I-Hsiang Lin, Ph.D. - Publications

Affiliations: 
2004 University of California, Los Angeles, Los Angeles, CA 
Area:
Electromagnetics, guided wave structures, lower-power wireless electronics, integrated passive components in antennas, photonic bandgap structures and metamaterial applications, RF technologies, sensors and transponders

123 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Lin IH, Lu YH, Chen HT. Nitrogen-doped C60 as a robust catalyst for CO oxidation. Journal of Computational Chemistry. PMID 28675479 DOI: 10.1002/jcc.24851  0.32
2016 Lin IH, Lu YH, Chen HT. Nitrogen-doped carbon nanotube as a potential metal-free catalyst for CO oxidation. Physical Chemistry Chemical Physics : Pccp. PMID 27074831 DOI: 10.1039/c6cp00162a  0.32
2016 Chang CC, Su MJ, Lee SJ, Tsai YH, Kuo LY, Lin IH, Huang HL, Yen TH, Chu FY. The Immunotyping Distribution of Serum Monoclonal Paraprotein and Environmental Impact on Multiple Myeloma (MM) and Monoclonal Gammopathy of Uncertain Significance (MGUS) in Taiwan: A Medical Center-Based Experience. Asian Pacific Journal of Cancer Prevention : Apjcp. 17: 395-9. PMID 26838245 DOI: 10.7314/APJCP.2016.17.1.395  0.36
2016 Gao S, Zhang W, Liu J, Lin II, Chiu LS, Cao K. Improvements in typhoon intensity change classification by incorporating an ocean coupling potential intensity index into decision trees Weather and Forecasting. 31: 95-106. DOI: 10.1175/WAF-D-15-0062.1  0.44
2016 Lin SC, Yeh CJ, Leou KC, Manoharan D, Lin IN. Improvement of electron field emission properties of nanocrystalline diamond films by a plasma post-treatment process for cathode application in microplasma devices Journal of Vacuum Science and Technology B: Nanotechnology and Microelectronics. 34. DOI: 10.1116/1.4944006  0.32
2016 Wu CC, Tu WT, Pun IF, Lin II, Peng MS. Tropical cyclone-ocean interaction in Typhoon Megi (2010)-A synergy study based on ITOP observations and atmosphere-ocean coupled model simulations Journal of Geophysical Research: Atmospheres. DOI: 10.1002/2015JD024198  0.44
2015 Chang TH, Hsieh PY, Kunuku S, Lou SC, Manoharan D, Leou KC, Lin IN, Tai NH. High Stability Electron Field Emitters Synthesized via the Combination of Carbon Nanotubes and N2-plasma Grown Ultrananocrystalline Diamond Films. Acs Applied Materials & Interfaces. PMID 26600097 DOI: 10.1021/acsami.5b09778  0.32
2015 Sankaran KJ, Huang BR, Saravanan A, Manoharan D, Tai NH, Lin IN. Heterogranular Structured Diamond-Gold Nanohybrids: A New Long Life Electronic Display Cathode. Acs Applied Materials & Interfaces. PMID 26600002 DOI: 10.1021/acsami.5b10569  0.32
2015 Saravanan A, Huang BR, Lin JC, Keiser G, Lin IN. Fast Photoresponse and Long Lifetime UV Photodetectors and Field Emitters Based on ZnO/Ultrananocrystalline Diamond Films. Chemistry (Weinheim An Der Bergstrasse, Germany). PMID 26382200 DOI: 10.1002/chem.201501538  0.32
2015 Lin SC, Yeh CJ, Manoharan D, Leou KC, Lin IN. Microstructural evolution of nanocrystalline diamond films due to CH4/Ar/H2 plasma post-treatment process. Acs Applied Materials & Interfaces. PMID 26372852 DOI: 10.1021/acsami.5b06074  0.32
2015 Chou CT, Li YJ, Chang CC, Yang CN, Li PS, Jeng YM, Chen ST, Kuo ML, Lin IC, Lin BR. Prognostic Significance of CDCP1 Expression in Colorectal Cancer and Effect of Its Inhibition on Invasion and Migration. Annals of Surgical Oncology. PMID 25820997 DOI: 10.1245/s10434-015-4505-4  0.96
2015 Lin IH, Chen DT, Chang YF, Lee YL, Su CH, Cheng C, Tsai YC, Ng SC, Chen HT, Lee MC, Chen HW, Suen SH, Chen YC, Liu TT, Chang CH, et al. Hierarchical clustering of breast cancer methylomes revealed differentially methylated and expressed breast cancer genes. Plos One. 10: e0118453. PMID 25706888 DOI: 10.1371/journal.pone.0118453  0.4
2015 Sankaran KJ, Kunuku S, Sundaravel B, Hsieh PY, Chen HC, Leou KC, Tai NH, Lin IN. Gold nanoparticle-ultrananocrystalline diamond hybrid structured materials for high-performance optoelectronic device applications. Nanoscale. 7: 4377-85. PMID 25684389 DOI: 10.1039/c4nr07030e  0.32
2015 Chang CC, Lin IC, Wu CC. A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments Mobile Information Systems. 2015. DOI: 10.1155/2015/934716  0.96
2015 Cheng CY, Lin IC, Huang SY. An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks International Journal of Distributed Sensor Networks. 2015. DOI: 10.1155/2015/743623  0.96
2015 Liu KW, Lin IP, Sun SW, Cheng WH, Hsu XSC. G-Spacing: A gyro sensor based relative 3D space positioning scheme Acm Siggraph 2015 Posters, Siggraph 2015. DOI: 10.1145/2787626.2792631  0.4
2015 Lin IC, Yang YM, Lin CC. High-Performance Low-Power Carry Speculative Addition with Variable Latency Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 23: 1591-1603. DOI: 10.1109/TVLSI.2014.2355217  0.4
2015 Lin IH, Hsieh MF, Kuo HF, Tsai MC. Improved Accuracy for Performance Evaluation of Synchronous Reluctance Motor Ieee Transactions On Magnetics. 51. DOI: 10.1109/TMAG.2015.2450255  0.32
2015 Chang CC, Lin IC, Chi YL. Secure electronic coupons Proceedings - 2015 10th Asia Joint Conference On Information Security, Asiajcis 2015. 104-109. DOI: 10.1109/AsiaJCIS.2015.10  0.96
2015 Ngeow CC, Lee CH, Yang MTC, Lin CS, Hsiao HY, Cheng YUC, Lin ZYI, Lin IL, Kanbur SM, Ip WH. VI-band follow-up observations of ultra-long-period cepheid candidates in M31 Astronomical Journal. 149. DOI: 10.1088/0004-6256/149/2/66  0.48
2015 Sankaran KJ, Sundaravel B, Tai NH, Lin IN. Improvement on electrical conductivity and electron field emission properties of Au-ion implanted ultrananocrystalline diamond films by using Au-Si eutectic substrates Journal of Applied Physics. 118. DOI: 10.1063/1.4929431  0.32
2015 Saravanan A, Huang BR, Yeh CJ, Leou KC, Lin IN. Low temperature synthesis of diamond-based nano-carbon composite materials with high electron field emission properties Applied Physics Letters. 106. DOI: 10.1063/1.4922370  0.32
2015 Saravanan A, Huang BR, Sankaran KJ, Dong CL, Tai NH, Lin IN. Bias-enhanced post-treatment process for enhancing the electron field emission properties of ultrananocrystalline diamond films Applied Physics Letters. 106. DOI: 10.1063/1.4915488  0.32
2015 Sankaran KJ, Tai NH, Lin IN. Microstructural evolution of diamond films from CH4/H2/N2 plasma and their enhanced electrical properties Journal of Applied Physics. 117. DOI: 10.1063/1.4913258  0.32
2015 Saravanan A, Huang BR, Sankaran KJ, Tai NH, Lin IN. Highly Conductive Diamond-Graphite Nanohybrid Films with Enhanced Electron Field Emission and Microplasma Illumination Properties Acs Applied Materials and Interfaces. 7: 14035-14042. DOI: 10.1021/acsami.5b03166  0.32
2015 Lin IC, Wu HJ, Li SF, Cheng CY. A fair reputation system for use in online auctions Journal of Business Research. 68: 878-882. DOI: 10.1016/j.jbusres.2014.11.045  0.96
2015 Saravanan A, Huang BR, Manoharan D, Dong CL, Lin IN. Synthesis of hybrid diamond films via two-step microwave enhanced chemical vapor deposition process for enhancing the electron field emission properties Diamond and Related Materials. DOI: 10.1016/j.diamond.2015.12.018  0.32
2015 Yeh CJ, Chang HT, Leou KC, Lin IN. Plasma post-treatment process for enhancing electron field emission properties of ultrananocrystalline diamond films Diamond and Related Materials. DOI: 10.1016/j.diamond.2015.10.013  0.32
2015 Saravanan A, Huang BR, Yeh CJ, Leou KC, Divinah M, Lin IN. Bias enhanced nucleation and growth process for synthesizing diamond based nano-carbon composite materials with excellent electron field emission properties Diamond and Related Materials. DOI: 10.1016/j.diamond.2015.10.002  0.32
2015 Lin IM, Fan SY, Lu HC, Lin TH, Chu CS, Kuo HF, Lee CS, Lu YH. Randomized controlled trial of heart rate variability biofeedback in cardiac autonomic and hostility among patients with coronary artery disease Behaviour Research and Therapy. 70: 38-46. DOI: 10.1016/j.brat.2015.05.001  0.32
2015 Ko SY, Chang SS, Lin IH, Chen HI. Suppression of antioxidant Nrf-2 and downstream pathway in H9c2 cells by advanced glycation end products (AGEs) via ERK phosphorylation Biochimie. 118: 8-14. DOI: 10.1016/j.biochi.2015.07.019  0.52
2015 Lin IC, Hsu HH, Cheng CY. A Cloud-Based Authentication Protocol for RFID Supply Chain Systems Journal of Network and Systems Management. 23: 978-997. DOI: 10.1007/s10922-014-9329-1  0.96
2015 Sankaran KJ, Huang BR, Saravanan A, Manoharan D, Tai NH, Lin IN. Nitrogen Incorporated Ultrananocrystalline Diamond Microstructures From Bias-Enhanced Microwave N2/CH4-Plasma Chemical Vapor Deposition Plasma Processes and Polymers. DOI: 10.1002/ppap.201500079  0.32
2015 Chi YL, Lin IC, Chen CH, Hwang MS. The Secure transaction protocol in NFC card emulation mode International Journal of Network Security. 17: 431-438.  0.96
2015 Lin IC, Lin YW, Tseng LH, Chen YC. Developing a Personal Data Inventory Tracking and Managing System 2015 5th International Workshop On Computer Science and Engineering: Information Processing and Control Engineering, Wcse 2015-Ipce 0.96
2014 Chen CH, Lin IC, Yang CC. NFC attacks analysis and survey Proceedings - 2014 8th International Conference On Innovative Mobile and Internet Services in Ubiquitous Computing, Imis 2014. 458-462. DOI: 10.1109/IMIS.2014.66  0.96
2014 Chen CF, Wu CC, Dang DT, Lin IC. The computer-aided system for promoting judgments of umpires Lecture Notes in Electrical Engineering. 279: 685-693. DOI: 10.1007/978-3-642-41674-3_98  0.96
2014 Lin IC, Chen CH, Linh PT. Secure authorized proxy signature scheme for value-added service in vehicular Ad Hoc networks Lecture Notes in Electrical Engineering. 279: 677-684. DOI: 10.1007/978-3-642-41674-3_97  0.96
2014 Yang JH, Lin IC. A source authentication scheme based on message recovery digital signature for multicast International Journal of Communication Systems. 27: 2616-2627. DOI: 10.1002/dac.2494  0.96
2014 Liu CY, Yang SS, Lin IC. Critical factors of educational institutions adoption for BS 10012: Persional information management system International Journal of Network Security. 16: 161-167.  0.96
2014 Liu CY, Peng CH, Lin IC. A survey of botnet architecture and batnet detection techniques International Journal of Network Security. 16: 81-89.  0.96
2014 Lai FM, Lin IC. Inspection of Enterprise human resource system personal information security - An Instance of a company's HR system in central Taiwan Opt-I 2014 - 1st International Conference On Engineering and Applied Sciences Optimization, Proceedings. 2376-2381.  0.96
2013 Chen CH, Chen CF, Hsu MH, Lin IC. A blocking prediction for volleyball using neural networks Applied Mechanics and Materials. 373: 1224-1230. DOI: 10.4028/www.scientific.net/AMM.373-375.1224  0.96
2013 Chou YC, Hsu PK, Lin IC. Data hiding for HTML files using character coding table and index coding table Ksii Transactions On Internet and Information Systems. 7: 2913-2927. DOI: 10.3837/tiis.2013.11.021  0.96
2013 Chou YC, Lin IC, Hsu PK. A watermarking for HTML files based on multi-channel system International Journal of Security and Its Applications. 7: 163-174.  0.96
2013 Chang CC, Wu CC, Lin IC. A verifiable key management scheme in hierarchical ad hoc networks Information (Japan). 16: 1929-1944.  0.96
2012 Chan CW, Tseng SF, Lin IC. A cryptanalysis to LV et al.'s scheme Proceedings of the Iasted International Conference On Engineering and Applied Science, Eas 2012. 216-219. DOI: 10.2316/P.2012.785-049  0.96
2012 Chang CC, Wu CC, Lin IC. A UMTS enhanced cocktail protocol Proceedings of the Iasted International Conference On Engineering and Applied Science, Eas 2012. 173-180. DOI: 10.2316/P.2012.785-047  0.96
2012 Lin IC, Chen CH. Improvement on enhanced secure anonymous authenticaion scheme for roaming service in global mobility networks Proceedings of the Iasted International Conference On Advances in Computer Science and Engineering, Acse 2012. 324-331. DOI: 10.2316/P.2012.770-030  0.96
2012 Ou HH, Lin IC, Hwang MS. An effective AKA protocol for UMTS International Journal of Mobile Communications. 10: 427-448. DOI: 10.1504/IJMC.2012.048139  0.96
2012 Wu TK, Lin YW, Lin IC. A cloud-user access control mechanism based on data masking Proceedings - 2012 6th International Conference On Genetic and Evolutionary Computing, Icgec 2012. 165-168. DOI: 10.1109/ICGEC.2012.10  0.96
2012 Lin IC, Hsu HH. A secure rfid authentication and ownership transfer protocol in serverless environment Icic Express Letters. 6: 1429-1433.  0.96
2012 Lin IC, Chang TL. Enhanced the user's anonymity on the smart card based user authentication protocol Icic Express Letters. 6: 1507-1511.  0.96
2011 Lin CM, Tsaur SC, Chen YC, Lin IC. HB family RFID mutual authentication protocol Proceedings - 7th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2011. 230-235. DOI: 10.1109/IIHMSP.2011.86  0.96
2011 Lin IC, Wang CW, Luo RK, You HC. An efficient mutual authentication protocol for RFID systems International Journal of Innovative Computing, Information and Control. 7: 3097-3106. DOI: 10.1109/HIS.2009.221  0.96
2011 Lian S, Gritzalis S, Nedjah N, Lin IC. Special issue on soft computing for information system security Applied Soft Computing Journal. 11: 4257-4259. DOI: 10.1016/j.asoc.2011.05.040  0.96
2011 Lin IC, Luo RK, Tsaur SC. A dynamic join-leave multi-purpose scheme for RFID infrastructure Peccs 2011 - Proceedings of the 1st International Conference On Pervasive and Embedded Computing and Communication Systems. 537-540.  0.96
2010 Lin IC, Sung CC. An efficient source authentication for multicast based on Merkle hash tree Proceedings - 2010 6th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2010. 5-8. DOI: 10.1109/IIHMSP.2010.9  0.96
2010 Lin IC, Hsu PK. A data hiding scheme on word documents using multiple-base notation system Proceedings - 2010 6th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2010. 31-33. DOI: 10.1109/IIHMSP.2010.15  0.96
2010 Lin IC, Wang HL. An improved digital signature scheme with fault tolerance in RSA Proceedings - 2010 6th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2010. 9-12. DOI: 10.1109/IIHMSP.2010.10  0.96
2010 Feng JB, Lin IC, Chu YP, Tsaur SC. Resampling halftone images using interpolation and error-diffusion Computer Journal. 53: 802-813. DOI: 10.1093/comjnl/bxp085  0.96
2010 Lin IC, Tang SS, Wang CM. Multicast key management without rekeying processes Computer Journal. 53: 939-950. DOI: 10.1093/comjnl/bxp060  0.96
2010 Chang CC, Wu CC, Lin IC. A data hiding method for text documents using multiple-base encoding Communications in Computer and Information Science. 66: 101-109. DOI: 10.1007/978-3-642-11618-6_15  0.96
2010 Lin IC, Yang CW, Tsaur SC. Nonidentifiable rfid privacy protection with ownership transfer International Journal of Innovative Computing, Information and Control. 6: 2341-2351.  0.96
2010 Lin IC, Chang PY, Chang CC. A key management scheme for sensor networks using bilinear pairings and gap Diffie-Hellman Group International Journal of Innovative Computing, Information and Control. 6: 809-816.  0.96
2010 Chang CC, Wu CC, Lin IC. 3GPP sim-based authentication schemes for wireless local area networks International Journal of Innovative Computing, Information and Control. 6: 461-474.  0.96
2009 Lin IC, Tsaur SC, Chang KP. Lightweight and serverless RFID authentication and search protocol 2009 International Conference On Computer and Electrical Engineering, Iccee 2009. 2: 95-99. DOI: 10.1109/ICCEE.2009.159  0.96
2009 Lin IC, Huang SY. A polynomial based key establishment scheme for heterogeneous sensor networks 5th International Conference On Information Assurance and Security, Ias 2009. 1: 41-44. DOI: 10.1109/IAS.2009.264  0.96
2009 Lin IC, Chang CC. A countable and time-bound password-based user authentication scheme for the applications of electronic commerce Information Sciences. 179: 1269-1277. DOI: 10.1016/j.ins.2008.12.026  0.96
2009 Lin IC, Lin YB, Wang CM. Hiding data in spatial domain images with distortion tolerance Computer Standards and Interfaces. 31: 458-464. DOI: 10.1016/j.csi.2008.05.010  0.96
2009 Ou HH, Lin IC, Hwang MS, Jan JK. TK-AKA: Using temporary key on authentication and key agreement protocol on UMTS International Journal of Network Management. 19: 291-303. DOI: 10.1002/nem.703  0.96
2009 Chang CC, Cheng YF, Lin IC. A novel key management scheme for dynamic multicast communications International Journal of Communication Systems. 22: 53-66. DOI: 10.1002/dac.958  0.96
2009 Wu CC, Chang CC, Lin IC. An authenticated payword scheme without public key cryptosystems International Journal of Innovative Computing, Information and Control. 5: 2881-2891.  0.96
2008 Lin IC, Chang CC, Yang JH. An efficient proxy signature scheme for realizing generalized proxy signing policy Proceedings - 2008 4th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iih-Msp 2008. 1537-1540. DOI: 10.1109/IIH-MSP.2008.71  0.96
2008 Lin IC, Chang CC. A novel digital signature scheme for application of document review in a linearly hierarchical organization Proceedings - 2008 4th International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iih-Msp 2008. 1367-1370. DOI: 10.1109/IIH-MSP.2008.70  0.96
2008 Wu CC, Chang CC, Lin IC. New sealed-bid electronic auction with fairness, security and efficiency Journal of Computer Science and Technology. 23: 253-264. DOI: 10.1007/s11390-008-9127-x  0.96
2008 Chang CC, Lin IC, Lin CC. A novel location tracking scheme for reducing location updating traffic in a personal communication system Wireless Personal Communications. 44: 139-152. DOI: 10.1007/s11277-007-9349-1  0.96
2008 Chang CC, Cheng YF, Lin IC. Security enhancement of a flexible payment scheme and its role-based access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4990: 457-462. DOI: 10.1007/978-3-540-79499-8_35  0.96
2008 Chang CC, Chang PY, Lin IC. A novel group signature scheme based on bilinear pairings and gap diffie-hellman group Studies in Computational Intelligence. 89: 117-125. DOI: 10.1007/978-3-540-76282-9_7  0.96
2008 Lin IC. A neural network system for authenticating remote users in multi-server architecture International Journal of Communication Systems. 21: 435-445. DOI: 10.1002/dac.906  0.96
2007 Lin IC, Lin YB, Wang CM. An efficient steganography scheme for M-commerce Proceedings - 3rd International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2007.. 2: 122-125. DOI: 10.1109/IIH-MSP.2007.82  0.96
2007 Feng JB, Lin IC, Chu YP. An edge enhanced technique for digital halftoning using error diffusion Proceedings - 3rd International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2007.. 1: 81-86. DOI: 10.1109/IIH-MSP.2007.77  0.96
2007 Wang CC, Chang CC, Jan JK, Lin IC. A flexible fragile watermarking scheme for binary images with reversibility Proceedings - 3rd International Conference On Intelligent Information Hiding and Multimedia Signal Processing, Iihmsp 2007.. 1: 501-504. DOI: 10.1109/IIH-MSP.2007.20  0.96
2007 Lin IC, Chang CC. Security enhancement for digital signature schemes with fault tolerance in RSA Information Sciences. 177: 4031-4039. DOI: 10.1016/j.ins.2007.03.035  0.96
2007 Yu YH, Chang CC, Lin IC. A new steganographic method for color and grayscale image hiding Computer Vision and Image Understanding. 107: 183-194. DOI: 10.1016/j.cviu.2006.11.002  0.96
2007 Lin IC, Chang CC. A practical electronic payment system for message delivery service in the mobile environment Wireless Personal Communications. 42: 247-261. DOI: 10.1007/s11277-006-9176-9  0.96
2006 Lin IC, Lin YB, Wang CM. A secure and efficient scheme for authenticating remote users using smart card Proceedings of the 9th Joint Conference On Information Sciences, Jcis 2006. 2006. DOI: 10.2991/jcis.2006.219  0.96
2006 Lin IC, Lin YB, Wang CM. An improvement on secure e-mail protocols providing perfect foward secrecy Proceedings of the 9th Joint Conference On Information Sciences, Jcis 2006. 2006. DOI: 10.2991/jcis.2006.102  0.96
2006 Chang CY, Lin IC. An efficient progressive image transmission scheme for chinese calligraphy International Journal of Pattern Recognition and Artificial Intelligence. 20: 1077-1092. DOI: 10.1142/S0218001406005083  0.96
2006 Chang CC, Lin IC. A new solution for assigning cryptographic keys to control access in mobile agent environments Wireless Communications and Mobile Computing. 6: 137-146. DOI: 10.1002/wcm.276  0.96
2006 Feng JB, Lin IC, Tsai CS, Chu YP. Reversible watermarking: Current status and key issues International Journal of Network Security. 2: 161-170.  0.96
2006 Chang CC, Lin IC, Liao CT. An access control system with time-constraint using support vector machines International Journal of Network Security. 2: 150-159.  0.96
2006 Lin IC, Chang CC. An efficient fault-tolerant digital signature scheme based on the discrete logarithm problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4158: 601-610.  0.96
2005 Chang CC, Lin IC. Fast search algorithm for vector quantisation without extra look-up table using declustered subcodebooks Iee Proceedings: Vision, Image and Signal Processing. 152: 513-519. DOI: 10.1049/ip-vis:20041199  0.96
2005 Chang CC, Lin IC, Lam KY. An ID-based multisignature scheme without reblocking and predetermined signing order Computer Standards and Interfaces. 27: 407-413. DOI: 10.1016/j.csi.2004.09.009  0.96
2005 Lin IC, Hwang MS, Chang CC. The general pay-word: A micro-payment scheme based on n-dimension one-way hash chain Designs, Codes, and Cryptography. 36: 53-67. DOI: 10.1007/s10623-003-1162-6  0.96
2005 Lin IC, Ou HH, Hwang MS. A user authentication system using back-propagation network Neural Computing and Applications. 14: 243-249. DOI: 10.1007/s00521-004-0460-x  0.96
2005 Lin IC, Chang CC. A (t, n) threshold secret sharing system with efficient identification of cheaters Computing and Informatics. 24: 529-541.  0.96
2005 Chang CC, Lin IC. Cryptanalysis of the modified remote login authentication scheme based on a geometric approach Informatica. 16: 37-44.  0.96
2005 Chang CC, Lin IC, Tsai HM. A dynamic mechanism for determining relationships in a partially ordered user hierarchy International Journal of High Performance Computing and Networking. 3: 378-384.  0.96
2004 Hung KL, Chang CC, Lin IC. Lossless compression-based progressive image transmission scheme Imaging Science Journal. 52: 212-224. DOI: 10.1179/136821904225020276  0.96
2004 Chang CC, Lin IC. Remarks on fingerprint-based remote user authentication scheme using smart cards Operating Systems Review (Acm). 38: 91-96. DOI: 10.1145/1031154.1031165  0.96
2004 Chang CC, Lin IC. An improvement of delegated multisignature scheme with document decomposition Operating Systems Review (Acm). 38: 52-57. DOI: 10.1145/1031154.1031159  0.96
2004 Chang CC, Lin IC. Novel full-search schemes for speeding up image coding using vector quantization Real-Time Imaging. 10: 95-102. DOI: 10.1016/j.rti.2004.02.003  0.96
2004 Lin IC, Ou HH, Hwang MS. Efficient access control and key management schemes for mobile agents Computer Standards and Interfaces. 26: 423-433. DOI: 10.1016/j.csi.2003.11.010  0.96
2004 Shen JJ, Lin IC, Hwang MS. A secure LITESET scheme Ieice Transactions On Information and Systems. 2509-2512.  0.96
2004 Chang CC, Lin IC, Tsai HM, Wang HH. A key assignment scheme for controlling access in partially ordered user hierarchies Proceedings - International Conference On Advanced Information Networking and Application (Aina). 2: 376-379.  0.96
2003 Hwang MS, Lu EJL, Lin IC. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Ieee Transactions On Knowledge and Data Engineering. 15: 1552-1560. DOI: 10.1109/TKDE.2003.1245292  0.96
2003 Chang CC, Shih KJ, Lin IC. An intellectual placement of Chinese phonetic symbols on the keyboard of mobile phones Nlp-Ke 2003 - 2003 International Conference On Natural Language Processing and Knowledge Engineering, Proceedings. 506-511. DOI: 10.1109/NLPKE.2003.1275957  0.96
2003 Chang CC, Lin IC. The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture Computer Standards and Interfaces. 25: 501-513. DOI: 10.1016/S0920-5489(03)00019-9  0.96
2003 Lin IC, Hwang MS, Chang CC. Security enhancement for anonymous secure e-voting over a network Computer Standards and Interfaces. 25: 131-139. DOI: 10.1016/S0920-5489(02)00120-4  0.96
2003 Lin IC, Hwang MS, Chang CC. A new key assignment scheme for enforcing complicated access control policies in hierarchy Future Generation Computer Systems. 19: 457-462. DOI: 10.1016/S0167-739X(02)00200-5  0.96
2003 Lin IC, Hwang MS, Li LH. A new remote user authentication scheme for multi-server architecture Future Generation Computer Systems. 19: 13-22. DOI: 10.1016/S0167-739X(02)00093-6  0.96
2003 Chang CC, Shih TK, Lin IC. Guessing by neighbors: An efficient reconstruction method for transmitting image progressively Visual Computer. 19: 342-353. DOI: 10.1007/s00371-002-0186-7  0.96
2003 Chang CC, Lin IC. A New (t, n) Threshold Image Hiding Scheme for Sharing a Secret Color Image International Conference On Communication Technology Proceedings, Icct. 1: 196-202.  0.96
2002 Hwang MS, Lu EJL, Lin IC. Adding timestamps to the secure electronic auction protocol Data and Knowledge Engineering. 40: 155-162. DOI: 10.1016/S0169-023X(01)00048-9  0.96
2002 Chang CC, Lin IC, Shih TK. An Efficient Edge Detection Technique for Chinese Calligraphy Proceedings of the Joint Conference On Information Sciences. 6: 960-963.  0.96
2001 Li LH, Lin LC, Hwang MS. A remote password authentication scheme for multiserver architecture using neural networks. Ieee Transactions On Neural Networks / a Publication of the Ieee Neural Networks Council. 12: 1498-504. PMID 18249979 DOI: 10.1109/72.963786  0.96
2001 Hwang MS, Lin IC, Li LH. Simple micro-payment scheme Journal of Systems and Software. 55: 221-229. DOI: 10.1016/S0164-1212(00)00072-8  0.96
2001 Chang CC, Lin IC. Cryptanalysis of the improved user effcient blind signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2229: 42-46.  0.96
2000 Hwang MS, Lin IC, Hwang KF. Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures Informatica. 11: 15-19.  0.96
2000 Hwang MS, Lin IC, Lu EJL. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers Informatica. 11: 137-144.  0.96
2000 Lin IC, Chang CC, Hwang MS. Security enhancement for the `simple authentication key agreement algorithm' Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 113-115.  0.96
Show low-probability matches.