Chu-Hsing Lin, Jung-Chun Liu, JIZ Chen, TP Chu (2019.11). On the Performance of Cracking Hash Function SHA-1 Using Cloud and GPU Computing. Wireless Personal Communications, 1(109), 491-504.
期刊論文
102筆資料 more...
Jung-Chun Liu, Chu-Hsing Lin*, Ken-Yu Lee (2019.11). Cloud-based Personal Data Protection System and its Performance Evaluation. Journal of Internet Technology, 01, 01-01.
Jung-Chun Liu, Chu-Hsing Lin, and Chi-Yuan Lin (2018.03). Accuracy Evaluation of Location Service Modes on Mobile
Devices. Sensors and Materials, 30(3), 373-383.
Chu-Hsing Lin, Jung-Chun Liu, and Ken-Yu Lee (2018.03). On Neural Networks for Biometric Authentication Based on Keystroke Dynamics. Sensors and Materials, 30(3), 385-396.
Cheng-Chieh Li, Chu-Hsing Lin and Jung-Chun Liu (2017.07). Parallel genetic algorithms on the graphics processing units using island model and simulated annealing. Advances in Mechanical Engineering, 9(7), 1-14.
Cheng-Chieh Li, Jung-Chun Liu, Chu-Hsing Lin, Winston Lo (2015.12). On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations. International Journal of Software Innovation, 3(4), 1-17.
Joy Iong-Zong Chen, Chu-Hsing Lin (2014.12). Algorithms for Promoting Anonymity of BS and for Prolonging Network Lifetime of WSN. Peer-to-Peer Networking and Applications, 7(4), 710-722.
Chu-Hsing Lin, Jung-Chun Liu, Hong-Yu Chang(2014.11)。影片浮水印在GPU平行計算之效能分析。Green Science&Technology Journal
綠色科學學刊,4(2),49-62。
Fuu-Cheng Jiang, Chu-Hsing Lin, Hsiang-Wei Wu (2014.10). Lifetime Elongation of Ad hoc Networks under Flooding Attack using Power-saving Technique. Ad Hoc Networks, 21(10), 84-96.
Joy Iong-Zong Chen, Chu-Hsing Lin (2014.04). Throughput Evaluation of a Novel Scheme to Mitigate the Congestion over WSNs. Wireless Personal Communications, 75(4), 1863-1877.
Chen-Yu Lee, Krishna M. Kavi, Deng-Jyi Chen, Yi-Shiung Yeh (2013.09). Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms. Journal of Information Science and Engineering, 29(5), 889-905.
Joy Iong-Zong Chen*, Lu-Tsou Yeh, Chu-Hsing Lin (2013.08). Performance Evaluation of Outage Probability and BER for MIMO-femtocell System over Spatial Correlated Channel. Computers and Electrical Engineering, 39, 1837-1845.
Fang-Yie Leu(呂芳懌),Chu-Hsing Lin, Aniello Castiglione (2013.04). Special issue on cloud, wireless and e-commerce security. Journal of Ambient Intelligence and Humanized Computing, 4(2), 207-208.
Chu-Hsing Lin, Hung-Yan Lin, Tang-Wei Wu, Ying-Hsuan Chen, Chien-Hua Huang (2013.04). Preserving Quality of Service for Normal Users against DDoS Attacks by Using Double Check Priority Queues. Journal of Ambient Intelligence and Humanized Computing, 4(2), 275-282.
Yi-Li Huang,Chu-Hsing Lin,Fang-Yie Leu(呂芳懌) (2012.07). A Batch Verification Scheme by Using the Matrix-Detection Algorithm(2). Journal of Internet Technology, 13(4), 681-690.
Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang(楊朝棟), Chu-Hsing Lin, Kuo-Hsiung Wang (2012.06). Design strategy for optimizing power consumption of sensor node with Min(N,T) policy M/G/1 queuing models(4). International Journal of Communication System, 25(5), 652-671.
Chu-Hsing Lin, Chen-Yu Lee, Tang-Wei Wu (2012.04). A Cloud-aided RSA Signature Scheme for Sealing and Storing the Digital Evidences in Computer Forensics. International Journal of Security and Its Applications, 6(2), 241-244.
Chu-Hsing Lin, Chen-Yu Lee, Shin-Pin Lai ,Wei-Shen Lai (2012.04). A Semantic Rule-based Detection Scheme against Flooding Attacks on Cloud Environment. International Journal of Security and Its Applications, 6(2), 341-346.
Chu-Hsing Lin*, Jung-Chun Liu, Chien-Hsing Lee, Tang-Wei Wu (2011.12). An Indoor Location-Aware System Based on Rotation Sampling in Positioning. Communications in Computer and Information Science, 265, 77-81.
Chu-Hsing Lin*, Chen-Yu Lee, Shu-Yuan Lu, Shih-Pei Chien (2011.12). Unseen Visible Watermarking for Gray Level Images Based on Gamma Correction. Communications in Computer and Information Science, 265, 236-243.
Chu-Hsing Lin*, Chen-Yu Lee, Tzu-Chien Yang, Shin-Pin Lai (2011.12). Visible Watermarking Based on Multi-parameters Adjustable Gamma Correction. Communications in Computer and Information Science, 265, 87-92.
Chu-Hsing Lin*, Jung-Chun Liu, Sheng-Hsing Tsai, Hung-Yan Lin (2011.12). Research on the ZigBee-Based Indoor Location Estimation Technology. Communications in Computer and Information Science, 265, 82-86.
Chao-Tung Yang, Chu-Hsing Lin*, Guey-Luen Chang (2011.09). Implementation of Image Watermarking Processes on Cloud Computing Environments(2). Communications in Computer and Information Science, 223, 131-140.
Lein Harn, Chu-Hsing Lin (2011.02). Contract signature in e-commerce. Computers & Electrical Engineering, 37(2), 169-173.
Chu-Hsing Lin, Chen-Yu Lee, Deng-Jyi Chen (2011.02). Modified Autonomous Key Management Scheme with Reduced
Communication/Computation Costs in MANET. COMPUTING AND INFORMATICS, 30(6), 1167-1180.
Fuu-Cheng Jiang, Chu-Hsing Lin, Der-Chen Huang, Chao-Tung Yang (2011.01). Dual Paths Node-disjoint Routing for Data Salvation in Mobile Ad hoc. Journal of Supercomputing, , 0-0.
Fuu-Cheng Jiang, Chu-Hsing Lin, Der-Chen Huang, Chao-Tung Yang (2011.01). Design strategy for optimizing power consumption of sensor node with Min(N, T) policy M/G/1 queuing models. International Journal of Communication Systems, , 0-0.
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo (2010.06). Priority Queue-based Scheme to Maintain Quality of Service for Normal User Suffering from Large DDoS Attacks. International Journal of Future Generation Communication and Networking, , 53-60.
Chu-Hsing Lin, Jung-Chung Liu, Wei-Cheng Hsu, Hsing-Weng Wang, Wei-Chih Lin, Jian-Wei Li, (2010.06). Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks. The 2nd International Conference on Advanced Communication and Networking, , 134-143.
Jung-Chun Liu, Chao-Tung Yang, Chu-Hsing Lin, Tsu-Fen Han,
Wei-Cheng Hsu, Ching-Ru Chen (2010.04). Design and Implementation ofa Cloud Computing Portal for G-BLAST. Journal of Computers, , 17-24.
Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Lia (2010.01). Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices. Computer Standards & Interfaces, , 10-17.
Yi-Fung Huang ,Chu-Hsing Lin ,and Kun-Li Wen (2009.09). A Pseudo Random Number Generator Based On Grey System Theory. Far East Journal of Mathematical Sciences, 35(1), 1-17.
Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, and Mei-Chun Chou (2009.06). Energy Analysis of Multimedia Video Streaming on Mobile Devices. LNCS 5576 Advances in Information Security and Assurance, 5576, 347-357.
Yi-Fung Huang, Chu-Hsing Lin, Kun-Lin Wen (2009.05). A Pseudorandom Number Generator Based on Energy System Theory. Far East Journal of Mathematical Sciences (FJMS), , 1-17.
Yi-Shiung Yeh, Chen-Yu Lee, Ting-Yu Huang, Chu-Hsing Lin (2009.05). A Transpositional Advanced Encryption Standard (AES) Resists 3-round Square Attack. International Journal of Innovative Computing, Information and Control, , 1-11.
Chihhsiong Shih, Pao-Ann Hsiung, Chieh-Hao Wan, Chorng-Shiuh Koong, Tang-Kun Liu (2009.05). "作者:Yi-Shiung Yeh, Chen-Yu Lee, Ting-Yu Huang, and Chu-Hsing Lin.
A Transpositional Advanced Encryption Standard (AES) Resists 3-round Square Attack.. International Journal of Future Generation Communication and Networking, 5(5), 1253-1264.
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang (2009.03). Safeguard Intranet Using Embedded and Distributed Firewall System. International Journal of Future Generation Communication and Networking, , 9-16.
C. S. Shih, P. A. Hsiung, C. H. Wan, C. S. Koong, T. K. Liu, Y. F. Yang, Chu-Hsing Lin, William C. C. Chu (2009.02). Integration of a Vision-based Tracking Platform, Visual Instruction, and Error Analysis, Models for an Efficient Billiard Training System. Optical Engineering, , -.
Chihhsiong Shih, Pao-Ann Hsiung, Chieh-Hao Wan, Chorng-Shiuh Koong, Tang-Kun, LiuYuanfan Yang, Chu-Hsing Lin, and William Cheng-Chung Chu (2009.02). "作者:Chihhsiong Shih, Pao-Ann Hsiung, Chieh-Hao Wan, Chorng-Shiuh Koong, Tang-Kun Liu, Yuanfan Yang, Chu-Hsing Lin, and William Cheng-Chung Chu 論文名稱:Integration of a Vision-based Tracking Platform, Visual Instruction, and Error Analysis, Models for an Efficient Billiard Training System. Optical Engineering, 48(2), -.
Chu-Hsing Lin, Jui-Ling Yu, Jung-Chun Liu, Wei-Shen Lai, Chia-Han Ho (2009.01). Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. International Journal of Hybrid Information Technology, , 21-30.
Chu-Hsing Lin, Yu-Ying Lin, Frode Eika Sandnes (2008.12). Integrity Protection of Binary Text Document Images Based on Image Topologies. International Journal of Pattern Recognition and Artificial Intelligence, , 1599-1620.
Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Lu, Hsun-Chi Huang,
Tsung-Che Yang(2008.10)。Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks。International Journal of Software Engineering and Its Applications,,61-72。
Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Liu, Yen-Lin Huang, and Mei-Chun Chou (2008.10). I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. International Journal of Multimedia and Ubiquitous Engineering, , 45-54.
Lung-Chun Lu, Chu-Hsing Lin, Jui-Ling Yu, Wei-Shen Lai,
Chia-Han Ho (2008.10). Anomaly Detection Using LibSVM Training Tools. International Journal of Security and Its Applications, , 89-98.
Jung-Chun Lu, Chu-Hsing Lin, Wei-Shen Lai, and Yan-Wei Lee (2008.10). A Robust Watermark Scheme for Copyright Protection(2). International Journal of Software Engineering and Its Applications, , 61-72.
C. S. Shih, L. A. Gerhardt, W. C. C. Chu, Chu-Hsing Lin,
C. H. Chang, C. H. Wan (2008.05). Non-Uniform Surface Sampling Techniques For 3D Object Inspection(4). Optical Engineering, , 1-14.
Chu-Hsing Lin, Jen-Chieh Chang, Ruei-Hau Hsu, Mei-Chun Chou (2008.04). Design and Application of Batch Verification Scheme on Internet E-Voting Systems. Journal of Computers, , 49-60.
C. C. Chang, Chu-Hsing Lin, C. Y. Chen (2007.10). A Conference Key Distribution Scheme Using Interpolating Polynomials. International Journal of Security and Its Applications, , 9-20.
Jue-Sam Chou, Chu-Hsing Lin ,Chia-Hung Chiu (2006.06). An Identity-Based Scheme for Ad Hoc Network Secure Routing Protocol from Pairing. WSEAS Transations on computers, , 1214-1221.
Jue-Sam Chou, Chu-Hsing Lin ,Chia-Hung Chiu (2006.06). Weakness of Shim’s New ID-based Tripartite Multiple-key Agreement. WSEAS Transactions on Information Science and Applications, , 1407-1410.
林祝興,賴威申,邱佳男,陳家漢(2006.01)。隨意網路上安全路由機制之研究。Communications of the Chinese Cryptography and Information Security Association,,39-57。
Chu-Hsing Lin, C. Y. Lee, H. M. Liu, Y. S. Yeh (2006.01). Distributed AAA on Wireless Mesh Network. Communications of the Chinese Cryptography and Information Security Association, , 76-92.
Chu-Hsing Lin, Ruei-Hau Hsu ,Lein Harn (2005.06). Improved DSA variant for batch verification. Applied Mathematics and Computation, , 75-81.
Jue-Sam Chou, Chu-Hsing Lin, Ting-Ying Lee (2005.03). A New Efficient Hierarchical Key Management Scheme. GESTS International Transaction on Computer Science and Engineering, , 59-68.
Chu-Hsing Lin, C. Y. Lee ,C. Y. Lee (2004.06). Comments on Saeednia's Improved Scheme for the Hill Cipher. Journal of the Chinese Institute of Engineering, , 743-746.
C. T. Wang, C. C. Chang, Chu-Hsing Lin (2004.05). Fast Cascade Exponentiation Schemes Based on String Compression Algorithms. Asian Journal of Information Technology, , 768-776.
Chu-Hsing Lin, C. Y. Lee, W. Lee (2004.05). Comments on the Yang-Chang-Hwang Anonymous Conference Key Distribution System. Computer Standards & Interfaces, , 171-174.
Chu-Hsing Lin, Y. Y. Lai (2004.05). A flexible biometrics remote user authentication scheme. Computer Standards & Interfaces, , 19-23.
Chu-Hsing Lin, W. C. Lee (2003.12). Design Role-based Access Control Systems Using XML Structure. Asian Journal of Information Technology, Grace Publications Network, , 283-293.
C. L. Lee, Chu-Hsing Lin, Y. S. Yeh ,W.S. Lai (2003.06). A Software Anti-Piracy System using Undeniable Signature and Smart Cards. Journal of Applied Systems Studies, , 1-1.
Chu-Hsing Lin ,C. Y. Lee (2003.05). A Software Protection System for Internet Commerce. Journal of Applied Systems Studies, , 1-1.
Chu-Hsing Lin, Y. S. Yeh, C. Y. Lee (2003.04). Keyed/Unkeyed SHA-2. Journal of Discrete Mathematical Sciences & Cryptography, , 45-58.
林祝興,李家豪(2003.03)。安全廣播之階層式金鑰管理。Communications of the Chinese Cryptography and Information Security Association,,28-38。
林祝興,林子馨,洪佳琪,葉義雄(2002.12)。資料庫加密。Communications of the Chinese Cryptography and Information Security Association(CCISA),,16-23。
Chu-Hsing Lin ,J. H. Lee (2002.10). An Efficient Hierarchical Key Management Scheme Based on Elliptic Curves. Journal of Interdisciplinary Mathematics, , 293-301.
Chu-Hsing Lin, H. W. Wang ,C. Y. Lee (2002.05). A Group Signature Scheme for Wireless Environment. Journal of Computers, , 32-40.
Yeh. Y. S., Chu-Hsing Lin, W. S. Lai (2002.04). Construct Message Authentication Code with SHA and AEA. Journal of Discrete Mathematical Sciences & Cryptography, , 73-83.
Wang. C.T., C. C. Chang, Chu-Hsing Lin (2002.02). A New Micro-Payment System using General Payword Chain. Electronic Commerce Research, , 159-168.
Chu-Hsing Lin ,Y. S Yeh (2002.02). Generalized GOST. Journal of Information & Optimization Sciences, , 345-353.
Chu-Hsing Lin (2001.12). Hierarchical Key Assignment without Public-key Cryptography. Computers & Security, , 612-619.
林祝興,李鎮宇,葉義雄(2001.07)。植基於智慧卡的軟體保護機制。東海科學,第三卷,,45-55。
林祝興,王保利(2001.07)。一個適用於無線網路環境的安全通道之建立。東海科學,第三卷,,81-93。
Chu-Hsing Lin ,K. H. Yang (2001.01). An Electronic Cash System Using Visual Secret Sharing Technology. Journal of Internet Technology: Special Issue on TANET2000 Conference, , 75-80.
Yeh, Y. S., Chu-Hsing Lin, C. C. Wang (2000.11). Dynamic GOST. Journal of Information Science and Engineering, , 857-861.
林祝興,李正隆,簡睿成(2000.07)。應用視覺式祕密分享的安全線上交談軟體之製作。東海科學,第二卷,,,43-53。
Wang. C. T., C. C. Chang, Chu-Hsing Lin (2000.06). Generalization of Threshold Signature and Authenticated Encryption for Group Communications. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, , 1228-1237.
Chang. C. C., C. T. Wang, Chu-Hsing Lin (2000.06). Conference Key Distributions Using Self-Certified Public Keys. International Journal of Applied Mathematics, , 327-337.
Yeh. Y. S., Chu-Hsing Lin, Lai. W. S., Wang. S. W. (2000.03). Implementation of Modified PGP. Journal of Computers, , 1-1.
Hsieh. T. M., Y. S. Yeh, Chu-Hsing Lin, S. H. Tuan (1999.09). One-Way Hash Functions with Changeable Parameters. Information Sciences, , 223-239.
Wang. C. T., C. C. Chang, Chu-Hsing Lin (1999.06). A Method for Computing Lucas Sequences. An International Journal Computers & Mathematics with Applications, , 187-196.
Wang. C. T., C. C. Chang ,Chu-Hsing Lin (1998.10). Conference Key Supervision in a Level-Based Hierarchy. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, , 2219-2227.
Wang. C. T., Chu-Hsing Lin ,C. C. Chang (1998.06). Threshold Signature Schemes with Traceable Signers in Group Communications. Computer Communications, , 771-776.
Chu-Hsing Lin ,T. C. Lee (1998.06). A Confused Document Encrypting Scheme and Its Implementation. Computers & Security, , 543-551.
Chu-Hsing Lin (1997.12). Dynamic Key Management Scheme for Access Control in Hierarchy. Computer Communications, , 1381-1385.
Chu-Hsing Lin ,W. C. Wu (1997.03). An Undeniable Signature Scheme Against Replay Attacks. Journal of Computers, , 20-25.
Chang. C. C. ,Chu-Hsing Lin (1996.12). A Generalized Secure Broadcasting Cryptosystem. Journal of Computers, , 13-18.
Chu-Hsing Lin, C. T. Wang ,C. C. Chang (1996.06). A Group-Oriented (t,n) Undeniable Signature Scheme without Trusted Center. Information Security and Privacy, Lecture Notes in Computer Science 1172, , 266-274.
Chu-Hsing Lin ,C. T. Wang (1996.02). Message Authentication Using Asymetric Enciphering Algorithm. Journal of National Chin-Yi Institute of Technology, R.O.C., , 463-471.
Chu-Hsing Lin, C. C. Chang ,R. C. T. Lee (1995.01). A New Public-Key Cipher System Based on the Diophantine Equations. IEEE Transactions on Computers, , 1-1.
Chu-Hsing Lin ,C. C. Chang (1994.11). A Method for Constructing a Group-oriented Cryptosystems. Computer Communications, , 805-808.
Chu-Hsing Lin ,C. T. Wang (1994.06). A New Secure Broadcasting Method Based On ElGamal's Scheme. Journal of National Chin-Yi Institute of Technology, , 211-224.
Chu-Hsing Lin ,C. C. Chang (1994.05). A Server-Aided Computation Protocol for RSA Enciphering Algorithm. International Journal of Computer Mathematics, , 149-155.
Chu-Hsing Lin (1993.07). Secure Communication for Users in Specified Access Instances. Tunghai Journal: College of Science, , 219-228.
Chu-Hsing Lin (1993.06). On the Design of Conference Key Distribution Schemes. Tunghai Journal, College of Science, , 729-742.
Chu-Hsing Lin, C. C. Chang ,R. C. T. Lee (1992.05). A Record-oriented Cryptosystem for Database Sharing. The Computer Journal, , 658-660.
Chu-Hsing Lin, C. C. Chang ,R. C. T. Lee (1992.05). A Conference Key Broadcasting System using Sealed Locks. Information Systems, , 323-328.
Chu-Hsing Lin, C. C. Chang ,R. C. T. Lee (1992.05). Hierarchy Representations Based on Arithmetic Coding for Dynamic Information Protection Systems. Information Sciences, , 35-48.
Chu-Hsing Lin, C. C. Chang , R.C. T. Lee (1991.05). An Efficient Access Control Scheme for Files Protection. Journal of the Chinese Institute of Engineering, , 319-324.
Chu-Hsing Lin, C. C. Chang ,R. C. T. Lee (1991.05). Password Authentication using Newton's Interpolating Polynomials. Information Systems, , 97-102.
Chu-Hsing Lin, C. C. Chang ,R. C. T. Lee (1990.05). A Dynamic Access Control Mechanism in Information Protection Systems. Journal of Information Science and Engineering, , 25-35.
Chang, C. C. ,Chu-Hsing Lin (1990.05). A Reciprocal Confluence Tree Unit and Its Applications. Bit, , 27-33.
Chang. C. C. ,Chu-Hsing Lin (1988.07). A Cryptosystem for Secure Broadcasting. Proceedings of the National Science Council, Republic of China, 12(4), 233-239.
研討會論文
150筆資料 more...
Chihhsiong Shih, Chu-Hsing Lin, Yu-Ching Weng, Jhen Yu Jian, Yu-Chiao Lin (2022.05). Implementation of a weakly supervised vitiligo treatment evaluation system. Paper presented at 4th IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability 2022, Taiwan: IIKII.
Chu-Hsing Lin, Ting-Chieh Weng, Chiao-Hsu Tsai (2022.05). Using deep learning to predict mortality in myocardial infarction patients. Paper presented at 4th IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability 2022, Taiwan: IIKII.
Rong-Ching Chang, Chun-Ming Lai, Kai-Lai Chang, Chu-Hsing Lin (2021.06). Dataset of Propaganda Techniques of the State-Sponsored Information Operation of the People's Republic of China. Paper presented at arXiv preprint arXiv:2106.07544, 網路: arXiv.
Chun-Ming Lai, Yi-Chen Liu, Rong-Ching Chang, Jon W Chapman, Chu-Hsing Lin (2020.12). Pandemic Response and Crisis Informatics: An Imperative for Public Health Messaging. Paper presented at 2020 International Computer Symposium (ICS), Tainan, Taiwan: NCKU.
Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin (2020.05). On Machine Learning Models for Heart Disease Diagnosis. Paper presented at 2nd Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability 2020, Osaka, Japan: IEEE Society.
Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin (2020.01). Detecting Security Breaches in Personal Data Protection with Machine Learning. Paper presented at 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), Taichung, Taiwan: IEEE Society.
Chu-Hsing Lin, Jung-Chun Liu, Po-Kai Yang (2020.01). Performance Enhancement of GPU Parallel Computing Using Memory Allocation Optimization. Paper presented at 2020 14th International Conference on Ubiquitous Information Management and Communication (IMCOM), Taichung, Taiwan: IEEE Society.
Chu-Hsing Lin, Po-Kai Yang, Yu-Chiao Lin (2019.04). On Heart Disease Diagnosis Systems Based on Neural Networks. Paper presented at 2019 IEEE International Conference on Applied System Innovation, Fukuoka, Japan: IEEE.
Chu-Hsing Lin, Hsiao-Wen Lu (2019.03). Response to Co-Resident Threats in Cloud Computing Using Machine Learning. Paper presented at The 33-rd International Conference on Advanced Information Networking and Applications (AINA-2019), Kunibiki Messe, Matsue, Japan: IEEE.
Chu-Hsing Lin, Hsuan Chi (2019.03). A Novel Movie Recommendation System Based on Collaborative Filtering and Neural Networks. Paper presented at The 33-rd International Conference on Advanced Information Networking and Applications (AINA-2019), Kunibiki Messe, Matsue, Japan: IEEE.
Chu-Hsing Lin, Chihhsiong Shih and Yi-Ting Hsiao (2018.04). Performance Evaluation of Collaborative Filtering Algorithms Based on Hadoop. Paper presented at 4th IEEE International Conference on Applied System Innovation 2018, Chiba, Tokyo, Japan: IEEE, TIKI.
Ting-Chung Lee, Chu-Hsing Lin(2018.04)。Filtering Spam Mails Using Convolutional Neural Networks and Parallel Computing。論文發表於2018 International Conference on Modern Management and Innovation,Hsinchu, Taiwan:MinHsing University of Science and Technology。
Chu-Hsing Lin, Jung-Chun Liu, Po-Kai Yang (2018.04). On the Speedup of Parallel Fast Fourier Transform Using CUDA GPU. Paper presented at 4th IEEE International Conference on Applied System Innovation 2018, Chiba, Tokyo, Japan: IEEE, TIKI.
Chu-Hsing Lin, Jung-Chun Liu, Tsung-Chi Peng (2017.05). Performance Evaluation of Cluster Algorithms for Big Data Analysis on Cloud. Paper presented at 2017 IEEE International Conference on Applied System Innovation, Hotel Emisia,Sapporo,Japan: IEEE, TIKI.
Chu-Hsing Lin, Jung-Chun Liu, Ken-Yu Lee (2016.08). Schemes and Performance for Personal Data Protection Using Cloud Technologies. Paper presented at 11th Asia Joint Conference on Information Security (AsiaJCIS 2016), Fukuoka, Japan: Technical Committee on Information and Communication
System Security (ICSS), Information and Systems Society (ISS),
IEICE, Japan.
Chu-Hsing Lin, Jung-Chun Liu, Tien-Pin Chu (2016.08). On the Performance of Cracking Hash Functions Using Cloud Computing. Paper presented at 11th Asia Joint Conference on Information Security (AsiaJCIS 2016), Fukuoka, Japan: Technical Committee on Information and Communication
System Security (ICSS), Information and Systems Society (ISS),
IEICE, Japan.
Cheng-Chieh Li, Chu-Hsing Lin, Jung-Chun Liu (2016.05). Parallel Genetic Algorithms on the GPU Using Island Model and Simulated Annealing. Paper presented at 2016 IEEE International Conference on Applied System Innovation, Okinawa, Japan: IEEE.
Chu-Hsing Lin, Jung-Chun Liu, Shiang-Lin Tsai (2016.02). On the Automatic Target Tracking and Recognition for Surveillance Systems. Paper presented at Proceedings of the Universal Academic Cluster International Winter Conferences, Hokkaido, Japan, Feb 22-24, 2016.: Universal Academic Cluster.
Chu-Hsing Lin, Jung-Chun Liu, Hsin-Jen Yao, Cheng-Chung Chu, Chao-Tung Yang (2015.7 ). Performance Evaluation of Parallel Genetic Algorithm using Single Program Multiple Data Technique. Paper presented at 2nd International Conference on Trustworthy Systems and Their Applications, Hualien, Taiwan Hualien, Taiwan: IEEE.
Cheng-Chieh Li, Jung-Chun Liu, Chu-Hsing Lin and Winston Lo (2015.06). On the Accelerated Convergence of Genetic Algorithm Using GPU Parallel Operations. Paper presented at 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SpringerLink), Takamatsu, Japan: IEEE.
Chu-Hsing Lin, Jung-Chun Liu and Su-Ying Lin (2015.05). 3-Dimensional Personal Identification and Its Applications Based on Kinect. Paper presented at International Conference on Applied System Innovation, Osaka, Japan: Taiwan Institue of Knowledge Innovation.
Chu-Hsing Lin, Jung-Chun Liu and Wen-Chen Wu (2014.12). Designing QR Code with Authentication Capabilities. Paper presented at Workshop on Cryptography and Information Security, International Computer Symposium (ICS 2014), Taichung, Taiwan: Tunghai University.
Chu-Hsing Lin, Jung-Chun Liu and Cheng-Chieh Li (2014.09). Parallel Modulus Operations in RSA Encryption by CPU/GPU Hybrid Computation. Paper presented at The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), 2014, Wuhan, China: 武漢大學.
Chu-Hsing Lin, Jung-Chun Liu and Cheng-Chieh Li (2014.05). Synchronized Schemes in Heterogeneous System for Cryptographic Applications. Paper presented at International Congress on Natural Sciences and Engineering (ICNSE 2014), 2014., Kyoto, Japan: High Education ForumF.
Chu-Hsing Lin, Jung-Chun Liu, Ming-Hong Liou, Wen-Chen Wu (2014.01). Shortest Driving Time Computation Based on Cloud Technologies and Genetic Algorithm. Paper presented at Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), Langkawi, Malaysia: IMSM.
Chu-Hsing Lin, Jung-Chun Liu, and Cheng-Chieh Li (2014.01). Speeding Up RSA Encryption Using GPU Parallelization. Paper presented at Fifth International Conference on Intelligent Systems, Modelling and Simulation (ISMS 2014), Langkawi, Malaysia: ISMS.
Chu-Hsing Lin, Chen-Yu Lee, Shi-Pei Chien (2013.03). Digital Video Watermarking on Cloud Computing Environments. Paper presented at The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), Kuala Lumpur: Cyber Peacefare and Digital Forensic (CyberSec2013).
2. Chu-Hsing Lin, Hung-Yan Lin, Wei-Bin Lee (2012.11). Routing Protocols with Power Saving and Data Salvation for Wireless Sensor Networks. Paper presented at the Third International Workshop on Cloud, Wireless and e-Commerce Security, University of Victoria: University of Victoria.
Chu-Hsing Lin, Chen-Yu Lee, Tang-Wei Wu (2012.08). A Cloud-aided RSA Signature Scheme for Digital Forensics Applications. Paper presented at The 6th International Conference on Information Security and Assurance (ISA 2012), Howard Johnson Hongqiao Airport Hotel Shanghai, Shanghai, China: The 6th International Conference on Information Security and Assurance (ISA 2012).
Chu-Hsing Lin, Chen-Yu Lee, Shin-Pin Lai, Wei-Shen Lai (2012.08). A Semantic Rule-based Detection Scheme against Flooding Attacks on Application Layer. Paper presented at The 6th International Conference on Information Security and Assurance (ISA 2012), Johnson Hongqiao Airport Hotel Shanghai, Shanghai, China: The 6th International Conference on Information Security and Assurance (ISA 2012).
Jung-Chun Liu, Wen-Chen Wu, Tsau-Wei You, Ming-Hung Liu (2012.07). Mobile Computer System with User Friendly Environment and Security Protection. Paper presented at The Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2012, Palermo: The Second International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2012.
Chu-Hsing Lin, Jung-Chun Liu(劉榮春), Chien-Hsing Lee, Tang-Wei Wu (2011.12). An Indoor Location-Aware System Based on Rotation Sampling in Positioning. Paper presented at The 2011 International Conference on Future Generation Communication and Networking, Korea, Jeju Island: SERSC.
Chu-Hsing Lin, Jung-Chun Liu(劉榮春), Sheng-Hsing Tsai, Hung-Yan Lin (2011.12). Research on the ZigBee-Based Indoor Location Estimation Technology. Paper presented at The 2011 International Conference on Future Generation Communication and Networking, Korea,Jeju Island: SERSC.
Chu-Hsing Lin, Chen-Yu Lee, Shu-Yuan Lu, Shih-Pei Chien (2011.12). Unseen Visible Watermarking for Gray Level Images Based on Gamma Correction. Paper presented at The 2011 International Conference on Future Generation Communication and Networking, Korea, Jeju Island: SERSC.
Chu-Hsing Lin, Chen-Yu Lee, Tzu-Chien Yang, Shin-Pin Lai (2011.12). Visible Watermarking Based on Multi-parameters Adjustable Gamma Correction. Paper presented at The 2011 International Conference on Future Generation Communication and Networking, Korea, Jeju Island: SERSC.
Chu-Hsing Lin, Guan-Han Chen, Shih-Pei Chien (2011.10). Energy Consumption Analysis for Cryptographic Algorithms with Different Clocks on Smart Cards in Mobile Devices. Paper presented at Broadband and Wireless Computing, Communication and Applications (BWCCA), Spain, Barcelona: BWCCA.
Chao-Tung Yang(楊朝棟), Chu-Hsing Lin, Guey-Luen Chang (2011.09). Implementation of Image Watermarking Processes on Cloud Computing Environments. Paper presented at 2nd International Conference on the Emerging Areas of Security-Enriched Urban Computing and Smart Grids, Taiwan, Hualien: National Dong Hwa University.
Chu-Hsing Lin, Jung-Chun Liu, Guan-Han Chen, Ying-Hsuan Chen, Chien-Hua Huang (2011.07). Use Double Check Priority Queue to Alleviate Malicious Packet Flows from Distributed DoS attacks. Paper presented at The First International Workshop on Mobile Commerce, Cloud Computing, Network and Communication Security 2011 (MCNCS 2011), Korean Bible University (KBU), Seoul, Korea: 待查.
Chu-Hsing Lin, Shang-Sheng Yang, Jeng-Heng Chen, Yi-Zhu Cao (2011.04). Design and Implementation of Mouth-Controlled Mouse System. Paper presented at EUROCON 2011 International Conference on Computer as a Tool, IST Congress Center, Lisbon, Portugal: 待查.
Chu-Hsing Lin, Chen-Yu Lee, Yi-Shiung Yeh, Hung-Sheng Chien (2011.04). Generalized Secure Hash Algorithm: SHA-X. Paper presented at EUROCON 2011 International Conference on Computer as a Tool, IST Congress Center, Lisbon, Portugal: 待查.
Fuu-Cheng Jiang , Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin (2010.11). Lifetime Security Improvement in Wireless Sensor Network using Queue-based Techniques. Paper presented at 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, Japan: 待查.
Lien Harn, Chu-Hsing Lin, Che-Wei Hu (2010.11). Contract Signatures in E-Commerce Applications. Paper presented at 2010 International Conference on Broadband, Wireless Computing, Communication and Applications, Fukuoka, Japan: 待查.
Chu-Hsing Lin, Jung-Chung Liu, Wei-Cheng Hsu, Hsing-Weng Wang, Wei-Chih Lin, Jian-Wei Li (2010.06). Image Tampering Detection and Recovery Using Dual Watermarks and Cyclic Redundancy Checks. Paper presented at The 2nd International Conference on Advanced Communication and Networking, Sheraton Grande Ocean Resort, Miyazaki, Japan: 待查.
Chu-Hsing Lin, Chen-Yu Lee (2010.02). Modified Autonomous Key Management Scheme with Reduced Communication/Computation Costs in MANET. Paper presented at The 4th International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing (IMIS-2010), Andrzej Frycz Modrzewski Cracow College, Krakow, Poland: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Hao-Ting Zou (2009.12). Investigations of Factors Affecting the Genetic Algorithm for Shortest Driving Time. Paper presented at International Conference on SOft Computing and Pattern Recognition (SoCPaR 2009), Malacca, Malaysia: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo (2009.12). Analysis of Priority Queue-based Scheme to Alleviate Malicious Flows from Distributed DoS Attacks. Paper presented at 2009 International Conference on Future Generation Communication and Networking (FGCN 2009), Jeju Island, Korea: 待查.
Chu-Hsing Lin, Jung-Chun Liu, and Ching-Ru Chen (2009.08). Access Log Generator for Analyzing Malicious Website Browsing Behaviors. Paper presented at The Fifth International Conference on Information Assurance and Security (IAS-2009), Xi'an, China: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Lun-Yuen Cheng, Jung-Jung Chung (2009.06). Binary Documents Recovery Based on Skeleton Extraction. Paper presented at The 3rd International Conference on Multimedia and Ubiquitous Engineering (MUE 2009), Qingdao, China: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng, Tsung-Che Yang, Mei-Chun Chou (2009.06). Energy Analysis of Multimedia Video Streaming on Mobile Devices. Paper presented at The 3rd International Conference on Information Security and Assurance (ISA 2009), Seoul, Korea: 待查.
Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu (2009.01). Counteract SYN Flooding Using Second Chance Packet Filtering. Paper presented at Third International Conference on Ubiquitous Information Management and Communication (ICUIMC-09), SKKU, Suwon, Korea: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-Chun Chou, Tsung-Che Yang (2008.12). Safeguard Intranet Using Embedded and Distributed Firewall System. Paper presented at 008 Second International Conference on Future Generation Communication and Networking (FGCN 2008), Hainan, China: 待查.
Chien-Ting Kuo, Chu-Hsing Lin, Jung-Chun Liu, Mao-Hua Cheng (2008.12). Design and Implementation of a Distributed Security System with Embedded Firewalls. Paper presented at National Symposium on Telecommunications, 2008 (NST-2008), Formosa University, Taiwan: 待查.
Chu-Hsing Lin, Fuu-Cheng Jiang, Jen-Chieh Chang, Frode Eika Sandnes (2008.12). Node-disjoint Alternative Dual-path Routing for Data Salvation in Mobile Ad hoc Networks. Paper presented at The Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'08), Dunedin, New Zealand: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Chih-Chieh Lien (2008.11). Detection Method Based on Reverse Proxy Against Web Flooding Attacks. Paper presented at 8th International Conference on Intelligent Systems Design and Applications (ISDA-2008), Kaohsiung City, Taiwan: 待查.
Chu-Hsing Lin, Jung-Chun Liu, and Chien-Ting Kuo (2008.08). An Effective Priority Queue-based Scheme to Alleviate Malicious Packet Flows from Distributed DoS attacks. Paper presented at The 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP-2008), Harbin, China: 待查.
Chu-Hsing Lin, Fuu-Cheng Chiang, Jen-Chieh Chang, Chien-Ting Kuo, Frode Eika Sandnes (2008.07). Performance Effects of AODV-based Backup Routing Protocol Policies in Mobile Ad hoc Networks. Paper presented at The 3rd Joint Workshop on Information Security (JWIS 2008), Hanyang University, Seoul, Korea: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Pei-Jean Han (2008.06). On the Security of the Full-Band Image Watermark for Copyright Protection. Paper presented at The IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC2008), Taichung, Taiwan: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Chia-Han Ho (2008.04). Anomaly Detection Using LibSVM Training Tools. Paper presented at The 2nd International Conference on Information Security and Assurance, Hanwha Resort Haeundae, Busan, Korea: 待查.
Chu-Hsing Lin, Wei-Shen Lai, Yen-Ling Hwang, Mei-Chun Chou (2008.04). I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. Paper presented at The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Hwang, Tsung-Che Yang (2008.04). Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Paper presented at The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Jui-Ling Yu, Chia-Jen Li (2008.04). Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. Paper presented at The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Li (2008.04). A Robust Watermark Scheme for Copyright Protection. Paper presented at The 2nd International Conference on Multimedia and Ubiquitous Engineering (MUE2008), Hanwha Resort Haeundae, Busan, Korea: 待查.
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou (2008.03). Secure Routing Protocol with Malicious Nodes Detection for Ad hoc Networks. Paper presented at 3rd International Workshop on Performance Analysis and Enhancement of Wireless Networks (PAEWN’08), GinoWan, Okinawa, Japan: 待查.
Chu-Hsing Lin, C. S. Shih, J. C. Liu, M. H. Cheng, Y. W. Lee (2008.02). Energy Efficiency Measurement for Multimedia Audio Decoding on Embedded Systems. Paper presented at The Second International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2008), Suwon, Korea: 待查.
Chu-Hsing Lin, J. C. Liu, M. H. Cheng (2008.01). Energy Analysis of Multimedia Video Decoding on Embedded Systems. Paper presented at The International Conference on Information Networking 2008 (ICOIN2008), Paradise Hotel, Busan, Korea: 待查.
Chu-Hsing Lin, Wen-Kui Chang, Yu-Ying Lin, Lun-Yuen Cheng (2007.11). Binary Document Images Authentication by Thinning Digital Patterns. Paper presented at The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao (2007.11). Energy Consumption Analysis of Audio Applications on Mobile Handheld Devices. Paper presented at Proceedings of IEEE TENCON 2007, Intelligent Information Communication Technologies for Better Human Life, Taipei: 待查.
Chu-Hsing Lin, Jue-Sam Chou, Yu-Wen Chen (2007.09). Integrity Protection of Document Assets by Computing Skeletons. Paper presented at The Second International Conference on Innovative Computing, Information and Control (ICICIC 2007), Kumamoto, Japan: 待查.
Chu-Hsing Lin, Jung-Chun Liu, Li-Ching Kuo, Jen-Chieh Chang (2007.06). Robust Multi-scale Full-band Image Watermarking for Copyright Protection. Paper presented at The 20th International Conference on Industrial, Engineering & Other Applications of Applied Intelligent Systems (IEA-AIE 2007), Kyoto, Japan: 待查.
Chin-Chen Chang,Chu-Hsing Lin,Chien-Yuan Chen (2007.04). A Conference Key Distribution Scheme Using Interpolating Polynomials. Paper presented at 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE07), Seoul, Korea: 待查.
Chu-Hsing Lin,ung-Chun Liu,hun-Wei Liao (2007.04). Energy Analysis of Multimedia Video Decoding on Mobile Handheld Devices. Paper presented at 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE07), Seoul, Korea: 待查.
Jen-Chieh Chang, Chu-Hsing Lin, Wei-Shen Lai, Ruei-Hau Hsu (2007.03). Desing and Application of Batch Signature Scheme for Network Voting System. Paper presented at 2007 Electronic Commerce and Digital Life Conference (ECDL 2007), Taipei: 待查.
Chu-Hsing Lin, Chien-Liang Tsai, Chen-Yu Lee (2006.12). A Secure Protocol for Mobile IP Using Smartcards. Paper presented at Proceedings of the International Computer Symposium 2006 (ICS 2006), Taipei: 待查.
Chu-Hsing Lin, Fuu-Cheng Jiang, Yen-Lin Huang, Chih-Hsiung Huang (2006.12). A Secure and Efficient Model for Network Defensive Systems. Paper presented at Proceedings of the International Computer Symposium 2006 (ICS 2006), Taipei: 待查.
Chu-Hsing Lin, Hsiu-Hsia Lin, Jen-Chieh Chang (2006.10). Multiparty Key Agreement for Secure Teleconfernecing. Paper presented at 2006 IEEE International Conference on Systems, Man, and Cybernetics (SMC2006), Taipei: 待查.
Jung-Chun Liu, Chu-Hsing Lin, Li-Ching Kuo (2006.10). A Robust Full-band Image Watermarking Scheme. Paper presented at Proceedings of 10th of International Conference of Communication Systems, Singapore: 待查.
C. C. Chang, K. L. Chen, Chu-Hsing Lin (2006.09). A Group-oriented (t, n) Threshold Signature Scheme Against Replay Attacks. Paper presented at The 3rd International Conference on Ubiquitous Intelligence and Computing, Wuhan and Three Gorges, China: 待查.
Yi-Fung Huang, Kun-Li Wen, Chu-Hsing Lin, Jen-Chieh Chang (2006.06). A Grey Pseudo Random Number Generator. Paper presented at The 16th Information Security Conference, Taichung: 待查.
C. H. Lin, J. S. Jen ,L. C. Kuo (2006.04). Distributed Discrete Wavelet Transformation for Copyright Protection. Paper presented at 7th International Workshop on Image Analysis for Multimedia Interactive Services, Seoul, Korea: 待查.
Chia-Yin Lee, Chin-Chen Chang, Chu-Hsing Lin (2005.11). User Authentication with Anonymity for Global Mobility Networks. Paper presented at IEE 2005 Mobility Conference, Guangzhou, China: 待查.
Chu-Hsing Lin, Tri-Show Lin, Hsiu-Hsia Lin ,Yi-Yi Lai (2005.06). On the security of ID-based Password Authentication Scheme using Smart Cards and Fingerprints. Paper presented at International Conference on Information Technology: Research and Education, Hsinchu: 待查.
Chu-Hsing Lin, Wei-Shen Lai, Te-Fa Liao (2005.06). Extensive Multilayer IP Security Protocol for Wireless Networks. Paper presented at 2005 Symposium on Digital Life and Internet Technologies, Tainan: 待查.
Chu-Hsing Lin, Wei-Shen Lai, Te-Fa Liao (2005.05). Improve the Throughput of 802.1b Using Forward Error Correction Function. Paper presented at International Conference of Information Management (ICIM 2005), Taipei: 待查.
Chu-Hsing Lin, Jue-Sam Chou, Yi-Kang Ho (2005.05). A New Scheme for Remote Mutual Authentication Using Smart Card. Paper presented at Conference on technology fusion of photonics, Symposium on Technology Fusion of Optoelectronics and Communications (STFOC 2005), Taipei: 待查.
Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang ,Kuo-Lun Chen (2005.03). Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei: 待查.
Chu-Hsing Lin, Wei Lee ,Chien-Sheng Chen (2005.03). Dynamic Key Generations for Secret Sharing in Access Structures. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei: 待查.
Chu-Hsing Lin, Wei Lee ,Yi-Kang Ho (2005.03). An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei: 待查.
Chia-Yin Lee, Chu-Hsing Lin ,Chin-Chen Chang (2005.03). An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei: 待查.
Chu-Hsing Lin ,Hsiu-Hsia Lin (2005.03). Secure One-round Tripartite Authenticated Key Agreement Protocol from Weil pairing. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei: 待查.
Chu-Hsing Lin ,Wei Lee (2005.03). Efficient Secret Sharing with Access Structures in a Hierarchy. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA’2005), Taipei: 待查.
Jue-Sam Chou,Chu-Hsing Lin,Ting-Ying Lee (2004.12). A Novel Hierarchical Key Management Scheme Based on Quadratic Residues. Paper presented at Second International Symposium on Parallel and Distributed Processing and Applications (ISPA'2004), Hong Kong, China: 待查.
Chu-Hsing Lin ,Hsiu-Hsia Lin (2004.12). Cryptanalysis on Shim’s tripartite authenticated key agreement protocol from Weil pairing. Paper presented at International Computer Symposium (ICS’2004), Taipei: 待查.
Chu-Hsing Lin ,C. Y. Lee (2004.09). Cryptanalysis of a New Authentication Scheme with Anonymity for Wireless Environments. Paper presented at Proceedings of the Second International Conference on Advances in Mobile Multimedia (MoMM 2004), Bali, Indonesia: 待查.
Chu-Hsing Lin ,Y. Y. Lai (2004.06). A Fingerprint-based User Authentication Scheme for Multimedia Systems. Paper presented at Proceedings of the 2004 IEEE International Conference on Multimedia & Expo (ICME 2004), Taipei: 待查.
Chu-Hsing Lin, K. J. Huang ,H. H. Lin (2004.06). Improving Shim's tripartite authenticated key agreement protocol based on Weil pairing. Paper presented at Proceedings of 14th Information Security Conference, Taipei: 待查.
Chu-Hsing Lin, W. Lee (2004.03). A Simple and Secure Authentication Protocol for Global Roaming Service. Paper presented at Proceedings of 10th Mobile Computing Workshop (第十屆行動計算研討會), Taichung: 待查.
Chu-Hsing Lin, W. Lee, P. C. Hwang (2004.03). Secret Sharing with Access Structures in a Hierarchy. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Japan: 待查.
C. T. Wang, Chu-Hsing Lin, C. C. Chang (2004.03). Supervising Secret-Key Agreements in a Level-Based Hierarchy. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Japan: 待查.
C. T. Wang, C. C. Chang, Chu-Hsing Lin (2004.03). Using IC Cards to Remotely Login Passwords without Verification Tables. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA 2004), Fukuoka, Japan: 待查.
J. S. Chou, Chu-Hsing Lin, J. I. Shiue (2003.12). A New Scheme for Remote User Authentication with Smart Cards. Paper presented at Proceedings of International Conference on Informatics, Cybernetics, and Systems (ICICS 2003), Kaohsiung: 待查.
Chu-Hsing Lin, J. S. Chou, T. Y. Lee (2003.12). A Secure Scheme for Users Classification and Contents Protection in Video-on-demand Systems. Paper presented at Proceedings of International Conference on Informatics, Cybernetics, and Systems (ICICS 2003), Kaohsiung: 待查.
Y. F. Huang, K.L. Wen, R. H. Hsu, Chu-Hsing Lin (2003.10). Infinite Generating Keys Based on Public System. Paper presented at Proceedings of IEEE International Conference On Systems, Man and Cybernetics, Washington, D.C., USA: 待查.
Y. S. Yeh, Chu-Hsing Lin, W. S. Lai (2003.08). Apply SHA and RSA to Construct Non-deterministic Message Authentication Code. Paper presented at Proceedings of 13th Information Security Conference, 待查: 待查.
Chu-hsing Lin ,K. L. Hwang (2003.06). Authenticated Key Agreement Based on Elliptic Curve Cryptography. Paper presented at 第三屆離島資訊技術與應用研討會, 待查: 待查.
Chu-Hsing Lin ,T. K. Liu (2003.06). On the Security of Authenticated Key Agreement Protocols. Paper presented at 2003年資訊技術應用與發展研討會, 待查: 待查.
C. T. Wang, C. C. Chang ,Chu-Hsing Lin (2003.03). Signature Scheme based on Two Hard Problems Simultaneously. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA2003), China: 待查.
C. C. Chang, Y. T. Kao ,Chu-Hsing Lin (2003.03). Fast Algorithms for Common-Multiplicands Multiplication and Exponentiation by Performing Complements. Paper presented at Proceedings of International Conference on Advanced Information Networking and Applications (AINA2003), China: 待查.
Chu-Hsing Lin ,C. Y. Lee (2002.12). A Software Protection System for Internet Commerce. Paper presented at Proceedings Third IEEE Pacific Rim Conference on Multimedia, Hsinchu: 待查.
Chu-Hsing Lin, C. Y. Lee (2002.12). On How to Make the Hill Cipher Secure. Paper presented at Proceedings of Workshop on Consumer Electronics (WCE 2002), Hsinchu: 待查.
Chu-Hsing Lin ,C. Y. Lee (2002.12). Dynamic Triple-DES. Paper presented at Proceedings of the 2002 International Conference on Cryptology and Information Security—joint conference International Computer Symposium, Hsinchu: 待查.
Lee. C. L. ,Chu-hsing Lin (2002.05). Elliptic-Curve Undeniable Signatures using Smart Cards. Paper presented at Proceedings of 12th National Information Security Conference, Taichung: 待查.
林祝興,李維貞(2002.05)。運用XML結構的角色機存取控制系統。論文發表於Proceedings of the 13th International Conference on Information Management,Taipei:待查。
Chu-Hsing Lin ,C. Y. Lee (2002.05). Keyed/Unkeyed SHA-2. Paper presented at Proceedings of the Second International Workshop for Asian PKI, 待查: 待查.
Lee. C. H. ,Chu-Hsing Lin (2002.05). An Efficient Hierarchical Key Management Scheme Based on Elliptic Curves. Paper presented at Proceedings of 12th National Information Security Conference, Taichung: 待查.
Lee. C. L. ,Chu-Hsing Lin (2001.12). RSA-based Undeniable Signature using Smart Cards. Paper presented at Proceedings of National Computer Symposium – Joint Conference on Information Security, Taipei: 待查.
Chu-Hsing Lin ,C. Y. Lee (2001.10). One-time Installation with Traitors Tracing for Copyright Program. Paper presented at Proceedings of IEEE 35th International Carnahan Conference on Security Technology, London, UK: 待查.
Wang. C. T., C. C. Chang, Chu-Hsing Lin (2001.09). Group-oriented Authenticated Encryption Based on Self-certified Public Keys. Paper presented at Proceedings of The Second International Workshop on Information Security Applications, Seoul, Korea: 待查.
Chu-Hsing Lin, T. C. Lee, Y. C. Chen (2001.09). A Dynamic Stego-scheme for Data Protection. Paper presented at Proceedings of The 2001 International Workshop on Cryptology and Network Security, Taipei: 待查.
Chu-Hsing Lin ,F. C. Jiang (2001.07). Copyright Protection of MP3 Files Using Watermarking Technique. Paper presented at The 2nd International Conference on Parallel and Distributed Computing, Applications, and Technologies, Taipei: 待查.
Chu-Hsing Lin, S. W. Wang (2001.05). A Group-oriented Signature Scheme for Limited-bandwidth Devices in Wireless Environment. Paper presented at Proceedings of 11th National Conference on Information Security, Tainan: 待查.
林祝興,王保利(2001.05)。一個適用於無線網路環境的安全通道之建立。論文發表於21世紀數位生活與網際網路科技研討會,台南成功大學:待查。
林祝興,李鎮宇,葉義雄(2001.05)。植基於智慧卡的軟體保護機制。論文發表於21世紀數位生活與網際網路科技研討會,台南成功大學:待查。
林祝興,王琇緯(2001.05)。入侵Redhat系統實例研究。論文發表於21世紀數位生活與網際網路科技研討會,台灣成功大學:待查。
Chu-Hsing Lin, C. L. Lee (2001.05). Elliptic-curve Undeniable Signature Schemes. Paper presented at Proceedings of 11th National Conference on Information Security, Tainan: 待查.
Chu-Hsing Lin ,C. Y. Lee (2000.05). A Software Protection Scheme on Internet: One-Time Install Solution. Paper presented at Proceedings of 2000 Workshop on Internet & Distributed Systems,, 待查: 待查.
Chu-Hsing Lin ,S. W. Wang (2000.05). Design and Implementation of a Secure Virtual Mall. Paper presented at Proceedings of 2000 Workshop on Internet & Distributed Systems, 待查: 待查.
Huang. D. Y., Y. S. Yeh, Chu-Hsing Lin (2000.05). Generalized IDEA. Paper presented at Proceedings of the 10th National Conference on Information Security, Hualein: 待查.
Wang. C. T., C. C. Chang, Chu-Hsing Lin (2000.05). A New Micro-Payment System Using General Payword Chain. Paper presented at Proceedings of the 10th National Conference on Information Security, Hualein: 待查.
Chu-Hsing Lin ,K. H. Yang (2000.05). An Electronic Cash System Using Visual Secret Sharing. Paper presented at Proceedings of TANET 2000, Tainan: 待查.
Yeh. Y. S., Chu-Hsing Lin, Lai. W. S., Wang. S. W. (2000.03). Implementation of Modified PGP. Paper presented at Journal of Computers, 待查: 待查.
Chu-Hsing Lin, Y. S. Yeh, J. S. Chou (1999.11). A Design of HiPi Cryptoscheme. Paper presented at Proceedings of The Eighth National Conference on Science And Technology of National Defense, 待查: 待查.
Yeh. Y. S., Chu-Hsing Lin ,C. C. Wang (1999.05). Dynamic DES. Paper presented at Proceedings of the Ninth National Conference on Information Security, Taichung: 待查.
Chu-Hsing Lin ,W. C. Wu (1999.05). Image Protections in Networks – A Fractal Virtual Image Cryptosystem. Paper presented at Proceedings of 1999 Workshop on Distributed System Technologies & Applications, Tainan: 待查.
Yeh, Y. S., Chu-Hsing Lin, Y. C. Hsieh ,M. S. Chang(1998.05)。One-Way Hash Functions with MVL Expressions。論文發表於Proceedings of the Eighth National Conference on Information Security,Kaoshiung:待查。
Chu-Hsing Lin (1998.05). Integrated Key Management Schemes for Multi-Level Access Control. Paper presented at 1998 Workshop on Distributed System Technologies and Applications, 待查: 待查.
Wang. C. T., C. C. Chang ,Chu-Hsing Lin (1997.12). Group-oriented Threshold Signature Schemes with Traceable Signers. Paper presented at Proceedings of National Computer Symposium, Taichung: 待查.
Chu-Hsing Lin, C. Y. Dai ,T. S. Wu (1997.06). On the Secrecy of Image Transmission in Computer Network. Paper presented at Proceedings 14th Workshop on Combinatorial Mathematics and Computation Theory, Taichung: 待查.
Chang. C. C. ,Chu-Hsing Lin (1996.10). How to Converse Securely in a Conference. Paper presented at Proceedings of 30th IEEE Annual International Carnahan Conference on Security Technology, Lexington, Kentucky: 待查.
Chu-Hsing Lin ,C. T. Wang (1996.10). Integrated authentication Based on Identities. Paper presented at Proceedings of 30th IEEE Annual International Carnahan Conference on Security Technology, Lexington, Kentucky: 待查.
Chu-Hsing Lin ,T. C. Lee (1996.05). A Confused Document Encrypting Scheme and Its Implementation. Paper presented at Proceedings of 1996 International Conference on Cryptology and Information Security—join with 1996 International Computer Symposium, 待查: 待查.
Shieh. Y. H. ,Chu-Hsing Lin (1996.05). Clamped Spline Public Key Cryptosystem. Paper presented at Proceedings of 6th Information Security Conference, Taichung: 待查.
Chu-Hsing Lin ,C. T. Wang (1995.12). A New Undeniable Signature Scheme and Its Applications to Group Communications. Paper presented at Proceedings of National Computer Symposium, Taoyen: 待查.
Jan, J. K., Chu-Hsing Lin ,G. C. Lee (1995.06). Keys Minimization in Single-Key Access Control Schemes. Paper presented at Proceedings of 11th Workshop on Combinatorial Mathematics and Computation Theory, 待查: 待查.
Chu-Hsing Lin (1993.05). On the Group Oriented Secure Communication Schemes. Paper presented at Proceedings The Third Conference on Information Security, Chiayi: 待查.
Chu-Hsing Lin, C. C. Chang ,R. C. T. Lee (1992.06). An Interactive Message Authentication Scheme. Paper presented at The Second Conference on Information Security, Tainan: 待查.
Chang. C. C. ,Chu-Hsing Lin (1991.10). An ID-based Signature Scheme Based Upon Rabin's Public Key Cryptosystem. Paper presented at Proceedins 25th Annual IEEE International Carnahan Conference on Security Technology, 待查: 待查.
Chang. C. C. ,Chu-Hsing Lin (1988.12). An Information Secure Broadcasting Scheme Based upon Galosis Field Algebra. Paper presented at International Symposium MINI and MICROCOMPUTERS, Miami, U. S. A: 待查.
Chen. W. T., Chu-Hsing Lin ,W. C. Hwang (1988.01). An Adaptive Approach to Quantization for Video Image Compression. Paper presented at Proceedings of 1988 Telecommunications Symposium, Hsinchu: 待查.
Chang. C. C., M. D. Hsiao ,Chu-Hsing Lin (1986.08). Algorithms to Allocate A File for Concurrent Disk Accessing. Paper presented at Proceedings of the 6th Advanced Database Symposium, Tokyo, Japan: 待查.
Chang. C. C. ,Chu-Hsing Lin (1985.12). A Fast Algorithm for Neareast Neighbor Search. Paper presented at Proceedings of National Computer Symposium, Kaohsiung: 待查.
專書
11筆資料 more...
林祝興、張明信(2021.09)。資訊安全概論 第四版。:旗標科技。(ISBN:978-986-312-684-3)
林祝興、張明信(2016.03)。資訊安全概論 第二版。台北市杭州南路一段15-1號19樓:旗標出版股份有限公司。(ISBN:978-986-312-331-6)
王旭正、林祝興、左瑞麟(2013.07)。科技犯罪安全之數位鑑識─證據力與行動智慧應用。:博碩出版公司/台灣台北。(ISBN:9862017600)
(2011.06)。資訊安全實務-數位憑證技術與應用。:全華圖書。(ISBN:978-957-21-8098-3)
林祝興、張明信(2009.04)。資訊安全導論。:旗標出版社。(ISBN:9789574427161)
王旭正、林祝興(2009.03)。數位科技安全與鑑識-高科技犯罪預防與數位證據偵蒐。:博碩出版公司/台灣台北。(ISBN:9862011963)
(2006.01)。資訊安全技術與應用。:全華圖書公司。
(2004.01)。電子商務安全技術與應用。:旗標圖書公司。
(2004.01)。電子簽章應用與實習。:旗標圖書公司。
(1999.01)。計算機概論與基礎資訊教育。:全華科技圖書公司。
(1999.01)。電子商務安全。:松崗圖書公司。
專書部份章節
Chu-Hsing Lin, Jung-Chun Liu (2010.06). Energy Efficiency for Mobile Multimedia Replay. In Albert Y. Zomaya (Ed.), MOBILE INTELLIGENCE (pp. 530-544). USA: John Wiley & Sons.(ISBN:978-0-470-19555-0)
藝術設計創作及展演
7筆資料 more...
(2007.05)。東海MapHacking。裕隆日產汽車。
(2007.01)。資安技能競賽。資訊工業策進會。
(2007.01)。最佳路徑導向的動態行車系統之設計與實作。東海大學資工系。
(2006.12)。停車場系統規畫。資訊工業策進會產業支援處、經濟部通訊產業發展推動小組。
(2006.04)。行車資訊系統暨地圖資訊系統之結合。嵌入式軟體聯盟。
(2006.03)。95年網站設計全校系競賽。東海大學資工系。
(2004.06)。93年網站設計全校系競賽。東海大學。
技術轉移
(2004.11-.)。一種應用於ERP系統的流程簽章之設計與製作。被授權單位:侑翔管理資訊有限公司。
(2003.06-.)。一種具強韌性及適用於多種數位影像型態之數位浮水印系統之研製。被授權單位:隆業興股份有限公司。
技術報告
29筆資料 more...
(2007.01)。植基於資料隱藏的文件完整性驗證技術之設計與實作。Technical Report, National Science Council of ROC, NSC95-2221-E029-019。
(2007.01)。分散式安全系統在嵌入式平台之設計與實作(1/3)。Technical Report, National Science Council of ROC, NSC95-2221-E029-020-MY3。
(2006.01)。智慧型行車資訊系統之設計與實作。Technical Report, National Science Council of ROC, NSC 94-2218-E-029-002。
(2006.01)。智慧型行車導航系統。Technical Report, National Science Council of ROC, NSC94-2218-E029-002。
(2006.01)。高效能之整批式簽章驗證機制之設計與建置。Technical Report, National Science Council of ROC, NSC 94-2213-E-270-009。
(2006.01)。智慧型網路安全防衛系統之設計與實作(3/3)。Technical Report, National Science Council of ROC, NSC 94-2213-E-029-001。
(2005.01)。智慧型網路安全防衛系統之設計與實作(2/3)。Technical Report, National Science Council of ROC, NSC 93-2213-E-029-009。
(2004.01)。一種應用於ERP系統的流程簽章之設計與製作。Technical Report, National Science Council of ROC, NSC 93-2622-E-029-005-CC3。
(2004.01)。一種具強韌性及適用於多種數位影像型態之數位浮水印系統設計與製作。技術報告,行政院國家科學委員會,NSC 92-2622-E-029-006-CC3。
(2004.01)。智慧型網路安全防衛系統之設計與實作(1/3)。Technical Report, National Science Council of ROC, NSC 92-2213-E-029-017。
(2003.01)。電子競標系統之設計與製作(3/3)---子計畫一: 個別廠商資料庫之設計與製作。Technical Report, National Science Council of ROC, NSC-91-2213-E-029-003。
(2003.01)。行動代理人環境之入侵偵測系統之設計與實作。Technical Report, National Science Council of ROC, NSC 91-2213-E-009–084。
(2002.01)。無線環境上群體簽章技術之研究與實作。Technical Report, National Science Council of ROC, NSC-90-2213-E-029-009。
(2002.01)。電子競標系統之設計與製作(2/3)---子計畫一: 個別廠商資料庫之設計與製作。Technical Report, National Science Council of ROC, NSC-90-2213-E-029-004。
(2002.01)。安全遠端防火牆管理與稽核分析系統之設計與實作。Technical Report,中山科學研究院第一研究所, XW91156P041 P00。
(2001.01)。軟體式防火牆整合應用之研究。Technical Report,中山科學研究院第一研究所, XW90368P 217 P00。
(2001.01)。電子競標系統之設計與製作(1/3)---子計畫一: 個別廠商資料庫之設計與製作。Technical Report, National Science Council of ROC, NSC-89-2213-E-029-023。
(2001.01). Design and Implementation of RC6 and CAST-256 Against Fault-Based Attacks. Technical Report Part III, National Science Council of ROC, NSC-89-2213-E-029-037.
(2000.01)。設計及實現非決定性的MAC。Technical Report, National Science Council of ROC, NSC-89-2213-E-009-156。
(2000.01). Design and Implementation of RC6 and CAST-256 Against Fault-Based Attacks. Technical Report Part II, National Science Council of ROC, NSC-89-2213-E-029-005.
(2000.01)。PGP 改進的研究及實作。Technical Report, National Science Council of ROC, NSC 89-2213-E-009-005。
(1999.01). Design and Implementation of RC5 and GOST Against Fault-Based Attacks. Technical Report Part I, National Science Council of ROC, NSC-88-2213-E-029-007.
(1998.01). A Study on Image Protection for Networking Systems. Technical Report, National Science Council of ROC, NSC-87-2213-E-029-001.
(1997.01). Integrated Key Management Schemes for Multilevel Access Control. Technical Report, National Science Council of ROC, NSC-86-2213-E-029-002.
(1996.01). Integrated Authentications Based on Identities. Technical Report, National Science Council of ROC, NSC-85-2213-E-029-001.
(1995.01). Dynamic Cryptographic Key Management Schemes in Multilevel Data Security. Technical Report TR95-12, Department of Computer and Information Sciences, Tunghai University.
(1995.01). A Practical Undeniable Signature Scheme for Group-oriented Systems. Technical Report, National Science Council of ROC, NSC-84-2213-E-029-001.
(1994.01). An Efficient Conference Key Distribution Scheme Using Interpolating Polynomials. Technical Report TR94-08, Department of Computer and Information Sciences, Tunghai University.
(1993.01). A New Public-Key Cryptosystem. Technical Report TR93-08, Department of Computer and Information Sciences, Tunghai University.
