Yeu-Pong Lai

According to our database1, Yeu-Pong Lai authored at least 13 papers between 2003 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
The defense in-depth approach to the protection for browsing users against drive-by cache attacks.
Secur. Commun. Networks, 2015

2009
The implementation guidance for practicing network isolation by referring to ISO-17799 standard.
Comput. Stand. Interfaces, 2009

An Enhancement of JPEG Still Image Compression with Adaptive Linear Regression and Golomb-Rice Coding.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2007
Using the vulnerability information of computer systems to improve the network security.
Comput. Commun., 2007

Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

2006
A parallel residue-to-binary conversion algorithm without trial division.
Comput. Electr. Eng., 2006

A division algorithm for residue numbers.
Appl. Math. Comput., 2006

2005
A fast modular square computing method based on the generalized Chinese remainder theorem for prime moduli.
Appl. Math. Comput., 2005

A Parallel Modular Exponentiation Scheme for Transformed Exponents.
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005

A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
A convertible group signature scheme.
ACM SIGOPS Oper. Syst. Rev., 2004

2003
A flexible date-attachment scheme on e-cash.
Comput. Secur., 2003

Parallel computational algorithms for generalized Chinese remainder theorem.
Comput. Electr. Eng., 2003


  Loading...