A flexible biometrics remote user authentication scheme CH Lin, YY Lai Computer Standards & Interfaces 27 (1), 19-23, 2004 | 305 | 2004 |
Distinctive activation patterns in constitutively active and gefitinib-sensitive EGFR mutants YR Chen, YN Fu, CH Lin, ST Yang, SF Hu, YT Chen, SF Tsai, SF Huang Oncogene 25 (8), 1205-1215, 2006 | 167 | 2006 |
Threshold signature schemes with traceable signers in group communications CT Wang, CH Lin, CC Chang Computer Communications 21 (8), 771-776, 1998 | 142 | 1998 |
Dynamic key management schemes for access control in a hierarchy CH Lin Computer communications 20 (15), 1381-1385, 1997 | 130* | 1997 |
Generalization of threshold signature and authenticated encryption for group communications CT Wang, CC Chang, CH Lin IEICE Transactions on Fundamentals of Electronics, Communications and …, 2000 | 82 | 2000 |
Hierarchical key assignment without public-key cryptography CH Lin Computers & Security 20 (7), 612-619, 2001 | 67 | 2001 |
Comments on Saeednia's improved scheme for the Hill cipher CH Lin, CY Lee, CY Lee Journal of the Chinese institute of engineers 27 (5), 743-746, 2004 | 58 | 2004 |
Anomaly detection using LibSVM training tools CH Lin, JC Liu, CH Ho 2008 international conference on information security and assurance (isa …, 2008 | 57 | 2008 |
An efficient decryption method for RSA cryptosystem RJ Hwang, FF Su, YS Yeh, CY Chen 19th International Conference on Advanced Information Networking and …, 2005 | 55 | 2005 |
Genetic algorithm for shortest driving time in intelligent transportation systems CH Lin, JL Yu, JC Liu, CJ Lee 2008 International Conference on Multimedia and Ubiquitous Engineering (mue …, 2008 | 52 | 2008 |
Energy analysis of multimedia video decoding on mobile handheld devices CH Lin, JC Liu, CW Liao Computer Standards & Interfaces 32 (1-2), 10-17, 2010 | 51 | 2010 |
A new public-key cipher system based upon the Diophantine equations CH Lin, CC Chang, RCT Lee IEEE Transactions on Computers 44 (1), 13-19, 1995 | 50 | 1995 |
Using adaptive bandwidth allocation approach to defend DDos attacks CH Lin, JC Liu, HC Huang, TC Yang 2008 International Conference on Multimedia and Ubiquitous Engineering (mue …, 2008 | 46 | 2008 |
Nanostructure‐dependent vertical charge transport in MEH‐PPV films YF Huang, AR Inigo, CC Chang, KC Li, CF Liang, CW Chang, TS Lim, ... Advanced Functional Materials 17 (15), 2902-2910, 2007 | 46 | 2007 |
On Neural Networks for Biometric Authentication Based on Keystroke Dynamics. CH Lin, JC Liu, KY Lee Sensors & Materials 30, 2018 | 42 | 2018 |
Lysophosphatidic acid up-regulates vascular endothelial growth factor-C and lymphatic marker expressions in human endothelial cells CI Lin, CN Chen, MT Huang, SJ Lee, CH Lin, CC Chang, H Lee Cellular and Molecular Life Sciences 65, 2740-2751, 2008 | 42 | 2008 |
Fast algorithms for common-multiplicand multiplication and exponentiation by performing complements CC Chang, YT Kuo, CH Lin 17th International Conference on Advanced Information Networking and …, 2003 | 37 | 2003 |
An improved low computation cost user authentication scheme for mobile communication CY Lee, CH Lin, CC Chang 19th International Conference on Advanced Information Networking and …, 2005 | 36 | 2005 |
Lifetime elongation of ad hoc networks under flooding attack using power-saving technique FC Jiang, CH Lin, HW Wu Ad Hoc Networks 21, 84-96, 2014 | 34 | 2014 |
The peptide FMRFa terminates a discharge in Aplysia bag cell neurons by modulating calcium, potassium, and chloride conductances T Fisher, CH Lin, LK Kaczmarek Journal of neurophysiology 69 (6), 2164-2173, 1993 | 33 | 1993 |