Lih-Chyau Wuu

According to our database1, Lih-Chyau Wuu authored at least 39 papers between 1994 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Verifiable data hiding scheme with tamper detection.
J. Intell. Fuzzy Syst., 2019

2018
A high capacity data hiding scheme based on re-adjusted GEMD.
Multim. Tools Appl., 2018

2017
Anonymous and Authentication Protocol For Multi-Server.
Inf. Technol. Control., 2017

2016
An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A Formula Diamond Encoding Data Hiding Scheme.
J. Inf. Hiding Multim. Signal Process., 2015

Authenticated Secret Sharing Scheme Based on GMEMD.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2014
Group Key Management based on (2, 2) Secret Sharing.
KSII Trans. Internet Inf. Syst., 2014

Robust smart-card-based remote user password authentication scheme.
Int. J. Commun. Syst., 2014

2013
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy.
Inf. Technol. Control., 2013

2012
Quorum-based Key Management Scheme in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2012

A Secure Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2012

2011
IP Traceback Based on Chinese Remainder Theorem.
J. Inf. Sci. Eng., 2011

Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
Digitally signed document flexible sanitizing scheme based on bilinear maps.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Adaptive reversible data hiding based on histogram.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

High Embedding Reversible Data Hiding Scheme for JPEG.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

High Flexible Sanitizing Signature Scheme Based on Bilinear Maps.
Proceedings of the Future Generation Information Technology, 2010

Detour Routing Protocol for Geographic Sensor Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

Zero-Collision RFID Tags Identification Based on CDMA.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
An Adaptive Control Scheme of Reserved Bandwidth for RPR in Steering Mode.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

2007
Building intrusion pattern miner for Snort network intrusion detection system.
J. Syst. Softw., 2007

A longest prefix first search tree for IP lookup.
Comput. Networks, 2007

A polymorphic shellcode detection mechanism in the network.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

IP traceback based on chinese remainder theorem.
Proceedings of the Sixth IASTED International Conference on Communications, 2007

2006
Randomized three-state alternator for uniform rings.
J. Parallel Distributed Comput., 2006

Anonymous and Transferable Coins in Pay-Fair Ecommerce.
IEICE Trans. Inf. Syst., 2006

2003
A Scalable Core Migration Protocol for Dynamic Multicast Tree.
J. Inf. Sci. Eng., 2003

2001
Constructing Delay-Bounded Multicast Trees in Computer Networks.
J. Inf. Sci. Eng., 2001

A Scalable Framework for Secure Group Communication.
Proceedings of the Networking, 2001

2000
Decentralized Reconfiguration of Multicast Trees on Faulty Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2000

Resource reservation and packet scheduling for prioritized delay-bounded multicast.
Proceedings of the IEEE International Conference on Networks 2000: Networking Trends and Challenges in the New Millennium, 2000

1999
A fair queueing algorithm for multiple-streams delay-bounded services.
Proceedings of the IEEE International Conference on Networks 1999, 1999

A CORBA framework for QoS-guaranteed multicast service in wireless ATM networks.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

A QoS-Based Resource Reservation Protocol for Priority-Differentiated Delay-Bounded Multicast.
Proceedings of the Broadband Communications: Convergence of Network Technologies, 1999

1997
Self-Stabilizing Token Circulation in Uniform Networks.
Distributed Comput., 1997

1995
Distributed Self-Stabilizing Systems.
J. Inf. Sci. Eng., 1995

1994
Identity Assignment in Uniform Synchronous Rings.
Inf. Process. Lett., 1994

Distributed Execution Model for Self-Stabilizing Systems.
Proceedings of the 14th International Conference on Distributed Computing Systems, 1994


  Loading...