Skip to main content
IT for Security
Team
Researchers
Associates
Support Staff
PHD Students
Projects
Ongoing
Upcoming
Finalized
Courses
Defence policy
Security Studies
Cybersecurity
Administration
Management
Economics
Innovations
Themes
all courses
Resources
Publications
IT4Sec Reports
CSDM Views
Presentations
Books
Events
Partners
Contact
Biblio
Export 16 results:
RTF
EndNote XML
Filters:
Author
is
Chin-Chen Chang
[Clear All Filters]
2013
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Chen-Xu Liu
.
"
A Novel Biometric-Based Remote User Authentication Scheme Using Quadratic Residues
."
International Journal of Information and Electronics Engineering
3, no. 4 (2013).
Google Scholar
RTF
EndNote XML
2011
Cheng, Zi-Yao
,
Yun Liu
,
Chin-Chen Chang
, and
Shih-Chang Chang
.
An Improved Protocol for Password Authentication Using Smart Cards
., 2011.
Google Scholar
RTF
EndNote XML
2006
San Lee, Jung-
, and
Chin-Chen Chang
.
"
Choosing t-out-of-n Secrets by Oblivious Transfer
."
Information & Security: An International Journal
18 (2006): 67-84.
DOI
Google Scholar
RTF
EndNote XML
Chang, Chin-Chen
, and
Jung- San Lee
.
"
An Efficient and Secure Remote Authentication Scheme Using Smart Cards
."
Information & Security: An International Journal
18 (2006): 122-133.
DOI
Google Scholar
RTF
EndNote XML
2004
Chang, Ya-Fen
, and
Chin-Chen Chang
.
"
An Efficient and Practical Remote User Authentication Scheme
."
Information & Security: An International Journal
15, no. 1 (2004): 75-88.
DOI
Google Scholar
RTF
EndNote XML
Chan, Chao-Wen
, and
Chin-Chen Chang
.
"
A Novel Lower Cost Crypto-Scheme Based on the Theory of Sharing Secrets
."
Information & Security: An International Journal
15, no. 1 (2004): 89-109.
DOI
Google Scholar
RTF
EndNote XML
2003
Lai, Yeu-Pong
, and
Chin-Chen Chang
.
"
Parallel Computational Algorithms for Generalized Chinese Remainder Theorem
."
Computers and Electrical Engineering
29, no. 8 (2003): 801-811.
Google Scholar
RTF
EndNote XML
Lin, Iuon-Chang
,
Min-Shiang Hwang
, and
Chin-Chen Chang
.
"
Security Enhancement for Anonymous Secure e-Voting over a Network
."
Computer Standards & Interfaces
25, no. 2 (2003): 131-139.
Google Scholar
RTF
EndNote XML
Chang, Chin-Chen
, and
Kuo-Feng Hwang
.
"
Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards
."
Informatica
14, no. 3 (2003): 289-294.
Google Scholar
RTF
EndNote XML
2002
Chang, Chin-Chen
,
Ju Yuan Hsiao
, and
Jyh-Chiang Yeh
.
"
A Colour Image Copyright Protection Scheme based on Visual Cryptography and Discrete Cosine Transform
."
The Imaging Science Journal
(2002): 133-140.
Google Scholar
RTF
EndNote XML
2000
Hwang, Min-Shiang
,
Chin-Chen Chang
, and
Kuo-Feng Hwang
.
"
Digital Watermarking of Images Using Neural Networks
."
Journal of Electronic Imaging
9, no. 4 (2000): 548-555.
Google Scholar
RTF
EndNote XML
Chang, Chin-Chen
,
Min-Shiang Hwang
, and
Kuo-Feng Hwang
.
"
A Digital Watermarking Scheme Using Human Visual Effects
."
Informatica: An International Journal of Computing and Informatics
24, no. 4 (2000): 505-511.
Google Scholar
RTF
EndNote XML
1994
Chang, Chin-Chen
, and
Wen-Yuan Liao
.
"
A Remote Password Authentication Scheme Based upon ElGamal’s Signature Scheme
."
Computers & Security
13, no. 2 (1994): 137-144.
Google Scholar
RTF
EndNote XML
1993
Chang, Chin-Chen
, and
Shin-Jia Hwang
.
"
Using Smart Cards to Authenticate Remote Passwords
."
Computers and Mathematics with Applications
26, no. 7 (1993): 19-27.
Google Scholar
RTF
EndNote XML
1992
Chang, Chin-Chen
, and
C. S. Liah
.
"
Comment on Remote Password Authentication with Smart Cards
."
IEE Proceedings-E
139, no. 4 (1992): 372.
Google Scholar
RTF
EndNote XML
1991
Chang, Chin-Chen
, and
Tzong-Chen Wu
.
"
Remote Password Authentication with Smart Cards
."
IEE Proceedings – Part E
138, no. 3 (1991): 165-168.
Google Scholar
RTF
EndNote XML
English
Български
Search form
Search
Resources
Security policy
Cybersecurity
Intelligence
Law Enforcement
Terrorism
Operations
Technologies & Industry
Personnel management
Acquisition Management
Strategy
Concepts and doctrine
Management
Defence economics
Financial management
Information & knowledge management
Simulation and Training
Change management
Decision-making
Good governance