default search action
Lih-Chyau Wuu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j19]Wen-Chung Kuo, Chun-Cheng Wang, Shao-Hung Kuo, Lih-Chyau Wuu:
Verifiable data hiding scheme with tamper detection. J. Intell. Fuzzy Syst. 36(2): 1311-1321 (2019) - 2018
- [j18]Chun-Cheng Wang, Wen-Chung Kuo, Yu-Chih Huang, Lih-Chyau Wuu:
A high capacity data hiding scheme based on re-adjusted GEMD. Multim. Tools Appl. 77(5): 6327-6341 (2018) - 2017
- [j17]Wen-Chung Kuo, Po-Wei Shih, Yu-Chih Huang, Lih-Chyau Wuu:
Anonymous and Authentication Protocol For Multi-Server. Inf. Technol. Control. 46(2): 235-245 (2017) - 2016
- [c23]Wen-Chung Kuo, Jyun-Jia Li, Chun-Cheng Wang, Lih-Chyau Wuu, Yu-Chih Huang:
An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method. AsiaJCIS 2016: 136-140 - 2015
- [j16]Wen-Chung Kuo, Po-Yu Lai, Chun-Cheng Wang, Lih-Chyau Wuu:
A Formula Diamond Encoding Data Hiding Scheme. J. Inf. Hiding Multim. Signal Process. 6(6): 1167-1176 (2015) - [c22]Wen-Chung Kuo, Shao-Hung Kuo, Hong-Yi Chang, Lih-Chyau Wuu:
Authenticated Secret Sharing Scheme Based on GMEMD. IWDW 2015: 395-405 - 2014
- [j15]Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:
Robust smart-card-based remote user password authentication scheme. Int. J. Commun. Syst. 27(2): 377-389 (2014) - [j14]Lih-Chyau Wuu, Chi-Hsiang Hung, Wen-Chung Kuo:
Group Key Management based on (2, 2) Secret Sharing. KSII Trans. Internet Inf. Syst. 8(3): 1144-1156 (2014) - 2013
- [j13]Wen-Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu:
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy. Inf. Technol. Control. 42(2): 124-130 (2013) - 2012
- [j12]Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:
A Secure Password-Based Remote User Authentication Scheme without Smart Cards. Inf. Technol. Control. 41(1): 53-59 (2012) - [j11]Lih-Chyau Wuu, Chi-Hsiang Hung, Chia-Ming Chang:
Quorum-based Key Management Scheme in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 6(9): 2442-2454 (2012) - [c21]Lih-Chyau Wuu, Chi-Hsiang Hung, Chia-Ming Chang:
Quorum-based key management scheme in wireless sensor networks. ICUIMC 2012: 15:1-15:6 - 2011
- [j10]Lih-Chyau Wuu, Chi-Hsiang Hung, Jyun-Yan Yang:
IP Traceback Based on Chinese Remainder Theorem. J. Inf. Sci. Eng. 27(6): 1985-1999 (2011) - [c20]Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu:
Security on the Design of RFID Access Control Protocol Using the Strategy of Indefinite-Index and Challenge-Response. ICGEC 2011: 9-12 - 2010
- [c19]Lih-Chyau Wuu, Wen-Bin Li, Wen-Chung Kuo:
Detour Routing Protocol for Geographic Sensor Networks. BWCCA 2010: 505-510 - [c18]Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu:
High Flexible Sanitizing Signature Scheme Based on Bilinear Maps. FGIT 2010: 402-412 - [c17]Wen-Chung Kuo, Shao-Hung Kuo, Lih-Chyau Wuu:
High Embedding Reversible Data Hiding Scheme for JPEG. IIH-MSP 2010: 74-77 - [c16]Wen-Chung Kuo, Po-Yu Lai, Lih-Chyau Wuu:
Adaptive reversible data hiding based on histogram. ISDA 2010: 1376-1381 - [c15]Wen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu:
Digitally signed document flexible sanitizing scheme based on bilinear maps. ISI 2010: 172
2000 – 2009
- 2009
- [c14]Lih-Chyau Wuu, Yen-Ju Chen, Chi-Hsiang Hung, Wen-Chung Kuo:
Zero-Collision RFID Tags Identification Based on CDMA. IAS 2009: 513-516 - [c13]Wen-Chung Kuo, Lih-Chyau Wuu, Chia-Nian Shyi, Shao-Hung Kuo:
A Data Hiding Scheme with High Embedding Capacity Based on General Improving Exploiting Modification Direction Method. HIS (3) 2009: 69-72 - 2008
- [c12]Wen-Fong Wang, Yi-Shian Chen, Lih-Chyau Wuu:
An Adaptive Control Scheme of Reserved Bandwidth for RPR in Steering Mode. APNOMS 2008: 507-510 - 2007
- [j9]Lih-Chyau Wuu, Tzong-Jye Liu, Kuo-Ming Chen:
A longest prefix first search tree for IP lookup. Comput. Networks 51(12): 3354-3367 (2007) - [j8]Lih-Chyau Wuu, Chi-Hsiang Hung, Sout-Fong Chen:
Building intrusion pattern miner for Snort network intrusion detection system. J. Syst. Softw. 80(10): 1699-1715 (2007) - [c11]Lih-Chyau Wuu, Tzong-Jye Liu, Jyun-Yan Yang:
IP traceback based on chinese remainder theorem. Communications, Internet, and Information Technology 2007: 222-227 - [c10]Hsiang-Lun Huang, Tzong-Jye Liu, Kuong-Ho Chen, Chyi-Ren Dow, Lih-Chyau Wuu:
A polymorphic shellcode detection mechanism in the network. Infoscale 2007: 64 - 2006
- [j7]Lih-Chyau Wuu, Chih-Ming Lin, Wen-Fong Wang:
Anonymous and Transferable Coins in Pay-Fair Ecommerce. IEICE Trans. Inf. Syst. 89-D(12): 2950-2956 (2006) - [j6]Tzong-Jye Liu, Lih-Chyau Wuu:
Randomized three-state alternator for uniform rings. J. Parallel Distributed Comput. 66(10): 1347-1351 (2006) - 2005
- [c9]Lih-Chyau Wuu, Kuo-Ming Chen, Tzong-Jye Liu:
A longest prefix first search tree for IP lookup. ICC 2005: 989-993 - 2003
- [j5]Ting-Yuan Wang, Lih-Chyau Wuu, Shing-Tsaan Huang:
A Scalable Core Migration Protocol for Dynamic Multicast Tree. J. Inf. Sci. Eng. 19(3): 479-501 (2003) - 2002
- [c8]Ting-Yuan Wang, Lih-Chyau Wuu, Shing-Tsaan Huang:
A Scalable Core Migration Protocol for Dynamic Multicast Tree. ICPADS 2002: 48- - 2001
- [j4]Lih-Chyau Wuu, Longsong Lin, Shing-Chyi Shiao:
Constructing Delay-Bounded Multicast Trees in Computer Networks. J. Inf. Sci. Eng. 17(3): 507-524 (2001) - [c7]Lih-Chyau Wuu, Hui-Chun Chen:
A Scalable Framework for Secure Group Communication. ICN (2) 2001: 225-238 - 2000
- [c6]Longsong Lin, Ming-Shou Liu, Lih-Chyau Wuu:
Resource reservation and packet scheduling for prioritized delay-bounded multicast. ICON 2000: 341-345 - [c5]Lih-Chyau Wuu, Ming-Shou Liu, Longsong Lin, Yao-Te Huang:
Decentralized Reconfiguration of Multicast Trees on Faulty Networks. PDPTA 2000
1990 – 1999
- 1999
- [c4]Longsong Lin, Ming-Shou Liu, Lih-Chyau Wuu, Chun-Yeh Tsai:
A QoS-Based Resource Reservation Protocol for Priority-Differentiated Delay-Bounded Multicast. Broadband Communications 1999: 549-560 - [c3]Longsong Lin, Lih-Chyau Wuu, Chun-Yeh Tsai, Yao-Te Huang, Ruel-Yau Liu:
A CORBA framework for QoS-guaranteed multicast service in wireless ATM networks. ICC 1999: 630-635 - [c2]Ming-Shou Liu, Lih-Chyau Wuu, Longsong Lin, Chun-Yeh Tsai:
A fair queueing algorithm for multiple-streams delay-bounded services. ICON 1999: 234-241 - 1997
- [j3]Shing-Tsaan Huang, Lih-Chyau Wuu:
Self-Stabilizing Token Circulation in Uniform Networks. Distributed Comput. 10(4): 181-187 (1997) - 1995
- [j2]Lih-Chyau Wuu, Shing-Tsaan Huang:
Distributed Self-Stabilizing Systems. J. Inf. Sci. Eng. 11(2): 307-319 (1995) - 1994
- [j1]Lih-Chyau Wuu, Shing-Tsaan Huang:
Identity Assignment in Uniform Synchronous Rings. Inf. Process. Lett. 49(5): 257-262 (1994) - [c1]Shing-Tsaan Huang, Lih-Chyau Wuu, Ming-Shin Tsai:
Distributed Execution Model for Self-Stabilizing Systems. ICDCS 1994: 432-439
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint