P. L. Tsai, and C. L. Lei, “An On-Line Page-Structure Approximation Scheme for Web Proxies” , IEEE Distributed, Parallel and Network Applications , Fukuoka, Japan , Jul. 2005

101. C. L. Lei, P. W. Chi, and Y. P. Chiu, “A CRT-Based Key Pre-distribution Scheme for Sensor Networks” , the 15th Conference on Information Security, , May 2005

102. Y. P. Chiu, C. L. Lei, and C. Y. Huang, “Secure Multicast Using Proxy Encryption” , the Seventh International Conference on Information and Communications Security , Beijing, China , Jan. 2005

103. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “The Impact of Network Variabilities on TCP Clocking Schemes” , 8th IEEE Global Internet Symposium (in conjunction with IEEE INFOCOM 2005) , Miami, USA , Mar. 2005

104. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “Game Traffic Analysis: An MMORPG Perspective” , 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video , Washington , Jun. 2005

105. P. L. Yu, P. L. Tsai, and C. L. Lei, “A Content-Protection Scheme for Multi-Layered Reselling Structures” , 19th IFIP International Information Security Conference , Aug. 2004

106. P. L. Tsai and C. L. Lei, “A Session Migration Scheme for Smart Web Services in Mobile Computing” , Proceedings of the International Symposium on Web Services and Applications (ISWS '04), , Jun. 2004

107. P. L. Tsai, C. L. Lei, and W. Y. Wang, “A Remote Control Scheme for Ubiquitous Personal Computing” , IEEE International Conference on Networking, Sensing and Control , Jan. 2004

108. C. Y. Huang, and C. L. Lei, “Roundly Router Stamping: Detect and Mitigate DDoS Attacks” , Proceedings of the 14th Conference on Information Security (candidate for best paper) , Jan. 2004

109. Y. P. Chiu, C. L. Lei, and P. L. Yu, “Comments on Improved Proxy Deposit Protocol for E-cash Systems” , Proceedings of the 14th Conference on Information Security , Jan. 2004

110. Y. M. Hsu and C. L. Lei, “On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective” , The fourth Workshop for Management Sciences , Jan. 2003

111. P. L. Yu, C. L. Lei, H. J. Chen and C. Y. Huang, “User Efficient Fair Blind Signatures” , Proceedings of the Second International Workshop for Asia Public Key Infrastructure , Jan. 2003

112. C. L. Lei, “Design and Implementation of a Secure and High Performance Linux-Based Cluster File System” , 2003 International Conference on Open Source , Jan. 2003

113. C. L. Lei and M. H. Chan, “An Efficient Anonymous Buyer-Seller Watermarking Protocol” , 2002 International Computer Symposium, Workshop on Cryptology and Information Security , Jan. 2002

114. C. L. Lei and Y. M. Hsu, “Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos” , 4th Workshop on Cyberspace:Information, Law and Society , Jan. 2002

115. C. L. Lei and Y. M. Hsu, “Building E-marketplaces with Mobile Agents” , The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era , Jan. 2002

116. C. L. Lei and Y. M. Hsu, “Mobile Agents for E-marketplaces in Wireless Networks” , The 13th Workshop on Object Oriented Technology and Application , Jan. 2002

117. W. S. Juang, H. T. Liaw, and C. L. Lei, “A Practical Anonymous Payment Scheme for Electronic Commerce” , The Seventh International Conference on Distributed Multimedia Systems , Jan. 2001

118. P. L. Yu, C. L. Lei, C. I. Fan and H. J. Chen, “A User Efficient Fair E-cash Scheme without On-line Trusted Third Party” , The 2001 International Workshop on Cryptology and Network Security , Jan. 2001

119. C. I. Fan, C. L. Lei, and Y. P. Chiu, “A Fast Blind Signature Scheme” , The 2001 International Workshop on Cryptology and Network Security , Jan. 2001

120. P. L. Tsai, and C. L. Lei, “Towards Ubiquitous Computing via Secure Desktop Service” , IEEE Region 10 International Conference on Electrical and Electronics Technology , Jan. 2001

121. P. L. Yu, and C. L. Lei, “A User Efficient Fair E-cash Scheme with Anonymous Certificates” , IEEE Region 10 International Conference on Electrical and Electronics Technology , Jan. 2001

122. W. S. Juang, H. T. Liaw, C. L. Lei, and P. C. Lin, “Fair Blind Threshold Signatures in Wallet with Observers” , Proceedings of 2001 National Computer Symposium , Jan. 2001

123. L. F. Chen, and C. L. Lei, “A Computer Immune System using Mobile Agents” , Proceedings of the First National Internet Engineering Conference , Jan. 2001

124. W. S. Juang, H. T. Liaw, C. L. Lei, and P. L. Yu, “A Secure and Anonymous Multi-authorties E-cash Scheme” , Proceedings of the 11th Conference on Information Security , Jan. 2001

125. C. I. Fan, C. L. Lei, and Y. P. Chiu, “Comments on Improved User Efficient Blind Signatures” , Proceedings of the 11th Conference on Information Security , Jan. 2001

126. P. L. Yu, and C. L. Lei, “A Proxy Deposit Protocol for E-Cash Systems” , Proceedings of the 11th Conference on Information Security , Jan. 2001

127. H. H. Chiou, I. C. Lai, and C. L. Lei, “Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems” , 20th International Conference on Distributed Computing Systems , Jan. 2000

128. P. L. Yu, C. L. Lei, and L. F. Chen, “An Efficient Inter-Domain Group Key Management Scheme” , 2000 International Computer Symposium, Workshop on Cryptology and Information Security , Jan. 2000

129. S. F. Tsai, C. L. Lei and I. C. Lai, “An Efficient Tree-Based Processor Allocation Scheme for Mesh Connected Systems” , 2000 International Computer Symposium, Workshop on Software Engineering and Database Systems , Jan. 2000

130. C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm” , Proceedings of 1999 National Computer Symposium , Jan. 1999

131. Y. C. Sun, and C. L. Lei, “Skins as a Mechanism for Making Languages Syntactically Extensible” , Proceedings of 1999 National Computer Symposium , Jan. 1999

132. C. I. Fan, and C. L. Lei, “A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process” , Proceedings of 1999 National Computer Symposium , Jan. 1999

133. C. L. Lei, “Issues for Building Virtual Private Networks” , Proceedings of the 1999 Computer & Communications Technologies conference , Jan. 1999

top

Books:

1. Shiuh-Jeng Wang, Chung-Huang Yang, and Chin-Laung Lei, “Computer and Network Security in Practice Applying to High-tech Society” , DrMaster Press Co., Ltd. , 978-986-201-254-3 , 506 , Taiwan, Sep. 2009

2. Tzong-Chen, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee, “Information Security” , LNCS5222, Springer , 978-3-540-85884-3 , 504 , USA, Sep. 2008

3. Wen-Shenq Juang, Sian-Teng Chen and Chin-Laung Lei,, “VoIP Security (in Collected Papers on Information and Communication Security)” , Science & Technology Policy Research and Information Center, National Applied Research Laboratories , 957-619-133-5 , Taiwan, R.O.C., Nov. 2006

4. C. L. Lei, and Chun-I Fan, “The Security of Mobile E-Commerce” , Science and Technology Policy Research and Information Center, NARL , 957-619-124-6 , 158 , Taiwan, R.O.C., Jun. 2005

top

Patents:

1. Yu-Shian Chen and Chin-Laung Lei, “Method for processing and verifying remote dynamic data, system using the same, and computer-readable medium” , 美國專利 US 9378155 B2, Jun. 2016

2. 郭建廷、阮鶴鳴、雷欽隆, “資訊安全稽核管控系統、方法及其電腦可讀取紀錄媒體” , 中華民國專利 發明第 I482047 號, Apr. 2015

3. 陳煜弦、雷欽隆, “遠端動態資料的處理與驗證方法、系統,以及電腦可讀記錄媒體” , 中華民國專利 發明第 I483138 號, Apr. 2015

4. 阮鶴鳴, 雷欽隆, 劉永之, “存取控制系統及其存取控制方法” , 中華民國專利 發明第 I466525 號, Dec. 2014

5. Chin-Laung Lei, Yung-Chih Liu, He-Ming Ruan, “Access Control System and Access Control Method Thereof” , 美國專利 US8909937 B, Sep. 2014

6. Chin-Laung Lei, Yung-Chih Liu, He-Ming Ruan, “Access Control System and Access Control Method Thereof” , 德國專利 DE. 10 2011 088 550 B4, May 2013

7. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “一種定位資訊之情境影像系統” , 中華民國專利 發明第 I 359952 號, Mar. 2012

8. 阮鶴鳴、雷欽隆、劉永之, “存取控制系統及其存取控制方法,” , 中國專利 發明第 1912319號, Dec. 2011

9. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “一種定位資訊之情境影像裝置” , 中華民國專利 第M345243號, Nov. 2008

10. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “影像偵測觸控學習裝置” , 中華民國專利 第M340503號, Sep. 2008

top