Ching-Te Wang

According to our database1, Ching-Te Wang authored at least 19 papers between 1996 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The prediction system for data analysis of stock market by using Genetic Algorithm.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
The Cleaning Machine Path Design Using Image Recognition Techniques.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
Liver Cell Nucleuses and Vacuoles Segmentation by Using Genetic Algorithms for the Tissue Images.
Proceedings of the Recent Trends in Applied Artificial Intelligence, 2013

2011
The image tampered detection and restoration using the characteristic values.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

The image multiple secret sharing schemes without pixel expansion.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2011

2010
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update.
Informatica, 2010

2009
An Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card.
Informatica (Slovenia), 2009

High Capacity Image Data Hiding Scheme for Grouping Palette Index.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

A Practice of Allied Network Security System.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

2007
Audio-Signal Authenticating System Based on Asymmetric Signature Schemes.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
A New Face Recognition Method for Blurred Images Using Multi-Channel Wiener Filter.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

2005
A New Detection Method for Tampered Audio Signals Based on Discrete Cosine Transformation.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

2004
Supervising Secret-Key Agreements in a Level-Based Hierarchy.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Using IC Cards to Remotely Login Passwords without Verification Tables.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Detecting and restoring the tampered images based on iteration-free fractal compression.
J. Syst. Softw., 2003

Signature Schemes Based on Two Hard Problems Simultaneously.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

2002
A New Micro-Payment System Using General Payword Chain.
Electron. Commer. Res., 2002

1998
Threshold signature schemes with traceable signers in group communications.
Comput. Commun., 1998

1996
A group-oriented (t, n) undeniable signature scheme without trusted center.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996


  Loading...