×
Author ID: chang.chin-chen Recent zbMATH articles by "Chang, Chin-Chen"
Published as: Chang, Chin-Chen; Chang, C. C.; Chang, C.-C.; Chang, Chin-chen; Chang, Chinchen
Further Spellings: 張真誠
Homepage: http://msn.iecs.fcu.edu.tw/~ccc/english/
External Links: MGP · ORCID · dblp · GND
all top 5

Co-Authors

8 single-authored
11 Lin, Iuon-Chang
9 Chen, Chien-Yuan
9 Hwang, Kuo-Feng
9 Lin, Chia-Chen
8 Chang, Ya-Fen
8 Lee, Richard Chia-Tung
8 Wu, Tzong-Chen
7 Chan, Chi-Shiang
7 Hu, Yuchen
7 Lee, Jung-San
6 Huang, Hui-Feng
6 Lin, Chihyang
6 Yang, Wei-Pang
5 Chan, Chao-Wen
5 Chen, Tungshou
5 Chuang, Jun-Chou
5 Hwang, Minshiang
5 Tsai, Chwei-Shyong
4 Hsieh, Yi-Pei
4 Hwang, Shin-Jia
4 Lai, Yeu-Pong
4 Lee, Wei-Bin
4 Lou, Der-Chyuan
4 Tai, Wei-Liang
3 Chan, Yung-Kuan
3 Chou, Yung-Chen
3 Du, Min-Wen
3 Fan, Yi-Hsuan
3 Hu, Yih-Shin
3 Hung, Kuo-Lung
3 Jiang, Ji-Han
3 Lin, Chu-Hsing
3 Lin, Ming-Fen
3 Liu, Yanjun
3 Lu, Tzu-Chuen
3 Tsai, Piyu
3 Tseng, Chun-Sen
3 Tseng, Hsien-Wen
3 Wu, Chia-Chi
3 Wu, Hsienchu
3 Yang, Jen-Ho
2 Buehrer, Daniel J.
2 Chen, Chang-Chu
2 Chen, Kaimeng
2 Chen, Yuh-Jiun
2 Cheng, Ting-Fang
2 Cheng, Yi-Fang
2 Duan, Ding-Zhou
2 Guo, Cheng
2 Hsiao, Ju-Yuan
2 Huang, Pengcheng
2 Hwang, Ren-Junn
2 Kieu, The Duc
2 Kowng, Huey-Cheue
2 Kuo, Ying-Tse
2 Leu, Jyh-Jong
2 Li, Li
2 Lin, Peiyu
2 Liu, Li-Jen
2 Wang, Ching-Te
2 Wu, Wen-Chuan
2 Yang, Shu-Kai
2 Yeh, Yi-Shiung
2 Yu, Clement T.
2 Zhang, Shanqing
1 Brill, David
1 Cai, Yiqiao
1 Chang, Gerard Jennhwa
1 Chang, Pen-Yi
1 Chang, Shih-Chang
1 Changchien, S. Wesley
1 Chen, Chiuyuan
1 Chen, Guei-Mei
1 Chen, Hefeng
1 Chen, Rung-Ching
1 Chen, Tzungher
1 Chen, Yi
1 Chen, Yihui
1 Chen, Yonghong
1 Chen, Zhaoyi
1 Chiou, M. Y.
1 Chiu, Yi-Ping
1 Chou, Annie Y. H.
1 Chou, Henry
1 Chung, Chi-Yien
1 Chung, Lou-Zo
1 Das, Purnendu
1 Guo, Xiaoyun
1 Hong, Wien
1 Hsia, Hsien-Chu
1 Hsieh, JunWei
1 Hsu, Cheng-Yi
1 Hsu, Chingfang
1 Huang, Pai-Cheng
1 Huang, Yongfeng
1 Huang, Zhengan
1 Jan, Jinnke
1 Kang, Byeong Ho
1 Kao, Chia-Lin
1 Khan, Muhammad Khurram
...and 38 more Co-Authors
all top 5

Serials

34 Fundamenta Informaticae
14 Information Sciences
11 Pattern Recognition
9 Journal of Discrete Mathematical Sciences & Cryptography
8 International Journal of Computer Mathematics
7 Applied Mathematics and Computation
7 The Computer Journal. Section A / Section B
7 International Journal of Information and Management Sciences
7 Informatica (Vilnius)
6 Computers & Mathematics with Applications
6 Information Processing Letters
6 Informatica (Ljubljana)
5 International Journal of Applied Mathematics
5 International Journal of Computational and Numerical Analysis and Applications (IJCNAA)
5 Mathematical Biosciences and Engineering
4 Computers and Electrical Engineering
4 BIT
4 Signal Processing
4 Information Systems
4 Pattern Recognition Letters
4 Symmetry
3 IEEE Transactions on Software Engineering
2 Computer Systems Science and Engineering
2 Data & Knowledge Engineering
2 IEEE Transactions on Image Processing
2 Information
2 Applied Mathematical Sciences (Ruse)
1 Discrete Mathematics
1 IEEE Transactions on Computers
1 Journal of Information Processing
1 Networks
1 Cryptologia
1 Parallel Computing
1 The Journal of Visualization & Computer Animation
1 Designs, Codes and Cryptography
1 Computing Surveys
1 Real-Time Imaging
1 Mathematical Problems in Engineering
1 Parallel Algorithms and Applications
1 Soft Computing
1 Communications in Nonlinear Science and Numerical Simulation
1 Computing and Informatics
1 Computer Networks
1 International Journal of Wavelets, Multiresolution and Information Processing
1 Communications in Computer and Information Science

Publications by Year

Citations contained in zbMATH Open

79 Publications have been cited 292 times in 236 Documents Cited by Year
A novel efficient \((t,n)\) threshold proxy signature scheme. Zbl 1091.94033
Huang, Hui-Feng; Chang, Chin-Chen
17
2006
Sharing secrets in stego images with authentication. Zbl 1147.68503
Chang, Chin-Chen; Hsieh, Yi-Pei; Lin, Chia-Hsuan
16
2008
A virtual image cryptosystem based upon vector quantization. Zbl 0993.94544
Chen, Tung-Shou; Chang, Chin-Chen; Hwang, Min-Shiang
14
1998
Chaotic maps-based password-authenticated key agreement using smart cards. Zbl 1301.94135
Guo, Cheng; Chang, Chin-Chen
12
2013
Authenticated encryption schemes with message linkage. Zbl 0875.94115
Hwang, Shin-Jia; Chang, Chin-Chen; Yang, Wei-Pang
11
1996
Proper interval graphs and the guard problem. Zbl 0877.05034
Chen, Chiuyuan; Chang, Chin-Chen; Chang, Gerard J.
11
1997
An ElGamal-like cryptosystem for enciphering large messages. Zbl 1125.94323
Hwang, M. S.; Chang, C. C.; Hwang, K. F.
9
2002
On the design of a key-lock-pair mechanism in information protection systems. Zbl 0621.68060
Chang, C. C.
9
1986
Authenticated encryption schemes with linkage between message blocks. Zbl 1337.94048
Lee, Wei-Bin; Chang, Chin-Chen
9
1997
Parallel computation of the multi-exponentiation for cryptosystems. Zbl 0865.68042
Chang, Chin-Chen; Lou, Der-Chyuan
8
1997
Multilevel reversible data hiding based on histogram modification of difference images. Zbl 1151.68610
Lin, Chia-Chen; Tai, Wei-Liang; Chang, Chin-Chen
8
2008
Distortion-free secret image sharing mechanism using modulus operator. Zbl 1162.68434
Lin, Pei-Yu; Lee, Jung-San; Chang, Chin-Chen
7
2009
A scheme for threshold multi-secret sharing. Zbl 1075.94014
Chan, Chao-Wen; Chang, Chin-Chen
7
2005
A color image watermarking scheme based on color quantization. Zbl 1145.94474
Tsai, Piyu; Hu, Yu-Chen; Chang, Chin-Chen
7
2004
A steganographic method based upon JPEG and quantization table modification. Zbl 1021.68589
Chang, Chin-Chen; Chen, Tung-Shou; Chung, Lou-Zo
7
2002
Distributed query processing. Zbl 0564.68065
Yu, C. T.; Chang, C. C.
6
1984
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Zbl 1015.68159
Chang, Chin-Chen; Chuang, Jun-Chou
6
2002
A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. Zbl 1374.94313
Qin, Chuan; Chang, Chin-Chen; Chiu, Yi-Ping
6
2014
A new public-key cipher system based upon the Diophantine equations. Zbl 1061.68530
Lin, C. H.; Chang, C. C.; Lee, R. C. T.
6
1995
An information protection scheme based upon number theory. Zbl 0653.68111
Chang, C. C.
5
1987
Performance analysis of the generalised disc modulo allocation method for multiple key hashing files on multi-disc systems. Zbl 0653.68116
Chang, C. C.; Chen, C. Y.
5
1987
Performance analyses of Cartesian product files and random files. Zbl 0524.68058
Chang, C. C.; Du, M. W.
5
1984
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Zbl 1096.68756
Chang, Chin-Chen; Chan, Chi-Shiang; Fan, Yi-Hsuan
5
2006
Some forgery attacks on a remote user authentication scheme using smart cards. Zbl 1084.68534
Chang, Chin-Chen; Hwang, Kuo-Feng
4
2003
Optimal information retrieval when queries are not random. Zbl 0571.68081
Chang, C. C.
4
1984
Symbolic Gray code as a data allocation scheme for two-disc systems. Zbl 0757.68048
Chang, C. C.; Chen, H. Y.; Chen, C. Y.
4
1992
Access control in a hierarchy using a one-way trap door function. Zbl 0784.93008
Chang, C. C.; Buehrer, D. J.
4
1993
Secret image hiding and sharing based on the \((t,n)\)-threshold. Zbl 1123.68330
Chang, Chin-Chen; Lin, Chih-Yang; Tseng, Chun-Sen
3
2007
A parallel two-list algorithm for the knapsack problem. Zbl 0906.68079
Lou, Der-Chyuan; Chang, Chin-Chen
3
1997
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Zbl 1129.68478
Chang, Chin-Chen; Fan, Yi-Hsuan; Tai, Wei-Liang
3
2008
Cryptanalysis of an encryption scheme for binary images. Zbl 1010.68137
Chang, Chin-Chen; Yu, Tai-Xing
3
2002
A letter-oriented minimal perfect hashing scheme. Zbl 0589.68064
Chang, C. C.; Lee, R. C. T.
3
1986
Efficient cheater identification method for threshold schemes. Zbl 0876.68039
Chang, C.-C.; Hwang, R.-J.
3
1997
A secure voting system on a public network. Zbl 0888.90035
Chang, Chin-Chen; Wu, Wen-Bin
3
1997
Using smart cards to authenticate remote passwords. Zbl 0825.68371
Chang, C.-C.; Hwang, S.-J.
3
1993
Security enhancement for digital signature schemes with fault tolerance in RSA. Zbl 1142.94373
Lin, Iuon-Chang; Chang, Chin-Chen
2
2007
Lossless data hiding for color images based on block truncation coding. Zbl 1138.68627
Chang, Chin-Chen; Lin, Chih-Yang; Fan, Yi-Hsuan
2
2008
Symbolic Gray code as a perfect multiattribute hashing scheme for partial match queries. Zbl 0477.68117
Chang, C. C.; Lee, R. C. T.; Du, M. W.
2
1982
Similar image retrieval based on wavelet transformation. Zbl 1077.68925
Chang, Chin-Chen; Chuang, Jun-Chou; Hu, Yih-Shin
2
2004
Some properties of vectorial addition chains. Zbl 0839.68041
Chen, Yuh-Jiun; Chang, Chin-Chen; Yang, Wei-Pang
2
1994
Image matching using run-length feature. Zbl 1010.68865
Chan, Yung-Kuan; Chang, Chin-Chen
2
2001
A generalized secret image sharing and recovery scheme. Zbl 1031.68912
Tsai, Chwei-Shyong; Chang, Chin-Chen
2
2001
A watermarking scheme based on principal component analysis technique. Zbl 1084.68930
Chang, Chin-Chen; Chan, Chi-Shiang
2
2003
A lossless data embedding technique by joint neighboring coding. Zbl 1184.68230
Chang, Chin-Chen; Kieu, The Duc; Wu, Wen-Chuan
2
2009
A high-speed division algorithm in residue number system using parity-checking technique. Zbl 1090.68121
Yang, Jen-Ho; Chang, Chin-Chen; Chen, Chien-Yuan
2
2004
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli. Zbl 1102.11314
Chang, Chin-Chen; Lai, Yeu-Pong
2
2005
Optimal MMI file systems for orthogonal range retrieval. Zbl 0780.68019
Chen, C. Y.; Chang, C. C.; Lee, R. C. T.
2
1993
Application of principal component analysis to multi-disk concurrent accessing. Zbl 0647.68023
Chang, C. C.
1
1988
A recursive performance formula of the disc modulo allocation method for binary Cartesian product files. Zbl 0662.68117
Chang, C. C.; Chen, C. Y.
1
1988
A \((t, n)\) threshold secret sharing system with efficient identification of cheaters. Zbl 1158.94397
Lin, Iuon-Chang; Chang, Chin-Chen
1
2005
Full-searching equivalent vector quantization method using two-bounds triangle inequality. Zbl 1111.68035
Chang, Chin-Chen; Chen, Chang-Chu
1
2007
A concealed \(t\)-out-of-\(n\) signer ambigous signature scheme with variety of keys. Zbl 1148.68362
Chang, Ya-Fen; Chang, Chin-Chen; Lin, Pei-Yu
1
2007
The hierarchical ordering in multiattribute files. Zbl 0554.68011
Chang, C. C.; Du, M. W.; Lee, R. C. T.
1
1983
A method for computing Lucas sequences. Zbl 0969.68069
Wang, Ching-Te; Chang, Chin-Chen; Lin, Chu-Hsing
1
1999
An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation. Zbl 0949.68528
Lou, Der-Chyuan; Chang, Chin-Chen
1
2000
An ordered minimal perfect hashing scheme based upon Euler’s theorem. Zbl 0567.68037
Chang, C. C.
1
1984
Multiple disk allocation based on round-robin Hilbert curve for spatial data. Zbl 0911.90347
Chang, Chin-Chen; Jiang, Ji-Han
1
1998
A digital watermarking scheme using human visual effects. Zbl 0987.68569
Chang, Chin-Chen; Hwang, Kuo-Feng; Hwang, Min-Shiang
1
2000
An on-line electronic check system with mutual authentication. Zbl 1187.68203
Chang, Chin-Chen; Chang, Shih-Chang; Lee, Jung-San
1
2009
An adaptive two-stage edge detection scheme for digital color images. Zbl 1011.68790
Tsai, Piyu; Chang, Chin-Chen; Hu, Yu-Chen
1
2002
Parallel computation of the modular cascade exponentiation. Zbl 1049.68876
Chen, Yuh-Jiun; Chang, Chin-Chen; Yang, Wei-Pang
1
1995
High capacity data hiding in JPEG-compressed images. Zbl 1084.68940
Tseng, Hsien-Wen; Chang, Chin-Chen
1
2004
Scenery image segmentation using support vector machines. Zbl 1111.68752
Yu, Yuan-Hui; Chang, Chin-Chen
1
2004
Cryptanalysis of the modified remote login authentication scheme based on a geometric approach. Zbl 1080.68027
Chang, Chin-Chen; Lin, Iuon-Chang
1
2005
A division algorithm for residue numbers. Zbl 1131.68302
Chang, Chin-Chen; Lai, Yeu-Pong
1
2006
An efficient image authentication method based on Hamming code. Zbl 1118.68134
Chan, Chi-Shiang; Chang, Chin-Chen
1
2007
A digital watermarking scheme based on singular value decomposition. Zbl 1176.68227
Chang, Chin-Chen; Hu, Yih-Shin; Lin, Chia-Chen
1
2007
A new \((t,n)\)-threshold scheme based on difference equations. Zbl 1176.94067
Chan, Chao-Wen; Chang, Chin-Chen
1
2007
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Zbl 1156.94417
Lin, Iuon-Chang; Chang, Chin-Chen
1
2009
Hiding digital watermarks using fractal compression technique. Zbl 1061.68046
Wu, Hsien-Chu; Chang, Chin-Chen
1
2004
Digital signature with message recovery using self-certified public keys without trustworthy system authority. Zbl 1070.94011
Chang, Ya-Fen; Chang, Chin-Chen; Huang, Hui-Feng
1
2005
A note on allocating k-ary multiple key hashing files among multiple disks. Zbl 0717.68024
Chang, C. C.; Chen, C. Y.
1
1991
A password authentication scheme based on discrete logarithms. Zbl 0742.68020
Wu, Tzong-Chen; Chang, Chin-Chen
1
1991
Hierarchy representations based on arithmetic coding for dynamic information protection systems. Zbl 0800.68393
Chang, C. C.; Lin, C. H.; Lee, R. C. T.
1
1992
On GDM allocation method for partial range queries. Zbl 0781.68050
Chen, C. Y.; Chang, C. C.
1
1992
A conference key broadcasting system using sealed locks. Zbl 0780.68031
Lin, C. H.; Chang, C. C.; Lee, R. C. T.
1
1992
Algebraic operations on encrypted relational databases. Zbl 0780.68026
Wu, Tzong-Chen; Yeh, Yi-Shiung; Chang, Chin-Chen
1
1993
A refinement of a compression-oriented addressing scheme. Zbl 0797.68050
Chang, Chin-Chen; Kowng, Huey-Cheue; Wu, Tzong-Chen
1
1993
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\). Zbl 1004.94017
Chen, Chien-Yuan; Chang, Chin-Chen
1
1999
A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. Zbl 1374.94313
Qin, Chuan; Chang, Chin-Chen; Chiu, Yi-Ping
6
2014
Chaotic maps-based password-authenticated key agreement using smart cards. Zbl 1301.94135
Guo, Cheng; Chang, Chin-Chen
12
2013
Distortion-free secret image sharing mechanism using modulus operator. Zbl 1162.68434
Lin, Pei-Yu; Lee, Jung-San; Chang, Chin-Chen
7
2009
A lossless data embedding technique by joint neighboring coding. Zbl 1184.68230
Chang, Chin-Chen; Kieu, The Duc; Wu, Wen-Chuan
2
2009
An on-line electronic check system with mutual authentication. Zbl 1187.68203
Chang, Chin-Chen; Chang, Shih-Chang; Lee, Jung-San
1
2009
A countable and time-bound password-based user authentication scheme for the applications of electronic commerce. Zbl 1156.94417
Lin, Iuon-Chang; Chang, Chin-Chen
1
2009
Sharing secrets in stego images with authentication. Zbl 1147.68503
Chang, Chin-Chen; Hsieh, Yi-Pei; Lin, Chia-Hsuan
16
2008
Multilevel reversible data hiding based on histogram modification of difference images. Zbl 1151.68610
Lin, Chia-Chen; Tai, Wei-Liang; Chang, Chin-Chen
8
2008
Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Zbl 1129.68478
Chang, Chin-Chen; Fan, Yi-Hsuan; Tai, Wei-Liang
3
2008
Lossless data hiding for color images based on block truncation coding. Zbl 1138.68627
Chang, Chin-Chen; Lin, Chih-Yang; Fan, Yi-Hsuan
2
2008
Secret image hiding and sharing based on the \((t,n)\)-threshold. Zbl 1123.68330
Chang, Chin-Chen; Lin, Chih-Yang; Tseng, Chun-Sen
3
2007
Security enhancement for digital signature schemes with fault tolerance in RSA. Zbl 1142.94373
Lin, Iuon-Chang; Chang, Chin-Chen
2
2007
Full-searching equivalent vector quantization method using two-bounds triangle inequality. Zbl 1111.68035
Chang, Chin-Chen; Chen, Chang-Chu
1
2007
A concealed \(t\)-out-of-\(n\) signer ambigous signature scheme with variety of keys. Zbl 1148.68362
Chang, Ya-Fen; Chang, Chin-Chen; Lin, Pei-Yu
1
2007
An efficient image authentication method based on Hamming code. Zbl 1118.68134
Chan, Chi-Shiang; Chang, Chin-Chen
1
2007
A digital watermarking scheme based on singular value decomposition. Zbl 1176.68227
Chang, Chin-Chen; Hu, Yih-Shin; Lin, Chia-Chen
1
2007
A new \((t,n)\)-threshold scheme based on difference equations. Zbl 1176.94067
Chan, Chao-Wen; Chang, Chin-Chen
1
2007
A novel efficient \((t,n)\) threshold proxy signature scheme. Zbl 1091.94033
Huang, Hui-Feng; Chang, Chin-Chen
17
2006
Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels. Zbl 1096.68756
Chang, Chin-Chen; Chan, Chi-Shiang; Fan, Yi-Hsuan
5
2006
A division algorithm for residue numbers. Zbl 1131.68302
Chang, Chin-Chen; Lai, Yeu-Pong
1
2006
A scheme for threshold multi-secret sharing. Zbl 1075.94014
Chan, Chao-Wen; Chang, Chin-Chen
7
2005
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli. Zbl 1102.11314
Chang, Chin-Chen; Lai, Yeu-Pong
2
2005
A \((t, n)\) threshold secret sharing system with efficient identification of cheaters. Zbl 1158.94397
Lin, Iuon-Chang; Chang, Chin-Chen
1
2005
Cryptanalysis of the modified remote login authentication scheme based on a geometric approach. Zbl 1080.68027
Chang, Chin-Chen; Lin, Iuon-Chang
1
2005
Digital signature with message recovery using self-certified public keys without trustworthy system authority. Zbl 1070.94011
Chang, Ya-Fen; Chang, Chin-Chen; Huang, Hui-Feng
1
2005
A color image watermarking scheme based on color quantization. Zbl 1145.94474
Tsai, Piyu; Hu, Yu-Chen; Chang, Chin-Chen
7
2004
Similar image retrieval based on wavelet transformation. Zbl 1077.68925
Chang, Chin-Chen; Chuang, Jun-Chou; Hu, Yih-Shin
2
2004
A high-speed division algorithm in residue number system using parity-checking technique. Zbl 1090.68121
Yang, Jen-Ho; Chang, Chin-Chen; Chen, Chien-Yuan
2
2004
High capacity data hiding in JPEG-compressed images. Zbl 1084.68940
Tseng, Hsien-Wen; Chang, Chin-Chen
1
2004
Scenery image segmentation using support vector machines. Zbl 1111.68752
Yu, Yuan-Hui; Chang, Chin-Chen
1
2004
Hiding digital watermarks using fractal compression technique. Zbl 1061.68046
Wu, Hsien-Chu; Chang, Chin-Chen
1
2004
Some forgery attacks on a remote user authentication scheme using smart cards. Zbl 1084.68534
Chang, Chin-Chen; Hwang, Kuo-Feng
4
2003
A watermarking scheme based on principal component analysis technique. Zbl 1084.68930
Chang, Chin-Chen; Chan, Chi-Shiang
2
2003
An ElGamal-like cryptosystem for enciphering large messages. Zbl 1125.94323
Hwang, M. S.; Chang, C. C.; Hwang, K. F.
9
2002
A steganographic method based upon JPEG and quantization table modification. Zbl 1021.68589
Chang, Chin-Chen; Chen, Tung-Shou; Chung, Lou-Zo
7
2002
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy. Zbl 1015.68159
Chang, Chin-Chen; Chuang, Jun-Chou
6
2002
Cryptanalysis of an encryption scheme for binary images. Zbl 1010.68137
Chang, Chin-Chen; Yu, Tai-Xing
3
2002
An adaptive two-stage edge detection scheme for digital color images. Zbl 1011.68790
Tsai, Piyu; Chang, Chin-Chen; Hu, Yu-Chen
1
2002
Image matching using run-length feature. Zbl 1010.68865
Chan, Yung-Kuan; Chang, Chin-Chen
2
2001
A generalized secret image sharing and recovery scheme. Zbl 1031.68912
Tsai, Chwei-Shyong; Chang, Chin-Chen
2
2001
An efficient divide-and-conquer technique for parallel computation of modular multi-exponentiation. Zbl 0949.68528
Lou, Der-Chyuan; Chang, Chin-Chen
1
2000
A digital watermarking scheme using human visual effects. Zbl 0987.68569
Chang, Chin-Chen; Hwang, Kuo-Feng; Hwang, Min-Shiang
1
2000
A method for computing Lucas sequences. Zbl 0969.68069
Wang, Ching-Te; Chang, Chin-Chen; Lin, Chu-Hsing
1
1999
A fast modular multiplication algorithm for calculating the product \(AB\) modulo \(N\). Zbl 1004.94017
Chen, Chien-Yuan; Chang, Chin-Chen
1
1999
A virtual image cryptosystem based upon vector quantization. Zbl 0993.94544
Chen, Tung-Shou; Chang, Chin-Chen; Hwang, Min-Shiang
14
1998
Multiple disk allocation based on round-robin Hilbert curve for spatial data. Zbl 0911.90347
Chang, Chin-Chen; Jiang, Ji-Han
1
1998
Proper interval graphs and the guard problem. Zbl 0877.05034
Chen, Chiuyuan; Chang, Chin-Chen; Chang, Gerard J.
11
1997
Authenticated encryption schemes with linkage between message blocks. Zbl 1337.94048
Lee, Wei-Bin; Chang, Chin-Chen
9
1997
Parallel computation of the multi-exponentiation for cryptosystems. Zbl 0865.68042
Chang, Chin-Chen; Lou, Der-Chyuan
8
1997
A parallel two-list algorithm for the knapsack problem. Zbl 0906.68079
Lou, Der-Chyuan; Chang, Chin-Chen
3
1997
Efficient cheater identification method for threshold schemes. Zbl 0876.68039
Chang, C.-C.; Hwang, R.-J.
3
1997
A secure voting system on a public network. Zbl 0888.90035
Chang, Chin-Chen; Wu, Wen-Bin
3
1997
Authenticated encryption schemes with message linkage. Zbl 0875.94115
Hwang, Shin-Jia; Chang, Chin-Chen; Yang, Wei-Pang
11
1996
A new public-key cipher system based upon the Diophantine equations. Zbl 1061.68530
Lin, C. H.; Chang, C. C.; Lee, R. C. T.
6
1995
Parallel computation of the modular cascade exponentiation. Zbl 1049.68876
Chen, Yuh-Jiun; Chang, Chin-Chen; Yang, Wei-Pang
1
1995
Some properties of vectorial addition chains. Zbl 0839.68041
Chen, Yuh-Jiun; Chang, Chin-Chen; Yang, Wei-Pang
2
1994
Access control in a hierarchy using a one-way trap door function. Zbl 0784.93008
Chang, C. C.; Buehrer, D. J.
4
1993
Using smart cards to authenticate remote passwords. Zbl 0825.68371
Chang, C.-C.; Hwang, S.-J.
3
1993
Optimal MMI file systems for orthogonal range retrieval. Zbl 0780.68019
Chen, C. Y.; Chang, C. C.; Lee, R. C. T.
2
1993
Algebraic operations on encrypted relational databases. Zbl 0780.68026
Wu, Tzong-Chen; Yeh, Yi-Shiung; Chang, Chin-Chen
1
1993
A refinement of a compression-oriented addressing scheme. Zbl 0797.68050
Chang, Chin-Chen; Kowng, Huey-Cheue; Wu, Tzong-Chen
1
1993
Symbolic Gray code as a data allocation scheme for two-disc systems. Zbl 0757.68048
Chang, C. C.; Chen, H. Y.; Chen, C. Y.
4
1992
Hierarchy representations based on arithmetic coding for dynamic information protection systems. Zbl 0800.68393
Chang, C. C.; Lin, C. H.; Lee, R. C. T.
1
1992
On GDM allocation method for partial range queries. Zbl 0781.68050
Chen, C. Y.; Chang, C. C.
1
1992
A conference key broadcasting system using sealed locks. Zbl 0780.68031
Lin, C. H.; Chang, C. C.; Lee, R. C. T.
1
1992
A note on allocating k-ary multiple key hashing files among multiple disks. Zbl 0717.68024
Chang, C. C.; Chen, C. Y.
1
1991
A password authentication scheme based on discrete logarithms. Zbl 0742.68020
Wu, Tzong-Chen; Chang, Chin-Chen
1
1991
Application of principal component analysis to multi-disk concurrent accessing. Zbl 0647.68023
Chang, C. C.
1
1988
A recursive performance formula of the disc modulo allocation method for binary Cartesian product files. Zbl 0662.68117
Chang, C. C.; Chen, C. Y.
1
1988
An information protection scheme based upon number theory. Zbl 0653.68111
Chang, C. C.
5
1987
Performance analysis of the generalised disc modulo allocation method for multiple key hashing files on multi-disc systems. Zbl 0653.68116
Chang, C. C.; Chen, C. Y.
5
1987
On the design of a key-lock-pair mechanism in information protection systems. Zbl 0621.68060
Chang, C. C.
9
1986
A letter-oriented minimal perfect hashing scheme. Zbl 0589.68064
Chang, C. C.; Lee, R. C. T.
3
1986
Distributed query processing. Zbl 0564.68065
Yu, C. T.; Chang, C. C.
6
1984
Performance analyses of Cartesian product files and random files. Zbl 0524.68058
Chang, C. C.; Du, M. W.
5
1984
Optimal information retrieval when queries are not random. Zbl 0571.68081
Chang, C. C.
4
1984
An ordered minimal perfect hashing scheme based upon Euler’s theorem. Zbl 0567.68037
Chang, C. C.
1
1984
The hierarchical ordering in multiattribute files. Zbl 0554.68011
Chang, C. C.; Du, M. W.; Lee, R. C. T.
1
1983
Symbolic Gray code as a perfect multiattribute hashing scheme for partial match queries. Zbl 0477.68117
Chang, C. C.; Lee, R. C. T.; Du, M. W.
2
1982
all top 5

Cited by 467 Authors

29 Chang, Chin-Chen
11 Hwang, Minshiang
7 Lee, Cheng-Chi
5 Lou, Der-Chyuan
5 Yang, ChingNung
4 Bahig, Hazem M.
4 Cao, Zhenfu
4 Chang, Ting-Yi
4 Hsu, Chien-Lung
4 Jan, Jinnke
4 Yang, Wei-Pang
3 Chen, Chien-Yuan
3 Chen, Tzungher
3 Czech, Zbigniew J.
3 Fathy, Khaled A.
3 Ghebleh, Mohammad
3 Havas, George
3 Kanso, Ali
3 Li, Chun-Ta
3 Liaw, Horng-Twu
3 Lin, Han-Yu
3 Majewski, Bohdan S.
3 Park, Jung-Heum
3 Tsai, Du-Shiau
3 Tseng, Yuh-Min
3 Tzeng, Shiang-Feng
3 Wu, Chialong
3 Yan, Xuehu
2 Amin, Ruhul
2 Bahig, Hatem M.
2 Biswas, G. P.
2 Cao, Feng
2 Chan, Chi-Kwong
2 Chan, Chi-Shiang
2 Chandra Mohan, B.
2 Chang, Te-Jen
2 Chen, Kaimeng
2 Chen, Tse-Shih
2 Chen, Tungshou
2 Chen, Wenyuan
2 Fan, Yi-Hsuan
2 Golovach, Petr A.
2 Guo, Cheng
2 Heidari, Shahrokh
2 Horng, Gwoboa
2 Houshmand, Monireh
2 Hsieh, Yi-Pei
2 Hu, Weitong
2 Hu, Yupu
2 Hwang, Tzonelih
2 Islam, Sk Hafizul
2 Kaya, Kamer
2 Lakshmi Sirisha, B.
2 Lee, Richard Chia-Tung
2 Lee, Sangjun
2 Lei, Chin-Laung
2 Li, Mingchu
2 Lim, Hyeong-Seok
2 Lozin, Vadim Vladislavovich
2 Okumura, Shinya
2 Phan, Raphael Chung-Wei
2 Sanches, Carlos Alberto Alonso
2 Selçuk, Ali Aydın
2 Soma, Nei Yoshihiro
2 Tsai, Chwei-Shyong
2 Tsai, Kuo-Yu
2 Wang, Baocang
2 Wang, Shiuhjeng
2 Wu, Tzong-Chen
2 Xie, Qi
2 Yanasse, Horacio Hideki
2 Yang, Guozheng
2 Yuan, Lifeng
1 Abdalla, Turki
1 Abraham, Siby
1 Ahmadabadi, J. Zarepour
1 Aïssani, Amar
1 Al-Ali, Afnan
1 Al-Maadeed, Somaya
1 Al-Otum, Hazem Munawer
1 Alazemi, Abdullah
1 Alelaiwi, Abdulhameed
1 Ali, Zulkarnain Md
1 Álvarez, Rafael
1 Anstee, Richard P.
1 Araki, Shunsuke
1 Aspin, Rob
1 Attari, Mahmoud Ahmadian
1 Babenko, M. G.
1 Baek, Jinsuk
1 Ballesteros, Miguel
1 Banerjee, Subhasish
1 Bao, Feng
1 Bao, Long
1 Basso, Alessandro
1 Behloul, Ali
1 Belferdi, Wassila
1 Benedetti, Bruno
1 Bergadano, Francesco
1 Bernini, Antonio
...and 367 more Authors
all top 5

Cited in 63 Serials

44 Information Sciences
25 Pattern Recognition
22 Applied Mathematics and Computation
11 Computers & Mathematics with Applications
8 International Journal of Computer Mathematics
8 Nonlinear Dynamics
8 Mathematical Biosciences and Engineering
7 Information Processing Letters
7 Signal Processing
7 Mathematical Problems in Engineering
6 Journal of Discrete Mathematical Sciences & Cryptography
5 Theoretical Computer Science
3 International Journal of Theoretical Physics
3 BIT
3 Multidimensional Systems and Signal Processing
3 European Journal of Operational Research
3 Communications in Nonlinear Science and Numerical Simulation
3 International Journal of Wavelets, Multiresolution and Information Processing
3 Arabian Journal for Science and Engineering
2 Mathematical and Computer Modelling
2 International Journal of Foundations of Computer Science
2 Wuhan University Journal of Natural Sciences (WUJNS)
2 Algorithms
2 Journal of Electrical and Computer Engineering
2 Computer Science Review
1 Bulletin of the Australian Mathematical Society
1 Communications in Mathematical Physics
1 Computer Physics Communications
1 Discrete Applied Mathematics
1 Computing
1 Journal of Graph Theory
1 Networks
1 European Journal of Combinatorics
1 Advances in Applied Mathematics
1 Parallel Computing
1 Order
1 Journal of Computer Science and Technology
1 Information and Computation
1 Computers & Operations Research
1 SIAM Journal on Discrete Mathematics
1 Japan Journal of Industrial and Applied Mathematics
1 MSCS. Mathematical Structures in Computer Science
1 Designs, Codes and Cryptography
1 Applied Intelligence
1 Applicable Algebra in Engineering, Communication and Computing
1 Cybernetics and Systems Analysis
1 Applied Mathematics. Series B (English Edition)
1 Journal of the Egyptian Mathematical Society
1 Soft Computing
1 Journal of the ACM
1 Annals of Combinatorics
1 Informatica (Vilnius)
1 Integers
1 Journal of Systems Science and Complexity
1 Journal of Applied Mathematics
1 Sādhanā
1 Quantum Information Processing
1 Journal of Zhejiang University. Science A
1 Signal, Image and Video Processing
1 Asian-European Journal of Mathematics
1 Symmetry
1 Pacific Journal of Mathematics for Industry
1 Matematicheskie Voprosy Kriptografii

Citations by Year