雷欽隆教授的著作列表 - Publication List of Chin-Laung Lei

Publication List of 雷欽隆 Chin-Laung Lei

Journal articles & book chapters:

  1. 2. Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, Jan-Ming Ho and Chuan-Ju Wang, “Assessing the profitability of timely opening range breakout breakout on index futures markets,” IEEE Access, Vol. 7, Issue 1,, 32061-32071, 2019
  2. Po-Wen Chi, and Chin-Luang Lei,, “Audit-Free Cloud Storage via Deniable Attribute-based Encryption,” IEEE Transactions on Cloud Computing, accepted, Vol. 6, Issue 2, 414-427, Jun. 2018
  3. Ming-Hung Wang and Chin-Laung Lei, “SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events,” Journal of Information Science and Engineering, Vol. 34, No. 6, 1579-1598, 2018
  4. 5. Hong-Bin Tsai and Chin-Laung Lei, “Time-Shift Replacement Algorithm for Main Memory Performance Optimization,” Journal of Supercomputing, Vol. 74, No. 6, 2729-2746, 2018
  5. 6. Chien-Ting Kuo, Po-Wen Chi, Victor Chang, and Chin-Laung Lei, “SFaaS: Keeping an Eye on IoT Fusion Environment with Security Fusion as a Service,” Future Generation Computer Systems, Vol. 86, 1424-1436, 2018
  6. 7. Yi-Cheng Tsai, Chuan-Ju Wang, William Cheung, Chung-Shu Wu, Jan-Ming Ho, and Chin-Laung Lei,, “Exploring the Persistent Behavior of Financial Markets,” Finance Research Letters, Vol. 24, 199-220, 2018
  7. 9. Ming-Hung Wang, Lung-Wen Chen, Po-Wen Chi, and Chin-Laung Lei, “SDUDP: A Reliable UDP-based Transmission Protocol over SDN,” IEEE Access, Volume 5, Issue 1, 5904-5916, Dec. 2017
  8. 10. Yen-Hwa Liao, Chin-Laung Lei, Ying-I Ko, Yu-Shian Chen, and Chien-Hua Chiu, “Enhanced Tame-based Key Predistribution Scheme for Sensor Networks,” Journal of Internet Technology, Vol. 18, No, 7, 1499-1514, Dec. 2017
  9. 11. Hung-Jr Shiu, Bor-Shing Lin, and Chin-Laung Lei, “Privacy Preserving of Online Digital Physiological Signals using Reversible Steganography,” Computer Methods and Programs in Biomedicine, Volume 151, 159-170, Nov. 2017
  10. 12. Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan,” The Computer Journal, Volume 60, Issue 11, 1675-1686, Nov. 2017
  11. 13. Ming-Hung Wang, Han-Chi Wang, and Chin-Laung Lei,, “Automatic Test Pattern Generator for Fuzzing Based on Finite State Machines,” Security and Communication Networks, vol. 2017, Nov. 2017
  12. 14. Hung-Jr Shiu, Bor-Shing Lin, Chia-Wei Cheng, Chien-Hung Huang, and Chin-Laung Lei, “High Capacity Information Protection of Synthesized Pitches using Amplitude Enhancement-A New Vision of Acoustic Steganography,” Symmetry, Vol. 9, No.6, Jun. 2017
  13. Yi-Cheng Tsai, Chin-Laung Lei, Jan-Ming Ho, Ming-Yang Kao, and Szu-Lang Liao, “Outstanding Principal as Prepayment Value: A Closed-Form Formula for Mortgage Pricing,” Journal of Information Science and Engineering, Vol. 31. No. 3, pp. 925-942, May 2015
  14. He-Ming Ruan, and Chin-Laung Lei,, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss,” Engineering Science & Technology Bulletin, No. 145, pp. 45-47, Apr. 2015
  15. Yu-Shian Chen, He-Ming Ruan, and Chin-Laung Lei, “Stratus: Check and Share Encrypted Data among Heterogeneous Cloud Storage,” Journal of Internet Technology, Vol. 15, No. 6, pp. 999-1011, Nov. 2014
  16. H. J. Shiu, S. Y. Tang, C. H. Huang, R .C. T. Lee, and C. L. Lei, “A Reversible Acoustic Data Hiding Method Based on Analog Modulation,” Information Sciences, Volume 273, pp. 233–246, Jul. 2014
  17. Jing-Kai Lou, Fu-Min Wang, Chin-Hua Tsai, San-Chuan Hung, Perng-Hwa Kung, Shou-De Lin, Kuan-Ta Chen and Chin-Laung Lei, “A Social Diffusion Model with an Application on Election Simulation,” The Scientific World Journal, Volume 2014, Article ID 180590, 14 pages, 2014
  18. Yu-Shian Chen, and Chin-Laung Lei, “Aggregate Message Authentication Codes (AMACs) with On-the-fly Verification,” International Journal of Information Security, Vol. 12, No. 6,, pp. 495-504, Nov. 2013
  19. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework,” IEEE Transactions on Multimedia, Vol. 15, No. 5, pp. 1121-1137, Aug. 2013
  20. Chien-Hua Chiu and Chin-Laung Lei, “EtherAgent: Scaling Ethernet for Enterprise and Campus Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2465-2483, Jun. 2013
  21. Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2261-2282, Jun. 2013
  22. Jiunn-Jye Lee, Li-Yuan Lee and Chin-Laung Lei, “Aura: An Anonymous Universal Relay Architecture over Structured Peer-To-Peer Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2327-2346, Jun. 2013
  23. Chia-Chang Hsu and Chin-Laung Lei, “A Lightweight Firework Search Protocol for Location-Aided Routing Enhancement in Mobile Ad-Hoc Networks,” International Journal of Innovative Computing, Information and Control, Vol. 9, No. 6, pp. 2261-2282, Jun. 2013
  24. Jiunn-Jye Lee, Hann-Huei Chiou, Chia-Chang Hsu, and Chin-Laung Lei, “An Adaptive Sector-Based Routing Model over Structured Peer-to-Peer Networks,” Computer Networks, Volume 57, Issue 4, pp. 887–896, Mar. 2013
  25. Yun-Hsin Chuang, Yuh-Min Tseng and Chin-Laung Lei, “Efficient Mutual Authentication And Key Agreement With User Anonymity For Roaming Services In Global Mobility Networks,” International Journal of Innovative Computing, Information and Control, Vol. 8, No. 9, pp. 6415-6427, Sept. 2012
  26. Chien-Hua Chiu and Chin-Laung Lei, “A Decentralized Clustering Scheme for Transparent Mode Devices,” Journal of Clustering Computing, Volume 15, Issue 3, 265-279, Sept. 2012
  27. Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimension,” IEEE Network, Volume: 26, Issue: 4, pp. 25-31, Aug. 2012
  28. Yun-Peng Chiu, Chun-Ying Huang and Chin-Laung Lei, “SEMPRE: Secure Multicast Architecture Using Proxy Re-Encryptio,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 7(A), pp. 4719-4748, Jul. 2012
  29. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks,” International Journal of Innovative Computing, Information and Control, Volume 8, Number 2, pp. 1001-1024, Feb. 2012
  30. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Provably Secure and Efficient Identification and Key Agreement Protocol with User Anonymity,” Journal of Computer and System Sciences, Volume 77, Issue 4, pp. 790-798, Jul. 2011
  31. 13. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for CAPTCHA Usability Evaluation,” ACM Computer in Entertainment, Volume 9 Issue 1, pp. 3-1~3-14, Apr. 2011
  32. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Robust Authentication and Key Agreement Scheme Preserving the Privacy of Secret Key,” Computer Communications, Vol. 34, pp. 274-280, 2011
  33. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “Smart Card-based Secure Web Services in the Three-party Setting,” International Journal of Innovative Computing, Information and Control, Vol. 6, No. 11, pp. 5259-5274, Nov. 2010
  34. Kuan-Ta Chen, Chi-Jui Chang, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quadrant of Euphoria: A Crowdsourcing Platform for QoE Assessment,” IEEE Network, Vol. 24, No. 2, pp.28-35, Mar. 2010
  35. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings,” International Journal of Innovative Computing Information and Control, Vol. 6, No. 2, pp. 763-772, Feb. 2010
  36. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems,” International Journal of Ad Hoc and Ubiquitous Computing, Vol. 6, No. 3, pp. 183-190, 2010
  37. Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, and Chin-Laung Lei, “Fair anonymous rewarding based on electronic cash,” Journal of Systems and Software, Volume 82 Issue 7, pp. 1168-1176, Jul. 2009
  38. Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “Effect of Network Quality on Player Departure Behavior in Online Games,” IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 5, pp. 593-606, May 2009
  39. Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “A Robust Authentication Scheme with User Anonymity for Wireless Environments,” International Journal of Innovative Computing, Information and Control, Vol. 5, No. 4, pp. 1069-1080, Apr. 2009
  40. Ren-Chiun Wang, Wen-Shenq Juang and Chin-Laung Lei, “User Authentication Scheme with Privacy-preservation for Multi-server Environment,” IEEE Communications Letters, Vol. 13, No. 2, pp, 157-159, Feb. 2009
  41. Chen-Chi Wu, Kuan-Ta Chen, Chih-Ming Chen, Polly Huang, and Chin-Laung Lei, “On the Challenges and Designs of Transport Protocols for MMORPGs,” Multimedia Tools and Applications, Vol. 45, pp. 7-32, 2009
  42. Kuan-Ta Chen, Jhih-Wei Jiang, Polly Huang, Hao-Hua Chu, Hao-Hua Chu, Chin-Laung Lei and Wen-Chin Chen, “Identifying MMORPG Bots: A Traffic Analysis Approach,” EURASIP Journal on Advances in Signal Processing, Volume 2009, 2009
  43. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions,” International Journal of Security and Its Applications, Vol. 2, No. 4, pp. 49-56, Oct. 2008
  44. Te-Yuan Huang, Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “A Generalizable Methodology for Quantifying User Satisfaction,” IEICE Transactions on Communications, 91-B(5), 1260-1268, May 2008
  45. Yu-Shian Chen, Hsu-Chun Hsiao, and Chin-Laung Lei, “A Survey of Secure Data Aggregation on Sensor Networks,” Communications of CCISA, Vol. 13, No. 4, pp. 17-28, Oct. 2007
  46. Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, and Chin-Laung Lei, “Secure Multicast in Dynamic Environments,” Computer Networks, Volume 51, Issue 10, pp. 2805--2817, Jul. 2007
  47. Pan-Lung Tsai, and Chin-Laung Lei, “Analysis and Evaluation of a Multiple Gateway Traffic-Distribution Scheme for Gateway Clusters,” Computer Communications, Vol. 29, Issue 16, pp. 3170-3181, Dec. 2006
  48. Kuan-Ta Chen, Polly Huang, and Chin-Laung Lei, “How sensitive are online gamers to network quality?,” Communications of the ACM, Vol. 49, Issue 11, pp. 34-38, Nov. 2006
  49. K. T. Chen, P. Huang, and C. L. Le, “Game Traffic Analysis: An MMORPG Perspective,” Computer Networks, Vol. 50, No. 16, pp. 3002-3023, 2006
  50. C. L. Lei, P. L. Yu, P. L. Tsai, and M. H. Chan, “An Efficient and Anonymous Buyer-Seller Watermarking Protocol,” IEEE Transactions on Image Processing,, Vol. 13 , No. 12, pp. 1618 - 1626,, 2004
  51. C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains,” International Journal of Computers and Applications, Volume 26, Issue 1,, pp. 1-9,, 2004
  52. W. S. Juang, C. L. Lei, and H. T. Liaw, “Privacy and Anonymity Protection wit Blind Threshold Signatures,” International Journal of Electronic Commerce, Vol. 7, No. 2, pp. 145-159, 2003
  53. C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Journal of Information Science and Engineering, Vol. 18, pp. 23-39, 2002
  54. C. I. Fan, and C. L. Lei, “An Unlinkably Divisible and Intention Attachable Ticket Scheme for Runoff Elections,” Journal of Network and Computer Applications, Vol. 25, No. 2, pp. 93-107, 2002
  55. T. H. Yeh, C. M. Kuo, C. L. Lei, and H. C. Yen, “Distributed and On-Line Routing on Tori,” Algorithmica, Vol. 32, No. 4, pp. 562-593, 2002
  56. W. S. Juang, C. L. Lei, and H. T. Liaw, “A Verifiable Multi-Authorities Secret Election Allowing Abstaining from Voting,” The Computer Journal, Vol. 45, No. 6, pp. 672-682, 2002
  57. C. I. Fan, and C. L. Lei, “A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash,” Journal of Information Science and Engineering, Vol. 18, pp. 47-58, 2002
  58. C. I. Fan, and C. L. Lei, “Divisible Blind Signatures based on Hash Chains,” International Journal of Computers and Application, Vol. 24, Issue 3, 2002
  59. T. H. Yeh, and C. L. Lei, “Competitive Analysis of Minimal Oblivious Routing Algorithms on Hypercubes,” IEICE Trans. on Information and Systems, Vol. E84-D, No.1, pp. 65-75, 2001
  60. W. S. Juang, C. L. Lei, and H. T. Liaw, “Fair Blind Threshold Signatures Based on Discrete Logarithms,” Computer Systems – Science and Engineering, Vol. 16, No. 6, pp. 371-379, 2001
  61. C. I. Fan, and C. L. Lei,, “Cryptanalysis on improved user efficient blind signatures,” IEE Electronics Letters, Vol.37, No.10, pp.630-631, 2001
  62. Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Fully Distributed Approach to Repositories of Reusable Components,” Journal of Information Science and Engineering, Vol. 17, No. 1, pp. 147-158, 2001
  63. H. J. Chen, C. L. Lei, and P. L. Yu, “Fairness in E-cash Systems,” Information Security Newsletter, Vol. 7, No. 4, pp. 82-95, 2001
  64. C. L. Lei, and C. E. Yin, “Smart Card Payment Today and Tomorrow,” Information Security Newsletter, Vol. 7, No. 4, pp. 46-60, 2001
  65. Y. C. Sun, C. L. Lei, and M. L. Kuo, “A Naming, Storage, and Retrieval Model for Software Assets,” IEICE Trans. on Information and Systems, Vol. E83-D, No. 4, pp. 789-796, 2000
  66. A. Lai, C. L. Lei, and H. H. Chiou, “A False-Sharing Free Distributed Shared Memory Management Scheme,” IEICE Trans. on Information and Systems, Vol. E83-D, No. 4, pp. 777-788, 2000
  67. W. S. Juang, C. L. Lei, and C. Y. Chang, “Anonymous Channel and Authentication in Wireless Communications,” Computer Communications, Vol. 22, No. 15-16, pp. 1502-1511, 1999
  68. W. S. Juang, and C. L. Lei, “Partially Blind Threshold Signatures Based on Discrete Logarithms,” Computer Communications, Vol. 22, No. 1, pp. 73-86, 1999

Conference & proceeding papers:

  1. Meng-Han Tsai, Ming-Hung Wang, Wei-Chieh Yang, and Chin-Laung Lei,, “Uncovering Internal Threats Based on Open-source Intelligence,” International Computer Symposium, Yunlin, Taiwan, Dec. 2018
  2. Albert Guan and Chin-Laung Lei, “Efficient Key Agreement Protocol for Smart Sensors,” IEEE Conference on Dependable an, Kaohsiung, Taiwan, Dec. 2018
  3. Chih-Fan Hsu, Yu-Cheng Chen, Yu-Shuen Wang, Chin-Laung Lei, and Kuan-Ta Chen, “Realizing the Real-time Gaze Redirection System with Convolutional Neural Network,” ACM Multimedia Systems Conference, Amsterdam, The Netherland, Jun. 2018
  4. Ming-Hung Wang, Meng-Han Tsai, Wei-Chieh Yang, and Chin-Laung Lei, “Infection Categorization Using Deep Autoencoder,” IEEE INFOCOM’18 Demo Session, Honolulu, HI, USA, Apr. 2018
  5. Hong-Bin Tsai and Chin-Laung Lei, “CAHR: Centrality-Aware Hybrid Replacement in Information-Centric Network,” National Computer Symposium, Hualien, Taiwan, Dec. 2017
  6. 8. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Wei-Chou Lai, Chien-Hung Huang and Chin-Laung Lei, “A Stereo Audio Steganography by Inserting Low-frequency and Octave Equivalent Pure Tones,” Euro-China Conference on Intelligent Data Analysis and Application, Málaga, Spain, Oct. 2017
  7. 7. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Investigation of Mobile App Behaviors, from the Aspect of Real World Mobile Backend System,” IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, Amman, Jordan, Oct. 2017
  8. 6. Chih-Fan Hsu, Anthony Chen, Cheng-Hsin Hsu, Chun-Ying Huang, Kuan-Ta Chen and Chin-Laung Lei, “Is Foveated Rendering Perceivable? A Study on the Efficiency and Consistency of Subjective Assessment Methods,” ACM Multimedia, Mountain View, CA USA., Oct. 2017
  9. 9. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang and Chin-Laung Lei, “Data Hiding on Social Media Communications Using Text Steganography,” International Conference on Risks and Security of Internet and System, Dinard, France, Sept. 2017
  10. 10. Chien-Ting Kuo, Victor Chang, and Chin-Laung Lei,, “A Feasibility Analysis for Edge Computing Fusion in LPWA IoT Environment with SDN Structure,” InternationaWorkshop on Data Analytics and Emerging Services, Antalya, Turkey, Aug. 2017
  11. 11. He-Ming Ruan, Jen-Hao Kuo, Chun-Yi Chan, and Chin-Laung Lei, “Toward High Throughput Backend Provision for Mobile Apps with a Microservice Approach,” International Conferance on Internet Computing and Internet of Things, Las Vegas, USA., Jul. 2017
  12. 12. Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Temporal Dynamics of On-Line Political Ideology: Longitudinal Study on Facebook,” Annual Conference of the European Political Science Association, Milan, Italy, Jun. 2017
  13. Hong-Bin Tsai and Chin-Laung Lei, “A Page Replacement Algorithm Based on Frequency Derived From Reference History,” ACM SIGAPP Symposium On Applied Computing, 1522-1527, Marrakesh, Morocco, Apr. 2017
  14. 14. Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, and Chin-Laung Lei,, “SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-enabled Networks,” International Computer Symposium, 148-153, Chiayi, Taiwan, Dec. 2016
  15. 15. Ming-Hung Wang, Ting-Chieh Lai, Han-Chi Wang, Lung-Wen Chen, Chin-Wei Tien, Jian-Wei Liao and Chin-Laung Lei, “Investigating Vulnerabilities of HTML5 and HTTP/2.0 Websites Using Fuzzing,” Taiwan Academic Network Conference, 937-941, Hualian, Taiwan, Oct. 2016
  16. 16. Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei and Nen-Fu Huang, “SDNort: A Software Defined Network Testing Framework Using Openflow,” 11th Asia Joint Conference on Information Security, 100-107, Fukuoka, Japan, Aug. 2016
  17. 17. Ming-Hung Wang, Po-Wen Chi, Jing-Wei Guoy, and Chin-Laung Lei,, “DN Storage: A Stream-based Storage System over Software-defined Networks,” IEEE International Conference on Computer Communications, 361-362, San Francisco, CA, USA., Apr. 2016
  18. Ming-Hung Wang and Chin-Laung Lei, “Boosting Election Prediction Accuracy by Crowd Wisdom on Social Forums,” the 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, USA., Jan. 2016
  19. Ming-Hung Wang and Chin-Laung Lei, “Modelling Articles Polarity and Identifying Influential Authors through Social Movements,” IEEE International Conference on Systems, Man, and Cybernetics, Hong Kong, Oct. 2015
  20. Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Efficient NFV Deployment in Data Center Networks,” IEEE ICC 2015 - Next Generation Networking Symposium, pp. 5290-5295, London, UK., Jun. 2015
  21. He-Ming Ruan, Ming-Hwa Tsai, Yen-Nun Huang, Yen-Hua Liao and Chin-Laung Lei, “Discovery of De-identification Policies Considering Re-identification Risks and Information Loss,” the 10th Asia Joint Conference on Information Security (Recipient of the Best Paper Award), pp. 69-76, Kaohsiung, Taiwan, May 2015
  22. Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, and Chin-Laung Lei, “How to Detect a Compromised SDN Switch,” IEEE Conference on Network Softwarization, Workshop on Security issues in SDN, London, U.K., Apr. 2015
  23. Ming-Hung Wang, and Chin-Laung Lei,, “Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies,” ICS 2014, pp. 328-337, Taichung Taiwan, Dec. 2014
  24. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “A Security Assessment Environment and Process Design for Smart Meter Vendor Production Line,” Workshop on Cryptography and Information Security, ICS 2014 (Recipient of the Best Poster Award), pp. 269-276, Taichung Taiwan, Dec. 2014
  25. He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Hybrid Intrusion Detection Framework for Advanced Metering Infrastructure,” Workshop on Cryptography and Information Security, ICS 2014, pp. 170-179, Taichung Taiwan, Dec. 2014
  26. Po-Wen Chi, Yu-Cheng Huang, Jing-Wei Guo, and Chin-Luang Lei, “Give Me a Broadcast-Free Network,” Globecom 2014 - Next Generation Networking Symposium, pp. 2009-2014, Austin, Texas, USA., Dec. 2014
  27. Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei, “An AMI Threat Detection Mechanism Based on SDN Networks,” The Eighth International Conference on Emerging Security Information, Systems and Technologies, pp. 208-211, Lisbon, Portugal, Nov. 2014
  28. He-Ming Ruan, and Chin-Laung Lei, “Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage,” The 9th Asia Joint Conference on Information Security, pp. 156-163, Wuhan, China., Sept. 2014
  29. Yi-Cheng Tsai, Mu-En Wu, Chin-Laung Lei, Chung-Shu Wu, and Jan-Ming Ho, “Comparing Profitability of Day Trading Using ORB Strategies on Index Futures Markets in Taiwan, Hong-Kong and USA,” the 10th Annual Conference of the Asia-Pacific Association of Derivatives, Busan, Korea, Aug. 2014
  30. He-Ming Ruan, Yun-Hsin Chuang, and Chin-Laung Lei, “Access Control over Vulnerable Devices in Advanced Metering Infrastructure,” National Computer Symposium, Taichung, Taiwan., Dec. 2013
  31. Ming-Hung Wang, Kuan-Ta Chen, Shuo-Yang Wang, and Chin-Laung Lei, “Understanding Potential Microtask Workers for Paid Crowdsourcing,” Conference on Human Computation & Crowdsourcing, Palm Springs, California USA., Nov. 2013
  32. He-Ming Ruan, Gan Wei Yeap, and Chin-Laung Lei, “Security Event Handling Framework For Advanced Metering Infrastructure,” International Conference on Applied and Theoretical Information Systems Research, Taipei, Taiwan., Nov. 2013
  33. Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach,” IGCVP 2013, Ilan, Taiwan, Aug. 2013
  34. Jing-Kai Lou, Kunwoo Park, Meeyoung Cha, Juyong Park, Chin-Laung Lei and Kuan-Ta Chen, “Gender Swapping and User Behaviors in Online Social Games,” The 22nd International World Wide Web Conference (WWW2013), pp. 827-836, Rio de Janeiro, Brazil, May 2013
  35. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “Design and Implementation of a Self-Growth Security Baseline Database for Automatic Security Auditing,” International Computer Symposium, Advances in Intelligent Systems and Applications, Vol. 2, pp. 177-184, Hualien, Taiwan, Dec. 2012
  36. Christine Peijinn Chai, He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Yun-Hsin Chuang, Chin-Laung Lei, Chun-Ying Huang, Chi-Wen Teng, Yuh-Sheng Shaw and Minsiong Liang, “A Lightweight Mutual Authentication Scheme for Advanced Metering Infrastructure,” The 2nd. International Conference on Applied and Theoretical Information Systems Research, Taipei, Taiwan, Dec. 2012
  37. Jing-Kai Lou, Kuan-Ta Chen, Hwai-Jung Hsu, and Chin-Laung Lei, “Foretelling Online Game Addictveness,” 2012 International Workshop on Network and Systems Support for Games (NetGames 2012), Venice, Italy, Nov. 2012
  38. Yeng-Ting Lee, Kuan-Ta Chen, Han-I Su, and Chin-Laung Lei, “Are All Games Equally Cloud-Gaming-Friendly? An Electromyographic Approach,” 2012 International Workshop on Network and Systems Support for Games (NetGames 2012), Venice, Italy, Nov. 2012
  39. Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen and Chin-Laung Lei, “An Analysis of Security Patch Lifecycle Using Google Trend Tool,” 7th Asia Joint Conference on Information Security, pp. 31-34, Tokyo, Japan, Aug. 2012
  40. He-Ming Ruan, Yu-Shian Chen and Chin-Laung Lei, “Data Integrity on Remote Storage for On-line Co-working,” 7th Asia Joint Conference on Information Security, pp. 92-99, Tokyo, Japan, Aug. 2012
  41. He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Enabling Efficient Batch Verification on Data Integrity for Remote Storage,” The 13th International Conference on Internet Computing, Las Vegas, USA, Jul. 2012
  42. Yi-Cheng Tsai, Zheng-Hui Chen, Jan-Ming Ho, Ming-Yang Kao, Chin-Laung Lei, and Szu-Lang Liao, “Closed-Form Mortgage Pricing Formula with Outstanding Principal as Prepayment Value,” IEEE Computational Intelligence, New York City, USA, Mar. 2012
  43. Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying Huang, and Chin-Laung Lei, “Measuring the latency of cloud gaming systems,” ACM international conference on Multimedi, pp. 1269-1272, Scottsdale, Arizona, USA, Dec. 2011
  44. Ren-Chiun Wang, Chun-Han Tung, and Chin-Laung Lei, “An Efficient Conference-Key Agreement Protocol for Mobile Devices,” National Computer Symposium, Chayi, Taiwan, Dec. 2011
  45. Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Sen-Jeng Chen, “A Mechanism on Risk Analysis of Information Security with Dynamic Assessment,” 3rd International Workshop on Managing Insider Security Threats, pp. 643-646, Fukuoka, Japan, Nov. 2011
  46. He-Ming Ruan, Yu-Sheng Yang, I-An Fan, Christine Peijinn Chai, Chun-Ying Huang and Chin-Laung Lei, “Security Threats in Advanced Metering Infrastructure,” The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan, Oct. 2011
  47. Chien-Ting Kuo, He-Ming Ruan, Chin-Laung Lei and Shih-Jen Chen, “AFRODITA: A Flexible Vulnerability Risk Scoring Database of Information Technology Security,” The 6th Joint Workshop on Information Security, Kaohsiung, Taiwan, Oct. 2011
  48. Yu-Chun Chang, Kuan-Ta Chen, Po-Han Tseng, and Chin-Laung Lei, “Understanding the Performance of Thin-Client Gaming,” 2011 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Naples, Florida, USA, May 2011
  49. He-Ming Ruan, Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework for Electronic Anonymous Auctions,” International Conference on Information Security, pp. 7-12, Hangchou, China, Apr. 2011
  50. Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “Quantifying QoS Requirements of Network Services: A Cheat-Proof Framework,” ACM Multimedia Systems Conference (MMSys 2011), pp. 81-92, San Jose, U.S.A., Feb. 2011
  51. Yeng-Ting Lee, Kuan-Ta Chen, Yun-Maw Cheng, and Chin-Laung Lei, “World of Warcraft Avatar History Dataset,” ACM Multimedia Systems Conferene, pp. 123-128, San Jose, U.S.A, Feb. 2011
  52. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Laung Lei, “DevilTyper: A Game for Quantifying the Usability of CAPTCHA Tests,” 7th ACM International Conference on Advances in Computer Entertainment Technology, Taipei, Taiwan, Nov. 2010
  53. Chia-Chang Hsu, and Chin-Laung Lei, “A Search for Location Aided Routing Enhancement in Mobile Ad-Hoc Networks,” 8th ACM International Symposium on Mobility Management and Wireless Access, pp. 121-124, Bodrum, Turkey, Oct. 2010
  54. Jing-Kai Lou, Shou-de Lin, Kuan-Ta Chen, and Chin-Laung Lei, “What Can the Temporal Social Behavior Tell Us? An Estimation of Vertex-Betweenness Using Dynamic Social Information,” The 2010 International Conference on Advances in Social Networks Analysis and Mining, pp. 56-63, Odense, Denmark, Aug. 2010
  55. Yu-Chun Chang, Chi-Jui Chang, Kuan-Ta Chen, and Chin-Laung Lei, “Radar Chart: Scanning for High QoE in QoS Dimensions,” 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Vancouver, British Columbia, Canada., Jun. 2010
  56. Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, Chien-Ju Ho, and Chin-Laung Lei, “Online Game QoE Evaluation using Paired Comparisons,” 2010 Annual IEEE Communications Quality and Reliability (CQR) International Workshop, Vancouver, British Columbia, Canada, Jun. 2010
  57. Yu-Shian Chen, and Chin-Laung Lei, “Generic Framework Intimating Conventional Anonymous Auctions,” the 20th Cryptology & Information Security Conference, Hsinchu, Taiwan, May 2010
  58. Yu-Shian Chen, and Chin-Laung Lei, “Filtering False Messages En-route in Wireless Multi-hop Networks,” IEEE Wireless Communications and Networking Conference, Sydney, Australia, Apr. 2010
  59. Yen-Hua Liao, Chin-Laung Lei, and Wen-Chi Tsai, “A Robust Grid-based Key Predistribution Scheme for Sensor Networks,” Fourth International Conference on Innovative Computing, Information and Control, Kaohsiung, Taiwan, Dec. 2009
  60. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Privacy and Delegation Enhanced User Authentication Protocol for Portable Communication Systems,” Workshop on Mobile Computing and Wireless Communication, NCS2009 (Recipient of the Excellent Paper Award), Taipei, Taiwan, Nov. 2009
  61. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “Tame Pool-based Pairwise Key Predistribution for Large-scale Sensor Networks,” IEEE Global Communications Conference 2009 (GLOBECOM'09), Hawaii USA, Nov. 2009
  62. Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin-Laung Lei, “A Crowdsourceable QoE Evaluation Methodology for Multimedia Content,” ACM Multimedia 2009, pp. 491-500, Beijing, China, Oct. 2009
  63. Chia-Chang Hsu, and Chin-Laung Lei, “A Geographic Scheme with Location Update for Ad Hoc Routing,” International Conference on Systems and Networks Communications (Recipient of the Best Paper Award), pp. 43-48, Porto, Portugal, Sept. 2009
  64. Yen-Hua Liao, Chin-Laung Lei, Ai-Nung Wang, and Wen-Chi Tsai, “A Robust Hypercube-based Pairwise Key Establishment for Sensor Networks,” The 4th Joint Workshop on Information Security, Kaohsiung, Taiwan, Aug. 2009
  65. Powen Chi, and Chin-Laung Lei, “A Prevention Approach to Scrambling Attack in WiMAX Networks,” The 10th IEEE International Symposium on a World of Wireless, Mobile and Multmedia Networks, Kos, Greece, Jul. 2009
  66. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “An Empirical Evaluation of VoIP Playout Buffer Dimensioning in Skype, Google Talk, and MSN Messenger,” The 19th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 97-102, Williamsburg, Virginia, USA, Jul. 2009
  67. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Peer-to-Peer Application Recognition Based on Signaling Activity,” IEEE International Conference on Communications (ICC), Dresden, Germany, Jun. 2009
  68. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Security Enhancement for Two User Identification Schemes with Anonymity against Active Attacks,” the 19th Cryptology & Information Security Conference, Taipei, Taiwan, Jun. 2009
  69. Jing-Kai Lou, Kuan-Ta Chen, and Chin-Laung Lei, “A Collusion-Resistant Automation Scheme for Social Moderation Systems,” the 6th annual IEEE Consumer Communications and Networking Conference, Las Vegas, Nevada, USA, Jan. 2009
  70. Yu-Chun Chang, Kuan-Ta Chen, Chen-Chi Wu, and Chin-Laung Lei, “Inferring Speech Activity from Encrypted Skype Traffic,” IEEE Global Telecommunications Conference, 2008 (GLOBECOM'08, pp. 2143-2147, New Orleans, USA, Dec. 2008
  71. Jiunn-Jye Lee, Hann-Huei Chiou, Yu-Sheng Yang, Yu-Cheng Su, and Chin-Laung Lei, “A Sector-Based Routing Model over Structured Peer-to-Peer Networks,” International Workshop on Wireless Technologies for Smart Homes, Ilan, Taiwan., Sept. 2008
  72. Li Chen, Chia-Chang Hsu, and Chin-Laung Lei, “A Location-ID Sensitive Key Establishment Scheme in Static Wireless Sensor Networks,” International Workshop on Wireless Technologies for Smart Homes, Ilan, Taiwan, Sept. 2008
  73. Cheng-Chun Tu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “OneClick: A Framework for Capturing Users Network Experiences,” ACM SIGCOMM 2008 (poster), pp. 485-486, Seattle, USA, Aug. 2008
  74. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting Peer-to-Peer Activity by Signaling Packets,” ACM SIGCOMM 2008 (poster), pp. 487-488, Seattle, USA, Aug. 2008
  75. Wen-Shenq Juang, Chin-Laung Lei, Horng-Twu Liaw and Wei-Ken Nien, “Robust and Efficient Three-party User Authentication and Key Agreement Using Bilinear Pairings,” The 3rd Joint Workshop on Information Security, pp. 85-96, Seoul, Korea, Jul. 2008
  76. Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Lightweight Broadcast Authentication for Multiple Senders in Sensor Networks,” The 3rd Joint Workshop on Information Security, pp. 436-448, Seoul, Korea, Jul. 2008
  77. Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, and Chin-Laung Lei, “Detecting VoIP Traffic Based on Human Conversation Patterns,” IPTComm 08: the Second Conference on Principles, Systems and Applications of IP Telecommunications, pp. 280-295, Heidelberg, Germany, Jul. 2008
  78. Yu-Shian Chen, I-Lun Lin, and Chin-Laung Lei, “Broadcast Authentication in Sensor Networks using Compressed Bloom Filters,” the 4th IEEE International Conference on Distributed Computing in Sensor Systems, pp. 99-111, Santorini Island, Greece, Jun. 2008
  79. 12. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Web Metering Scheme for Fair Advertisement Transactions,” the 2nd International Conference on Information Security and Assurance, pp. 453-356, Busan, Korea, Apr. 2008
  80. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “An Anonymous and Deniable Conversation for a Thin Client,” Fourth International Symposium on Frontiers in Networking with Applications (FINA2008), pp. 416-421, Ginowan city, Okinawa, Mar. 2008
  81. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Simple and Efficient Key Exchange Scheme Against the Smart Card Lost Problem,” The Third International Symposium on Security in Ubiquitous Computing, pp. 728–744, Taipei, Taiwan, Dec. 2007
  82. Li Yuan Lee, Jiunn Jye Lee, and Chin-Laung Lei, “A Universal Anonymous System for Structured Peer-to-Peer Networks,” IEEE TENCON 2007, Taipei, Taiwan., Oct. 2007
  83. Chien-Hua Chiu, and Chin-Laung Lei, “A High-Performance Clustering Scheme with Application in Network Intrusion Prevention System,” the 7th IEEE International Symposium on Communications and Information Technologies, pp. 1219-1224, Sydney, Australia, Oct. 2007
  84. Chun-Ying Huang, and Chin-Laung Lei, “Bounding Peer-to-Peer Upload Traffic in Client Networks,” 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-2007), Edinburgh, UK, Jun. 2007
  85. Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei, “A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing Environments,” 2007 International Conference on Multimedia and Ubiquitous Engineering, pp. 313-318, Seoul, Korea, Apr. 2007
  86. Jiunn-Jye Lee, Chun-Ying Huang, and Chin-Laung Lei, “Design and Implementation of Secure Communication Channels over UPnP Networks,” 2007 International Conference on Multimedia and Ubiquitous Engineering, pp. 307-312, Seoul, Korea., Apr. 2007
  87. Kuan-Ta Chen, and Chin-Laung Lei, “Network Game Design: Hints and Implications of Player Interaction,” NetGames 2006, Singapore., Oct. 2006
  88. Yu-Shian Chen, Chin-Laung Lei, Yu-Peng Chiu, and Chun-Ying Huang, “Confessible Threshold Ring Signatures,” International Conference on Systems and Networks Communications (ICSNC 2006), Tahiti, French Polynesia., Oct. 2006
  89. Chien-Hua Chiu, Chin-Yen Lee, Pan-Lung Tsai, Chun-Ying Huang, and Chin-Laung Lei, “Building High-Performance Reconfigurable Bandwidth Controllers with Adaptive Clustering,” International Conference on Systems and Networks Communications (ICSNC 2006), Tahiti, French Polynesia., Oct. 2006
  90. Kuan-Ta Chen, Chun-Ying Huang, Polly Huang, and Chin-Laung Lei,, “Quantifying Skype User Satisfaction,” ACM SIGCOMM 2006, pp. 399-410, Pisa, Italy, Sept. 2006
  91. Kuan-Ta Chen, and Chin-Laung Lei, “Design Implications of Social Interaction for Online Games,” IFIP 5th International Conference on Entertainment Computing (ICEC 2006), pp. 318-321, Cambridge, UK, Sept. 2006
  92. C. Y. Huang, K. T. Chen, and C. L. Lei,, “Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter,” 2006 International Conference on Dependable Systems and Networks (DSN-2006), pp. 403-412, Philadelphia, PA, USA, Jun. 2006
  93. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei, “On the Sensitivity of Online Game Playing Time to Network QoS,” to appear in the 25th Conference on Computer Communications (IEEE INFOCOM 2006), Barcelona, Spain, Apr. 2006
  94. C. Y. Huang, Y. P. Chiu, K. T. Chen, and C. L. Lei,, “A Distributed Key Assignment Protocol for Secure Multicast Based on Proxy Cryptography,” to appear in ACM Symposium on InformAtion, Computer and Communications Security, Taipei, Mar. 2006
  95. P. L. Tsai, C. Y. Huang, Y. Y. Huang, C. C. Hsu, and C. L. Lei, “A Clustering and Traffic-Redistribution Scheme for High-Performance IPsec Virtual Private Networks\,” the 12th Annual IEEE International Conference on High Performance Computing, pp. 432-443, Goa, India, Dec. 2005
  96. J. H. Kuo, S. U. Te, P. T. Liao, C. Y. Huang, P. L. Tsai, C. L. Lei, Sy-Yen Kuo, Y. Huang, and Z. Tsai,, “An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing,” The 11th IEEE International Symposium Pacific Rim Dependable Computing (PRDC 05), pp. 133-139,, Changsha, China, Dec. 2005
  97. C. Y. Huang, Y. P. Chiu, K. T. Chen, H. H. Chiou, and C. L. Lei, “Secure Content Delivery using Key Composition,”,” 30th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, Nov. 2005
  98. H. H. Chiou, P. L. Tsai, J. J. Lee, H. F. Tung, and C. L. Lei, “Extending Cluster File Systems beyond Last Miles,” IEEE TENCON’05,, Melbourne, Australia, Nov. 2005
  99. C. L. Chang, Y. P. Chiu and C. L. Lei, “Automatic Generation of Conflict-Free IPSec Policies,” International Conference on Formal Techniques for Networked and Distributed Systems, pp. 233-246, Taipei,, Oct. 2005
  100. J. J Lee, P. L. Tsai, and C. L. Lei, “An On-Line Page-Structure Approximation Scheme for Web Proxies,” IEEE Distributed, Parallel and Network Applications, pp. 769-773, Fukuoka, Japan, Jul. 2005
  101. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “Game Traffic Analysis: An MMORPG Perspective,” 15th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pp. 19-24, Washington, Jun. 2005
  102. C. L. Lei, P. W. Chi, and Y. P. Chiu, “A CRT-Based Key Pre-distribution Scheme for Sensor Networks,” the 15th Conference on Information Security,, pp. 68-75, May 2005
  103. K. T. Chen, P. Huang, C. Y. Huang, and C. L. Lei,, “The Impact of Network Variabilities on TCP Clocking Schemes,” 8th IEEE Global Internet Symposium (in conjunction with IEEE INFOCOM 2005), pp. 97-102, Miami, USA, Mar. 2005
  104. Y. P. Chiu, C. L. Lei, and C. Y. Huang, “Secure Multicast Using Proxy Encryption,” the Seventh International Conference on Information and Communications Security, pp. 280-290, Beijing, China, 2005
  105. P. L. Yu, P. L. Tsai, and C. L. Lei, “A Content-Protection Scheme for Multi-Layered Reselling Structures,” 19th IFIP International Information Security Conference, pp. 339-349, Aug. 2004
  106. P. L. Tsai and C. L. Lei, “A Session Migration Scheme for Smart Web Services in Mobile Computing,” Proceedings of the International Symposium on Web Services and Applications (ISWS '04),, pp. 846-850, Jun. 2004
  107. P. L. Tsai, C. L. Lei, and W. Y. Wang, “A Remote Control Scheme for Ubiquitous Personal Computing,” IEEE International Conference on Networking, Sensing and Control, pp. 1020-1025, 2004
  108. C. Y. Huang, and C. L. Lei, “Roundly Router Stamping: Detect and Mitigate DDoS Attacks,” Proceedings of the 14th Conference on Information Security (candidate for best paper), pp 39-46, 2004
  109. Y. P. Chiu, C. L. Lei, and P. L. Yu, “Comments on Improved Proxy Deposit Protocol for E-cash Systems,” Proceedings of the 14th Conference on Information Security, pp 460-462, 2004
  110. C. L. Lei, “Design and Implementation of a Secure and High Performance Linux-Based Cluster File System,” 2003 International Conference on Open Source, pp. 191-196, 2003
  111. Y. M. Hsu and C. L. Lei, “On Secure Transaction Flow for Distributed E-marketplaces from Mobile Agent Perspective,” The fourth Workshop for Management Sciences, pp. 272-288, 2003
  112. P. L. Yu, C. L. Lei, H. J. Chen and C. Y. Huang, “User Efficient Fair Blind Signatures,” Proceedings of the Second International Workshop for Asia Public Key Infrastructure, pp. 101-103, 2003
  113. C. L. Lei and M. H. Chan, “An Efficient Anonymous Buyer-Seller Watermarking Protocol,” 2002 International Computer Symposium, Workshop on Cryptology and Information Security, 2002
  114. C. L. Lei and Y. M. Hsu, “Designing E-Marketplace for Wireless PDA using Mobile Agents and Kerberos,” 4th Workshop on Cyberspace:Information, Law and Society, pp. 278-286, 2002
  115. C. L. Lei and Y. M. Hsu, “Building E-marketplaces with Mobile Agents,” The 2002 Conference on Technology and Management-Production-Commerce Integration and Collaborative Management in e-Era, pp. 51-59, 2002
  116. C. L. Lei and Y. M. Hsu, “Mobile Agents for E-marketplaces in Wireless Networks,” The 13th Workshop on Object Oriented Technology and Application, pp. 285-294, 2002
  117. W. S. Juang, H. T. Liaw, and C. L. Lei, “A Practical Anonymous Payment Scheme for Electronic Commerce,” The Seventh International Conference on Distributed Multimedia Systems, pp. 305-311, 2001
  118. P. L. Yu, C. L. Lei, C. I. Fan and H. J. Chen, “A User Efficient Fair E-cash Scheme without On-line Trusted Third Party,” The 2001 International Workshop on Cryptology and Network Security, pp. 246-251, 2001
  119. C. I. Fan, C. L. Lei, and Y. P. Chiu, “A Fast Blind Signature Scheme,” The 2001 International Workshop on Cryptology and Network Security, pp. 189-193, 2001
  120. P. L. Tsai, and C. L. Lei, “Towards Ubiquitous Computing via Secure Desktop Service,” IEEE Region 10 International Conference on Electrical and Electronics Technology, pp. 187-190, 2001
  121. P. L. Yu, and C. L. Lei, “A User Efficient Fair E-cash Scheme with Anonymous Certificates,” IEEE Region 10 International Conference on Electrical and Electronics Technology, pp. 74-77, 2001
  122. W. S. Juang, H. T. Liaw, C. L. Lei, and P. C. Lin, “Fair Blind Threshold Signatures in Wallet with Observers,” Proceedings of 2001 National Computer Symposium, pp. 1-8, 2001
  123. L. F. Chen, and C. L. Lei, “A Computer Immune System using Mobile Agents,” Proceedings of the First National Internet Engineering Conference, 2001
  124. W. S. Juang, H. T. Liaw, C. L. Lei, and P. L. Yu, “A Secure and Anonymous Multi-authorties E-cash Scheme,” Proceedings of the 11th Conference on Information Security, pp. 281-288, 2001
  125. C. I. Fan, C. L. Lei, and Y. P. Chiu, “Comments on Improved User Efficient Blind Signatures,” Proceedings of the 11th Conference on Information Security, pp. 51-53, 2001
  126. P. L. Yu, and C. L. Lei, “A Proxy Deposit Protocol for E-Cash Systems,” Proceedings of the 11th Conference on Information Security, pp. 289-295, 2001
  127. H. H. Chiou, I. C. Lai, and C. L. Lei, “Prediction-Capable Data Compression Algorithms for Improving Transmission Efficiency on Distributed Systems,” 20th International Conference on Distributed Computing Systems, pp. 654-661, 2000
  128. P. L. Yu, C. L. Lei, and L. F. Chen, “An Efficient Inter-Domain Group Key Management Scheme,” 2000 International Computer Symposium, Workshop on Cryptology and Information Security, pp. 21-26, 2000
  129. S. F. Tsai, C. L. Lei and I. C. Lai, “An Efficient Tree-Based Processor Allocation Scheme for Mesh Connected Systems,” 2000 International Computer Symposium, Workshop on Software Engineering and Database Systems, pp. 168-175, 2000
  130. C. L. Lei, and W. S. Juang, “Provably Secure Blind Threshold Signatures Based on Discrete Logarithm,” Proceedings of 1999 National Computer Symposium, pp. C198-C205, 1999
  131. Y. C. Sun, and C. L. Lei, “Skins as a Mechanism for Making Languages Syntactically Extensible,” Proceedings of 1999 National Computer Symposium, A181-A187, 1999
  132. C. I. Fan, and C. L. Lei, “A Privacy Enhanced Election Scheme with Spare Votes for Simplifying Possible Re-Voting Process,” Proceedings of 1999 National Computer Symposium, pp. C269-C276, 1999
  133. C. L. Lei, “Issues for Building Virtual Private Networks,” Proceedings of the 1999 Computer & Communications Technologies conference, 1999

Books:

  1. Shiuh-Jeng Wang, Chung-Huang Yang, and Chin-Laung Lei, “Computer and Network Security in Practice Applying to High-tech Society,” DrMaster Press Co., Ltd., Taiwan, 506 pages, Sept. 2009, ISBN:978-986-201-254-3
  2. Tzong-Chen, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee, “Information Security,” LNCS5222, Springer, USA, 504 pages, Sept. 2008, ISBN:978-3-540-85884-3
  3. Wen-Shenq Juang, Sian-Teng Chen and Chin-Laung Lei,, “VoIP Security (in Collected Papers on Information and Communication Security),” Science & Technology Policy Research and Information Center, National Applied Research Laboratories, Taiwan, R.O.C., Nov. 2006, ISBN:957-619-133-5
  4. C. L. Lei, and Chun-I Fan, “The Security of Mobile E-Commerce,” Science and Technology Policy Research and Information Center, NARL, Taiwan, R.O.C., 158 pages, Jun. 2005, ISBN:957-619-124-6

Patents:

  1. Yu-Shian Chen and Chin-Laung Lei, “Method for processing and verifying remote dynamic data, system using the same, and computer-readable medium,” 美國專利 US 9378155 B2, Jun. 2016
  2. 郭建廷、阮鶴鳴、雷欽隆, “資訊安全稽核管控系統、方法及其電腦可讀取紀錄媒體,” 中華民國專利 發明第 I482047 號, Apr. 2015
  3. 陳煜弦、雷欽隆, “遠端動態資料的處理與驗證方法、系統,以及電腦可讀記錄媒體,” 中華民國專利 發明第 I483138 號, Apr. 2015
  4. 阮鶴鳴, 雷欽隆, 劉永之, “存取控制系統及其存取控制方法,” 中華民國專利 發明第 I466525 號, Dec. 2014
  5. Chin-Laung Lei, Yung-Chih Liu, He-Ming Ruan, “Access Control System and Access Control Method Thereof,” 美國專利 US8909937 B, Sept. 2014
  6. Chin-Laung Lei, Yung-Chih Liu, He-Ming Ruan, “Access Control System and Access Control Method Thereof,” 德國專利 DE. 10 2011 088 550 B4, May 2013
  7. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “一種定位資訊之情境影像系統,” 中華民國專利 發明第 I 359952 號, Mar. 2012
  8. 阮鶴鳴、雷欽隆、劉永之, “存取控制系統及其存取控制方法,,” 中國專利 發明第 1912319號, Dec. 2011
  9. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “一種定位資訊之情境影像裝置,” 中華民國專利 第M345243號, Nov. 2008
  10. 趙涵捷、郭斯彥、顏嗣鈞、雷欽隆、紀廷運, “影像偵測觸控學習裝置,” 中華民國專利 第M340503號, Sept. 2008