International Journal Papers

01.  Chang, C. C., Lee, R. C. T. and Du, M. W., (1982): “Symbolic Gray Code as a Perfect Multi-attribute Hashing Scheme for Partial Match Queries,” IEEE Transactions on Software Engineering, Vol. SE-8, No. 3, May 1982, pp. 235-249.

02.  Chang, C. C., Du, M. W. and Lee, R. C. T., (1983): “The Hierarchical Ordering in Multi-attribute Files,” Information Sciences, Vol. 31, No. 1, Oct. 1983, pp. 41-75.

03.  Chang, C. C., Du, M. W. and Lee, R. C. T., (1984): “Performance Analyses of Cartesian Product Files and Random Files,” IEEE Transactions on Software Engineering, Vol. SE-10, No. 1, Jan. 1984, pp. 88-99.

04.Chang, C. C., (1984): “The Study of an Ordered Minimal Perfect Hashing Scheme,” Communications of the Association for Computing Machinery, Vol. 27, No. 4, Apr. 1984, pp. 384-387.

05.Chang, C. C., (1984): “An Ordered Minimal Perfect Hashing Scheme Based upon Euler's Theorem,” Information Sciences, Vol. 32, No. 3, June 1984, pp. 165-172.

06.Chang, C. C., (1984): “Optimal Information Retrieval when Queries Are Not Random,” Information Sciences, Vol. 34, No. 3, Dec. 1984, pp. 199-233.

07.  Chang, C. C. and Lee, R. C. T., (1986): “A Letter Oriented Minimal Perfect Hashing Scheme,” The Computer Journal, Vol. 29, No. 3, 1986, pp. 277-281.

08.Chang, C. C., (1986): “On the Design of a Key-Lock-Pair Mechanism in Information Protection Systems,” BIT, Vol. 26, 1986, pp. 410-417.

09.Chang, C. C., (1986): “A Scheme for Constructing Ordered Minimal Perfect Hashing Functions,” Information Sciences, Vol. 39, 1986, pp. 187-195.

10.Chang, C. C., (1986): “Letter Oriented Reciprocal Hashing Scheme,” Information Sciences, Vol. 38, 1986, pp. 243-255.

11.  Chang, C. C. and Chen, C. Y., (1987): “Gray Code as a De-clustering Scheme for Concurrent Disk Retrieval,” Journal of Information Science and Engineering, Vol. 3, No. 2, July 1987, pp. 177-188.

12.  Chang, C. C. and Chen, C. Y., (1987): “Some Properties of Cartesian Product Files for Disk Modulo Allocation Method in a Two-disk System,” Journal of Information Science and Engineering, Vol. 3, No. 2, July 1987, pp. 151-176.

13. Chang, C. C., (1987): “An Information Protection Scheme Based upon Number Theory,” The Computer Journal, Vol. 30, No. 3, 1987, pp. 249-253.

14.  Chang, C. C. and Chen, C. Y., (1987): “Performance Analysis of the Generalized Disk Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disk Systems,” The Computer Journal, Vol. 30, No. 6, Dec. 1987, pp. 535-540.

15.  Chang, C. C. and Chen, C. Y., (1987): “Performance of Two-disk Partition Data Allocations,” BIT , Vol. 27, No. 3, 1987, pp. 306-314.

16.  Chang, C. C. and Chang, C. H., (1988): “An Ordered Minimal Perfect Hashing Scheme with Single Parameter,” Information Processing Letters, Vol. 27, No. 2, Feb. 1988, pp. 79-83.

17.Chang, C. C. and Jan, J. K., (1988): “An Access Control Scheme for New Users and Files,” International Journal on Policy and Information, Vol. 12, No. 2, Dec. 1988, pp. 89-98.

18.Chang, C. C., (1988): “Application of Principal Component Analysis to Multi-Disk Concurrent Accessing,” BIT, Vol. 28, No. 2, 1988, pp. 205-214.

19.Chang, C. C. and Chen, C. Y., (1988): “A Recursive Performance Formula of the DM Allocation Method for BCPFs,” The Computer Journal, Vol. 31, No. 6, Dec. 1988, pp. 565-566.

20.Chang, C. C. and Wu, H. C., (1988): “A Fast Chinese Characters Accessing Technique Using Mandarin Phonetic Transcriptions,” The International Journal of Pattern Recognition and Artificial Intelligence, Vol. 2, No. 1, 1988, pp. 105-137.

21.  Chang, C. C., Chen, C. Y. and Chang, S. S., (1989): “Optimality Properties of Binary Cartesian Product File Systems,” International Journal on Policy and Information, Vol. 13, No. 1, June 1989, pp. 115-125.

22.Chang, C. C. and Wu, T. C., (1989): “Broadcasting Cryptosystem Based upon Euclidean Geometry,” International Journal on Policy and Information, Vol. 13, No. 2, Dec. 1989, pp. 179 -186.

23.  Chang, C. C., Jan, J. K. and Chen, C. P., (1990): “The Design of Two Compression Mechanisms for Chinese Textual Files,” Computer Processing of Chinese and Oriental Languages, Vol. 5, No. 1, Sep. 1990, pp.75-96.

24.  Chang, C. C. and Lin, C. H., (1990): “A Reciprocal Confluence Tree Unit and Its Applications,” BIT, Vol. 30, 1990, pp. 27-33.

25.Jan, J. K., Chang, C. C. and Wu, L. H., (1990): “An Arithmetic Coding Oriented Single Key Access Control Scheme,” International Journal of Information and Management Science, Vol. 1, No. 1, June 1990, pp. 63-75.

26.Lin, C. H., Chang, C. C. and Lee, R. C. T., (1990): “A Dynamic Access Control Mechanism in Information Protection Systems,” Journal of Information Science and Engineering, Vol. 6, 1990, pp. 25-33.

27.  Chang, C. C. and Wu, L. H., (1990): “A New Password Authentication Scheme,” Journal of Information Science and Engineering, Vol. 6, 1990, pp. 139-147.

28.Chang, C. C., (1990): “A Survey of Key-to-Key User Hierarchic Representation Mechanism,” Journal of Information Processing, Japan, invited paper, Vol. 13, No. 4, 1990, pp. 438-441.

29.  Chang, C. C. and Wu, T. C., (1991): “A Letter-Oriented Perfect Hashing Scheme Based upon Sparse Table Compression,” SoftwarePractice and Experience, Vol. 21, No. 1, Jan. 1991, pp. 35-49.

30.Chang, C. C. and Tsai, W. H., (1991): “A Data Compression Scheme for Chinese and English Characters,” Computer Processing of Chinese and Oriental Languages, Vol. 5, No. 2 , Mar. 1991, pp. 154-182.

31. Chang, C. C. and Wu, T. C., (1991): “Remote Password Authentication with Smart Cards,” IEE Proceedings - Part E, Vol. 138, No. 3, May 1991, pp. 165-168.

32. Jan, J. K., Chang, C. C., Wang, F. S. and Chen, C. P., (1991): “A Study of Input Rates for a Chinese Characters Input System,” Communications of Chinese and Oriental Languages Information Processing Society, Vol. 1, No. 1, Sep. 1991, pp. 1-11.

33. Chang, C. C., Chen, C. Y. and Jan, J. K., (1991): “On the Design of a Machine-Independent Perfect Hashing Scheme,” The Computer Journal, Vol. 34, No. 5, Oct. 1991, pp. 469-474.

34. Chang, C. C. and Chen, C. Y., (1991): “A Note on Allocating K-ary Multiple Key Hashing Files Among Multiple Disks,” Information Sciences, Vol. 55, No. 1-3, June 1991, pp. 69-76.

35.Chen, C. Y, Chang, C. C. and Lee, R. C. T., (1991): “On The Design of MKH Files for Concurrent Orthogonal Range Retrieval among Two Disks,” Information Systems, Vol. 16, No. 6, 1991, pp. 613-625.

36. Chang, C. C., (1991): “Spatial Match Retrieval of Symbolic Pictures,” Journal of Information Science and Engineering, Vol. 7, 1991, pp. 405-422.

37. Chang, C. C. and Wu, T. C., (1991): “A Broadcasting Cryptosystem in Computer Networks Using Interpolating Polynomials,” Computer Systems Science and Engineering, Vol. 6, No. 3, 1991, pp. 185-188.

38. Chang, C. C., (1991): “A Composite Perfect Hashing Scheme for Large Letter-oriented Key Sets,” Journal of Information Science and Engineering, Vol. 7, 1991, pp. 173-186.

39. Lin, C. H., Chang, C. C., Wu, T. C. and Lee, R. C. T., (1991): “Password Authentication Using Newton's Interpolation Polynomials,” Information Systems, Vol. 16, No. 1, 1991, pp. 97-102.

40. Chang, C. C., Hwang, S. M. and Buehrer, D. J., (1991): “A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid,” Pattern Recognition, Vol. 24, No. 11, 1991, pp. 1053-1063.

41. Jan, J. K., Chang, C. C. and Wang, S. J., (1991): “A Dynamic Key-Lock-Pair Access Control Scheme,” Computers and Security, Vol. 10, 1991, pp. 129-139.

42. Chang, C. C. and Lee, S. Y., (1991): “Retrieval of Similar Pictures on Pictorial Databases,” Pattern Recognition, Vol. 24, No. 7, 1991, pp. 675-680.

43. Wu, T. C. and Chang, C. C., (1991): “A Password Authentication Scheme Based on Discrete Logarithms,” International Journal of Computer Mathematics, Vol. 41, No. 3-4, 1991, pp. 31-38.

44. Chen, J. N. and Chang, C. C., (1992): “A Chinese Character Retrieval Scheme Using Shuang Pinyin,” Journal of Information Science and Engineering, Vol. 8, No. 3, Sep. 1992, pp. 487-507.

45. Lin, C. H., Chang, C. C. and Lee, R. C. T., (1992): “Hierarchy Representations Based on Arithmetic Coding for Dynamic Information Protection Systems,” Information Sciences, Vol. 64, No. 1-2, Oct. 1992, pp. 35-48.

46. Chen, C. Y. and Chang, C. C., (1992): “On GDM Allocation Method for Partial Range Queries,” Information Systems, Vol. 17, No. 5, Oct. 1992, pp. 381-394.

47. Liu, C. C., Chang, C. C. and Buehrer, D. J., (1992): “Encoding Chinese Words Using Mandarin Phonetic Symbols,” Computer Processing of Chinese and Oriental Languages, Dec. 1992, pp. 195-204.

48. Lin, C. H., Chang, C. C. and Lee, R. C. T., (1992): “A Record-Oriented Cryptosystem for Database Sharing,” The Computer Journal, Vol. 35, No. 6, 1992, pp. 658-660.

49. Chang, C. C., Chen, H. Y. and Chen, C. Y., (1992): “Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems,” The Computer Journal, Vol. 35, No. 3, 1992, pp. 299-305.

50. Chou, Y. H., Yang, W. P. and Chang, C. C., (1992): “Greedy File - A New Data Organization Concept for Partial Match Retrieval,” The Computer Journal, Vol. 35, 1992, pp. A403-A408.

51. Chang, C. C., Lin, H. F. and Chen, C. Y., (1992): “Optimality Properties of DM Allocation Method for K-ary Multiple Key Hashing Files,” The Computer Journal, Vol. 35, No. 4, 1992, pp. 390-394.

52. Chang, C. C. and Hwang, S. J., (1992): “A Secure Broadcasting Scheme Based on Discrete Logarithms,” International Journal of Control and Computers, Vol. 20, No. 2, 1992, pp. 49-53.

53. Chang, C. C., (1992): “A Fast Algorithm to Retrieve Symbolic Pictures,” International Journal of Computer Mathematics, Vol. 43, No. 3-4, 1992, pp. 133-138.

54. Lin, C. H., Chang, C. C. and Lee, R. C. T., (1992): “A Conference Key Broadcasting System Using Sealed Locks,” Information Systems, Vol. 17, No. 4, 1992, pp. 323-328.

55. Chang, C. C. and Wu, T. C., (1992): “Retrieving the Most Similar Symbolic Pictures from Pictorial Databases,” Information Processing and Management, Vol. 28, No. 5, 1992, pp. 581-588.

56. Chang, C. C., Hwang, R. J. and Wu, T. C., (1992): “Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” Information Systems, Vol. 17, No. 3, 1992, pp. 243-247.

57. Chang, C. C. and Lee, H. C., (1992): “A Solution to Generalized Group Cryptography,” IT SECURITY: The Need for International Security, North-Holland, 1992, pp. 265-275.

58.     Chang, C. C. and Laih, C. S., (1992): “Correspondence of Remote Password Authentication with Smart Cards,” IEE Proceedings - Part E, 1992, pp. 372-372.

59.     Wu, T. C., Yeh, Y. S. and Chang, C. C., (1993): “Algebraic Operations on Encrypted Relational Databases,” Information Systems, Vol. 18, No. 1, 1993, pp. 55-62.

60.     Hwang, M. S., Chang, C. C. and Yang, W. P., (1993): “Modified Chang-Hwang-Wu Access Control Scheme,” IEE Electronics Letters, Vol. 29, No. 24, Nov. 1993. pp. 2095-2096.

61.     Chen, C. Y., Chang, C. C. and Lee, R. C. T., (1993): “Optimal MMI File Systems for Orthogonal Range Retrieval,” Information Systems, Vol. 18, No. 1, Feb. 1993, pp. 37-54.
 

62.     Chang, C. C. and Hwang, R. J., (1993): “Master Keys for an M3 Cryptoscheme,” Cryptologia, Vol. XVII, No. 2, Apr. 1993, pp. 175-186.

63.     Chen, C. Y. and Chang, C. C., (1993): “An Object-Oriented Similarity Retrieval Algorithm for Iconic Image Database,” Pattern Recognition Letters, Vol. 14, June 1993, pp. 465-470.

64.     Chang, C. C. and Lee, H. C., (1993): “A New Generalized Group-Oriented Cryptoscheme without Trusted Centers,” IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, June 1993, pp. 725-729.

65.     Chang, C. C., Lu, C. S. and Buehrer, D. J., (1993): “A Chinese Seal Imprints Recognition Scheme,” Computer Processing of Chinese and Oriental Languages, June 1993, pp. 111-124.

66.     Chang, C. C. and Wu, T. C., (1993): “A Hashing-Oriented Nearest Neighbor Searching Scheme,” Pattern Recognition Letters, Vol. 4, Aug. 1993, pp. 625-630.

67.     Jan, J. K. and Chang, C. C., (1993): “A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files,” BIT, Vol. 33, 1993, pp. 382-389.

68.     Chang, C. C. and Wu, T. C., (1993): “Controlling the Access Requests in Information Protection Systems,” Information Processing and Management, Vol. 29, No. 1, 1993, pp. 61-68.

69.     Chang, C. C. and Buehrer, D. J., (1993): “Access Control in a Hierarchy Using a One-Way Trap Door Function, Computers and Mathematics with Applications,” Vol. 26, No. 5, 1993, pp. 71-76.

70.     Chang, C. C. and Hwang, S. J., (1993): “Using Smart Cards to Authenticate Remote Passwords,” Computers and Mathematics with Applications, Vol. 26, No. 7, 1993, pp. 19-27.

71.     Chang, C. C., Kowng, H. C. and Wu, T. C., (1993): “A Refinement of a Compression-Oriented Addressing Scheme for Letter-Oriented Keywords,” BIT, Vol. 33, 1993, pp. 530-535.

72.     Laih, C. S., Chang, C. C. and Yeh, S. M., (1994): “Parallel Computation of the Cascade Exponentiation,” International Journal of Information Management and Engineering, Vol. 1, No. 3, 1994, pp. 9-13.

73.     Ko, M. Y., Hwang, T. and Chang, C. C., (1994): “Attacks on ID-based Signature Scheme Based upon Rabin's Public Key Cryptosystem,” Computer Communications, Vol. 17, No. 9, Sep. 1994, pp. 674-676.

74.     Chang, C. C., Hwang, S. J. and Buehrer, D. J., (1994): “New Concepts for Multiple Stack Systems: Born and Reborn,” Journal of Systems and Software, Vol.27, No. 1, Oct. 1994, pp. 45-54.

75.     Chang, C. C. and Liaw, H. T., (1994): “Assigning Digital Key Pairs to Determine Relationships in a User Hierarchy Structure,” Transactions of Information Processing Society of Japan, Vol. 35, No. 10, Oct. 1994, pp. 2189-2196.

76.     Lin, C. H. and Chang, C. C., (1994): “Method for Constructing a Group-Oriented Cipher System,” Computer Communications, Vol. 17, No. 11, Nov. 1994, pp. 805-808.

77.     Wu, T. C. and Chang, C. C., (1994): “Controlling Access in Tree Hierarchies,” Information Sciences, Vol. 78, 1994, pp. 69-76.

78.     Liang, J., Chang, C. C., McFadyen, R. G. and Lee, R. C. T., (1994): “Optimal Multiple Key Hashing Files for Orthogonal Range Queries,” Information Sciences, Vol. 79, No. 1-2, July 1994, pp. 145-158.

79.     Chang, C. C., Shen, J. J. and Wu, T. C., (1994): “Access Control with Binary Keys,” Computers and Security, Vol. 13, No. 8, 1994, pp. 681-686.

80.     Chang, C. C. and Lin, D. C., (1994): “Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters,” Chinese and Oriental Languages Computing, Vol. 8, No. 2, Dec. 1994, pp. 177-192.

81.     Laih, C. S., Chiou, W. H. and Chang, C. C., (1994): “Authentication and Protection of Public Keys,” Computers and Security, Vol. 13, No. 7, 1994, pp. 581-585.

82.     Chang, C. C., Chen, Y. W. and Buehrer, D. J., (1994): “A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 8, No. 4, 1994, pp. 859-875.

83.     Wu, T. C., Chang, C. C. and Yeh, Y. S., (1994): “An Authentication-Combined Access Control Scheme Using a One-Way Function,” Computers and Mathematics with Applications, Vol. 27, No. 5, May 1994, pp. 63-70.

84.     Chang, C. C. and Liou, F. Y., (1994): “A Digital Multisignature Scheme Based upon the Digital Signature Scheme of a Modified ElGamal's Public Key Cryptosystem,” Journal of Information Science and Engineering, Vol. 10, No. 3, Sep. 1994, pp. 423-432.

85.        Tseng, J. C. R., Yang, W. P. and Chang, C. C., (1994): “A New Access Control Scheme with High Data Security,” International Journal of Management and Information Sciences, Vol. 5, No. 3, Dec. 1994, pp. 35-48.

86.        Chen, Y. J., Chang, C. C. and Yang, W. P., (1994): “Some Properties of Vectorial Addition Chains,” International Journal of Computer Mathematics, Vol. 54, 1994, pp. 185-196.

87.        Chang, C. C., Jan, J. K. and Buehrer, D. J., (1994): “A Scheme to Determine the Relationship between Two Users in a Hierarchy,” Computers and Security, Vol. 13, No. 3, May 1994, pp. 255-261.

88.        Chang, C. C. and Liao, W. Y., (1994): “A Remote Password Authentication Scheme Based upon ElGamal's Signature Scheme,” Computers and Security, Vol. 13, No. 2, Apr. 1994, pp. 137-144.

89.        Wu, T. C. and Chang, C. C., (1994): “Application of Geometric Hashing to Iconic Database Retrieval,” Pattern Recognition Letters, Vol. 15, No. 9, Sep. 1994, pp. 871-876.

90.        Lin, C. H. and Chang, C. C., (1994): “A Server-Aided Computation Protocol for RSA Enciphering Algorithm,” International Journal of Computer Mathematics, Vol. 53, 1994, pp. 149-155.

91.        Chang, C. C., Wu, T. C. and Laih, C. S., (1995): “Cryptanalysis of a Password Authentication Scheme Using Quadratic Residues,” Computer Communications, Vol. 18, No. 1, Jan. 1995, pp. 45-47.

92.        Chang, C. C., Fan, S. W., Liaw, H. T. and Chiou, M. Y., (1995): “Cryptanalysis on an Access Control in a Hierarchy,” Computers and Mathematics with Applications, Vol. 29, No. 4, Feb. 1995, pp. 69-72.

93.        Lin, C. H., Chang, C. C. and Lee, R. C. T., (1995): “A New Public-key Cipher System Based upon the Diophantine Equations,” IEEE Transactions on Computers, Vol. 44, No. 1, Jan. 1995, pp. 13-19.

94.        Chang, C. C., Horng, W. J. and Buehrer, D. J., (1995): “A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm,” Journal of Information Science and Engineering, Vol. 11, No. 3, Sep. 1995, pp. 417-431.

95.        Chou, A. Y. H., Yang, W. P. and Chang, C. C., (1995): “Optimal Two-Dimensional Cartesian Product Files for Orthogonal Range Queries,” Journal of Information Science and Engineering, Vol. 11, No. 4, Dec. 1995, pp. 625-647.

96.        Chang, C. C. and Lee, C. F., (1995): “Relative Coordinates Oriented Symbolic String for Spatial Relationship Retrieval,” Pattern Recognition, Vol. 28, No. 4, Apr. 1995, pp. 563-570.

97.        Chang, C. C. and Wu, T. C., (1995): “An Exact Match Retrieval Scheme Based upon Principal Component Analysis,” Pattern Recognition Letters, Vol. 16, No. 5, May 1995, pp. 465-470.

98.        Chen, C. Y., Chang, C. C. and Lee, R. C. T., (1995): “A Near Pattern-matching Scheme Based upon Principal Component Analysis,” Pattern Recognition Letters, Vol. 16, No. 4, Apr. 1995, pp. 339-345.

99.        Chen, Y. J., Chang, C. C. and Yang, W. P., (1995): “The Shortest Weighted Length Addition Chains,” Journal of Information Science and Engineering, Vol. 11, No. 2, June 1995, pp. 295-305.

100.   Lee, W. B., Chang, C. C. and Jan, J. K., (1995): “Cryptanalysis of a Cryptosystem Based upon Continuned Fraction,” International Journal of Information and Management Sciences, Vol. 6, No. 3, Sep. 1995, pp. 1-11.

101.   Lee, W. B. and Chang, C. C., (1995): “Authenticated Encryption Scheme without Using a One Way Function,” IEE Electronics Letters, Vol. 31, No. 19, Sep. 1995, pp. 1656-1657.

102.   Tsai, H. M. and Chang, C. C., (1995): “A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy,” Computers and Security, Vol. 14, No. 2, 1995, pp. 159-166.

103.   Chen, Y. J., Chang, C. C. and Yang, W. P., (1995): “Parallel Computation of the Modular Cascade Exponentiation,” Journal of Parallel Algorithms and Applications, Vol. 7, 1995, pp. 29-42.

104.   Chang, C. C. and Tsu, S. M., (1995): “Arithmetic Operations on Encrypted Data,” International Journal of Computer Mathematics, Vol. 56, No. 1-2, Jan. 1995, pp. 1-10.

105.   Chang, C. C., Tsu, S. M. and Chen, C. Y., (1995): “Remote Scheme for Password Authentication Based on the Theory of Quadratic Residues,” Computer Communications, Vol. 18, No. 12, Dec. 1995, pp. 936-942.

106.   Lee, W. B. and Chang, C. C., (1995): “Comment on Digital Signature with (t, n) Shared Verification Based on Discrete Logarithms,” IEE Electronics Letters, Vol. 31, No. 3, 1995, pp. 176-177.

107.   Chang, C. C. and Liang, J., (1995): “Dynamic Pictorial Databases Design for Similar Retrieval,” Information Sciences, Vol. 87, No. 1-3, Nov. 1995, pp. 29-46.

108.   Hwang, T., Lee, N. Y., Li, C. M. and Chang, C. C., (1996): “On the Security of Chang and Wu's Broadcasting Cryptosystem for Computer Network,” Computer Systems Science and Engineering, Vol. 11, No. 5, Sep. 1996, pp. 311-314.

109.   Chang, C. C. and Jiang, J. H., (1996): “A Spatial Filter for Similarity Retrieval,” International Journal on Pattern Recognition and Artificial Intelligence, Vol. 10, No. 6, Dec. 1996, pp. 711-730.

110.   Lee, W. B. and Chang, C. C., (1996): “Cryptanalysis of an Improved Remote Password Authentication with Smart Card,” International Journal of Information Management and Engineering, Vol. 2, No. 1, 1996, pp. 1-5.

111.   Chang, C. C., Kowng, H. C. and Buehrer, D. J., (1996): “An Improvement to Ziegler's Sparse Matrix Compression Algorithm,” Journal of Systems and Software, Vol. 35, No. 1, Oct. 1996, pp. 67-71.

112.   Lee, W. B. and Chang, C. C., (1996): “Integrating Authentication in Public Key Distribution System,” Information Processing Letters, Vol. 57, 1996, pp. 49-52.

113.   Chen, C. Y., Chang, C. C. and Yang, W. P., (1996): “Cryptanalysis of the Secret Exponent of RSA,” Journal of Information Science and Engineering, Vol. 12, 1996, pp. 277-290.

114.   Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T., (1996): “Redundant MKH Files Design among Multiple Disks for Concurrent Partial Match Retrieval,” Journal of Systems and Software, Vol. 35, No. 3, Dec. 1996, pp. 199-207.

115.   Chang, C. C. and Hwang, M. S., (1996): “Parallel Computation of the Generating Keys for RSA Cryptosystems,” IEE Electronics Letters, Vol. 32, No. 15, July 1996, pp. 1365-1366.

116.   Chang, C. C. and Lin, D. C., (1996): “Spatial Data Representation: An Adaptive 2D-H String,” Pattern Recognition Letters, Vol. 17, No. 2, Feb. 1996, pp. 175-185.

117.   Wu, T. C. and Chang, C. C., (1996): “Retrieving Chinese Characters with Similar Appearance from a Reorganized Chinese Dictionary,” International Journal of Information and Management Sciences, Vol. 7, No. 2, June 1996, pp. 31-43.

118.   Chang, C. C., Chang, R. F., Lee, W. T. and Kuo, C. L., (1996): “Fast Algorithms for Vector Quantization,” Journal of Information Science and Engineering, Vol. 12, No. 4, Dec. 1996, pp. 593-602.

119.   Chou, A. Y. H., Chang, C. C. and Yang, W. P., (1996): “Some Properties of Optimal Cartesian Product Files for Orthogonal Range Queries,” Information Sciences, Vol. 90, No. 1-4, Apr. 1996, pp. 91-107.

120.   Lou, D. C. and Chang, C. C., (1996): “A Parallel Two-list Algorithm for the Knapsack Problem,” Parallel Computing, Vol. 22, 1996, pp. 1985-1996.

121.   Chang, C. C. and Leu, J. J., (1996): “Two 2D Search Filters and Their Performance Analyses,” International Journal of Computer Mathematics, Vol. 60, No. 3-4, 1996, pp. 183-203.

122.   Hwang, S. J., Chang, C. C. and Yang, W. P., (1996): “An Efficient Dynamic Threshold Scheme,” IEICE Transactions on Information and Systems, Vol. E79-D, No. 7, July 1996, pp. 936-942.

123.   Lou, D. C. and Chang, C. C., (1996): “Fast Exponentiation Method Obtained by Folding the Exponent in Half,” IEE Electronics Letters, Vol. 32, No. 11, May 1996, pp. 984-985.

124.   Hwang, S. J., Chang, C. C. and Yang, W. P., (1996): “Two Efficient Server-Aided RSA Secret Computation Protocols against Active Attacks,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E79-A, No. 9, Sep. 1996, pp. 1504-1511.

125.   Lee, W. B. and Chang, C. C., (1996): “On Key Changeable ID-Based Digatal Signature Scheme,” Journal of Information Science and Engineering, Vol. 12, No. 3, Sep. 1996, pp. 381-386.

126.   Hwang, S. J., Chang, C. C. and Yang, W. P., (1996): “Authenticated Encryption Schemes with Message Linkages,” Information Processing Letters, Vol. 58, 1996, pp. 189-194.

127.   Chen, C. Y., Chang, C. C. and Yang, W. P., (1996): “Hybrid Method for Modular Exponentiation with Precomputation,” IEE Electronics Letters, Vol. 32, No. 6, Mar. 1996, pp. 540-541.

128.   Chang, C. C., Jan, J. K. and Kowng, H. C., (1997): “A Digital Signature Scheme Based upon Theory of Quadratic Residues,” Cryptologia, Vol. XXI, No. 1, Jan. 1997, pp. 55-70.

129.   Chang, C. C. and Wang, C. H., (1997): “A Locally Adaptive Data Compression Strategy for Chinese-English Characters,” Journal of Systems and Software, Vol. 36, No. 2, Feb. 1997, pp. 167-179.

130.   Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T., (1997): “Optimal Bucket Allocation Design of K-ary MKH Files for Concurrent Partial Match Retrieval,” IEEE Transactions on Knowledge and Data Engineering, Vol. 9, No. 1, Jan.&Feb. 1997, pp. 148-160.

131.   Chang, C. C. and Chen, T. S., (1997): “A New Tree-Structured Vector Quantization with Closest-Coupled Multipath Searching Method,” Optical Engineering, Vol. 36, No. 6, 1997, pp.1713-1720 .

132.   Chang, C. C. and Wu, W. B., (1997): “A Secure Voting System on a Public Network,” Networks, Vol. 29, 1997, pp. 81-87.

133.   Chang, C. C., Lin, D. C. and Chen, T. S., (1997): “An Improved VQ Codebook Search Algorithm Using Principal Component Analysis,” Journal of Visual Communication and Image Representation, Vol.8, No. 1, 1997, pp. 27-37.

134.   Chen, T. S. and Chang, C. C., (1997): “A New Image Coding Algorithm Using Variable-Rate Side-Match Finite-State Vector Quantization,” IEEE Transactions on Image Processing, Vol.6, No.8, 1997, pp.1185-1187.

135.   Chang, C. C., Lou, D. C. and Wu, T. C., (1997): “A Binary Access Control Method Using Prime Factorization,” Information Sciences, Vol. 96, No. 1-2, Jan. 1997, pp. 15-26.

136.   Chang, C. C. and Hwang, R. J., (1997): “An Efficient Cheater Identification Method for Threshold Scheme,” IEE Proceedings - Computers and Digital Techniques, Vol. 144, No. 1, Jan. 1997, pp. 23-27.

137.   Chang, C. C. and Wu, T. C., (1997): “A Smart Card Oriented Password Authentication Scheme Based on Rabin’s Public Key Cryptosystem,” International Journal on Information and Management Sciences, Vol.8, No.3, September 1997, pp.63-73.

138.   Chen, T. S. and Chang, C. C., (1997): “Diagonal Axes Method (DAM): A Fast Search Algorithm for Vector Quantization,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 7, No.3, 1997, pp.555-559.

139.   Chang, C. C. and Lou, D. C., (1997): “Parallel Computation of the Multi-Exponentiation for Cryptosystems,” International Journal of Computer Mathematics, Vol. 63, No. 1-2, Jan. 1997, pp. 9-26.

140.   Chang, C. C., Jiang, J. H. and Buehrer, D. J., (1997): “A New Method for Temporal Join Using a Priority Search Tree,” International Journal of Information and Management Sciences, Vol. 8. No. 3, 1997, pp. 1-13.

141.   Chen, T. S., Chang, C. C. and Hwang, M. S., (1997): “A Virtual Image Cryptosystem Based on Vector Quantization,” IEEE Transactions on Image Processing, Vol. 7, No. 10, 1997, pp. 1485-1488.

142.   Chang, C. C. and Hwang, S. J., (1997): “A Simple Approach for Generating RSA Keys,” Information Processing Letters, Vol. 63, 1997, pp.19-21.

143.   Chen, C. Y., Lin, H. F., Chang, C. C. and Lee, R. C. T., (1997): “ Multidisk Smaller Sized MKH File Allocation for Partial Match Retrieval,” Journal of Information Science and Engineering, Vol.13, 1997, pp.125-141.

144.   Lou, D. C. and Chang, C. C., (1997): “A Cost Optimal Search Technique for the Knapsack Problem,” International Journal of High Speed Computing, Vol. 9, No. 1, 1997, pp. 1-12.

145.   Lee, W. B. and Chang, C. C., (1997): “Authenticated Encryption Schemes with Linkage between Message Blocks,” Information Processing Letters, Vol. 63, 1997, pp. 247-250.

146.   Kuo, W. C., Laih, C. S., Gau, M. J. and Chang, C. C., (1997): “On the Number of Messages Cannot be Concealed in LUC,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E80-A, No. 11, 1997, pp. 2218-2224.

147.   Chang, C. C., Lee, C. F., (1997): “Spatial Match Retrieval Based on Direction Signatures Using Multiple Key Hashing Scheme,” International Journal of Intelligent Systems, Vol.12, No. 10, Oct. 1997, pp. 777-788.

148.   Hwang, R. J. and Chang, C. C., (1998): “An On-line Secret Sharing Scheme for Multi-secrets,” Computer Communications, Vol. 21, No. 13, 1998, pp. 1170-1176.

149.   Lou, D. C. and Chang, C. C., (1998): “An Adaptive Exponentiation Method,” Journal of Systems and Software, Vol. 42, 1998, pp. 59-69.

150.   Lee, W. B. and Chang, C. C., (1998): “Efficient Group Signature Scheme Based on Discrete Logarithm,” IEE Proceedings Computers and Digital Techniques, Vol. 145, No. 1, Jan. 1998, pp. 15-18.

151.   Lee, W. B. and Chang, C. C., (1998): “Three ID-Based Information Security Functions,” Computer Communications, Vol. 20, 1998, pp. 1301-1307.

152.   Lou, D. C. and Chang, C. C., (1998): “A Fast Modular Multiplication Method,” Computer Systems Science and Engineering, Vol. 13, No. 6, Nov. 1998, pp. 353-358.

153.   Chang, C. C., Sung, C. H. and Chen, T. S., (1998): “A New Data Compression Scheme for Chinese Text Using Chinese Words and Multilist Structure,” Computer Processing of Chinese and Oriental Languages, Vol. 11, No. 2, Oct. 1998, pp. 145-158.

154.   Hwang, S. J., Chen, C. Y. and Chang, C. C., (1998): “An Encryption/Multisignature Scheme with Specified Receiving Groups,” Computer Systems Science and Engineering, Vol. 2, 1998, pp. 109-112.

155.   Chang, C. C., Wu, T. C. and Yeh, Y. S., (1998): “Broadcasting Secrets in Communication Networks,” Computer Systems Science and Engineering, Vol. 13, No. 2, 1998, pp. 121-124.

156.   Chang, C. C. and Jiang, J. H., (1998): “Multiple Disk Allocation Based on Round-Robin Hilbert Curve for Spatial Data,” International Journal of Information and Management Sciences, Vol.9, No.1, 1998, pp.11-23.

157.   Chang, C. C., Chou, J. S. and Chen, T. S., (1998): “A Predictive Image Coding Scheme Using a Smaller Codebook,” Image Communication, Vol. 12, 1998, pp. 23-32.

158.   Chang, C. C., Lee, W. T. and Chen, T. S., (1998): “Two Improved Codebook Search Methods of Vector Quantization Based on Orthogonal Checking and Fixed Range Search,” Journal of Electronic Imaging, Vol. 7, No. 2, April 1998, pp.357-366.

159.   Chang, C. C. and Lee, C. F., (1998): “A Bin-Tree Oriented Iconic Indexing Scheme for Retrieving Symbolic Pictures,” Data and Knowledge Engineering, Vol. 26, No.2, 1998, pp. 121-133.

160.   Lee, W. B. and Chang, C. C., (1998): “A Dynamic Secret Sharing Scheme Based on the Factoring and Diffie-Hellman Problems,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, 1998, pp. 1733-1738.

161.   Chang, C. C. and Hwang, R. J., (1998): “Sharing Secret Images Using Shadow Codebooks" Information Sciences Applications, 1998, pp. 335-345.

162.   Wang, C. T., Lin, C. H. and Chang, C. C., (1998): “Threshold Signature Schemes with Traceable Signers in Group Communications,” Computer Communications, Vol. 21, 1998, pp. 771-776.

163.   Chang, C. C. and Hwang, R. J., (1998): “A Simple Picture Hiding Scheme,” Computer Processing of Oriental Languages, Vol. 12, No. 2, 1998, pp. 237-248.

164.   Lee, W. B. and Chang, C. C., (1998): “Using RSA with Low Exponent in a Public Network,” Computer Communications, Vol. 21, 1998, pp. 284-286.

165.   Wang, C. T., Chang, C. C. and Lin, C. H., (1998): “Conference Key Supervision in a Level-Based Hierarchy,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, No. 10, Oct. 1998, pp. 2219-2227.

166.   Lee, W. B. and Chang, C. C., (1998): “Authenticity of Public Keys in Asymmetric Cryptosystems,” Computer Communications, Vol. 21, No. 2, 1998, pp. 195-198.

167.   Chang, C. C., Chen, L. L. and Chen, T. S., (1998): “An Improvement of Bottom-Up Variable-Sized Block Matching Technique for Video Compression,” IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, Nov. 1998, pp. 1234-1242.

168.   Chang, C. C. and Hu, Y. C., (1998): “A Fast Codebook Training Algorithm for Vector Quantization,” IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, Nov. 1998, pp. 1201-1208.

169.   Chang, C. C. and Lee, C. F., (1998): “A Spatial Match Retrieval Mechanism for Symbolic Pictures,” Journal of Systems and Software, Vol. 44, 1998, pp. 73-83.

170.   Chang, C. C., Jau, J. J. and Chen, T. S., (1998): “A Fast Reconstruction Method for Transmitting Image Progressively,” IEEE Transactions on Consumer Electronics, Vol. 44, No. 4, Nov. 1998, pp. 1225-1233.

171.   Lee, W. B. and Chang, C. C., (1999): “(t, n) Threshold Digital Signature with Traceability Property,” Journal of Information Science and Engineering, Vol. 15, No. 5, 1999, pp. 669-678.

172.   Hwang, R. J. and Chang, C. C., (1999): “An Improved Threshold Scheme Based on Modular Arithmetic,” Journal of Information Science and Engineering, Vol. 15, No. 5, 1999, pp. 691-699.

173.   Chang, C. C., Lee, T. F. and Leu, J. J., (1999): “Partition Search Filter and Its Performance Analysis,” Journal of Systems and Software, Vol. 47, 1999, pp. 35-43.

174.   Hwang, R. J., Lee, W. B. and Chang, C. C., (1999): “A Concept of Designing Cheater Identification Methods for Secret Sharing,” Journal of Systems and Software, Vol. 46, 1999, pp. 7-11.

175.   Chang, C. C. and Hu, Y. C., (1999): “Hybrid Image Compression Methods Based on Vector Quantization and Block Truncation Coding,” Optical Engineering, Vol. 38, No. 4, 1999, pp. 591-598.

176.   Jiang, J. H., Chang, C. C. and Chen, T. S., (1999): “Calligraphy Compression Using Quadtree Decomposition and Pattern Matching,” Computer Processing of Oriental Languages, Vol. 12, No. 3, 1999, pp. 341-358.

177.   Chang, C. C. and Shen J. J., (1999): “A Multi-Channel Storage Arrangement Scheme of Pictorial Databases for Concurrent Spatial Match Retrieval,” Computer and Mathematics with Applications, Vol.39, No. 5-6, Feb. 1999, pp. 239-248.

178.   Hu, Y. C and Chang, C. C., (1999): “Low Complexity Index-Compressed Vector Quantization for Image Compression,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 1, Feb. 1999, pp. 1225-1233.

179.   Hu, Y. C. and Chang, C. C., (1999): “Variable Rate Vector Quantization Scheme Based on Quadtree Segmentation,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, 1999, pp. 310-317.

180.   Jiang, J. H., Chang, C. C. and Chen, T. S., (1999): “A Compact Sparse Matrix Representation Using Random Hash Functions,” Data & Knowledge Engineering, Vol. 32, 1999, pp. 29-49.

181.   Chang, C. C. and Hwang, P. C. and Lee, W. B., (1999): “Conference Key Distribution Scheme for Portable Communication System,” Computer Communications, Vol. 22, No. 12, 1999, pp. 1160-1164.

182.   Wang, C. T., Chang, C. C. and Lin, C. H., (1999) : “A Method for Computing Lucas Sequence,” Computer and Mathematics with Applications, Vol. 38, 1999, pp.187-196.

183.   Hwang, M. S., Chang, C. C. and Hwang, K. F., (1999): “A Watermarking Technique Based on One-way Hash Functions,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 2, 1999, pp. 286-294.

184.   Chang, C. C., Wang, C. T. and Lin, C. H., (1999): Conference Key Distributions Using Self-Certified Public Keys, International Journal of Applied Mathematics, Vol.2, No. 3, 1999, pp. 327-337.

185.   Hung, K. L., Chang, C. C. and Chen T. S., (1999): “Reconstruction of Lost Blocks Using Codeword Estimation,” IEEE Transactions on Consumer Electronics, Vol. 45, No. 4, 1999,  pp.1190-1199.

186.   Chen, C. Y. and Chang, C. C., (1999): “A Fast Modular Multiplication Algorithm for Calculating the Product AB Modulo N,” Information Processing Letters, Vol. 72, 1999, pp. 77-81.

187.   Chang, C. C., Chou, J. S. and Chen, T. S., (2000): “A Fast Prediction of Euclidean Distance Using Approximated Look-Up Table,” IEEE Transactions on Circuits and Systems for Video Technology, Vol.10, No. 4, 2000, pp. 594-599.

188.   Lee, W. B. and Chang, C. C., (2000): “User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks,” Computer Systems Science and Engineering, Vol. 15, No.4, 2000, pp. 211-214.

189.   Chang, C. C. and Lou, D. C., (2000): “An Efficient Divide-and-Conquer Technique for Parallel Computation of Modular Multi-Exponentiation,” Computer Systems Science and Engineering, Vol. 15, No. 2, March 2000, pp. 111-117.

190.   Hu, Y. C. and Chang, C. C., (2000): “Quadtree-Segmented Image Coding Schemes Using Vector Quantization and Block Truncation Coding,” Optical Engineering, Vol. 39, No. 2, 2000, pp.464-471.

191.   Hu, Y. C. and Chang, C. C., (2000): “A New Lossless Compression Scheme Based on Huffman Coding for Image Compression,” Signal ProcessingImage Communication, Vol. 16, 2000, pp. 367-372.

192.   Hu, Y. C. and Chang, C. C., (2000): “A Predictive Subcodebook Search Algorithm for Vector Quantization,” Optical Engineering, Vol. 39, No. 6, 2000, pp.1489-1496.

193.   Wang, C. T, Chang, C. C. and Lin, C. H., (2000) : “Generalization of Threshold Signature and Authenticated Encryption for Group Communications,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 6, June 2000, pp. 1228-1237.

194.   Chang, C. C., Chen, T. S. and Chung, P. F., (2000): “A Technique of Watermarking for Digital Images Using (t,n)-Threshold Scheme,” Informatica, Vol. 24, No.1, March 2000, pp. 51-55.

195.   Chang, C. C. and Tsai, C. S., (2000) : “A Technique for Computing Watermarks from Digital Images,” Informatica, Vol. 24, No. 3, June 2000, pp.391-396.

196.   Chang, C. C., Hwang, K. F. and Hwang, M.S., (2000) : “A Digital Watermarking Scheme Using Human Visual Effects,” Informatica, Vol. 24, No. 4, 2000, pp. 505-511.

197.   Hwang, S. J. and Chang, C. C., (2000): “A New Efficient Server-Aided RSA Secret Computation Protocol Against Active Attacks,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No. 3, March 2000, pp. 567-570.

198.   Chang, C. C., Shine, F. C. and Chen, T. S., (2000): “Pattern-based Side Match Vector Quantization for Image Compression,” Imaging Science Journal, Vol. 48, 2000, pp. 63-76.

199.   Chang, C. C., Chen, T. S. and Chung, L. Z., (2000): A Colour Image Compression Scheme Based on Two-Layer Absolute Moment Block Truncation Coding,” Imaging Science Journal, Vol. 48, 2000, pp. 53-62.

200.   Chang, C. C. and Kuo, Y. T., (2000): “Fast Modular Reduction and Multi-multiplication Method,” International Journal of Applied Mathematics, Vol. 3, No. 1, Feb. 2000, pp. 35-46.

201.   Hwang, M. S., Chang, C. C. and Hwang, K. F., (2000): “Digital Watermarking of Images Using Neural Networks,” Journal of Electronic Imaging, Vol. 9, No. 4, Oct. 2000, pp. 548-555.

202.   Chang, C. C. and Chan, C. W., (2000): Computing Lucas Functions Using Addition Chains, International Journal of Applied Mathematics, Vol. 4, No. 2, 2000, pp. 173-188.

203.   Chan, Y. K. and Chang, C. C., (2000): A Fast Filter of Spatial Video Retrieval, International Journal of Applied Mathematics, Vol. 4, No. 2, 2000, pp. 157-171.

204.   Lee, C. F. and Chang, C. C., (2000): “A Breadth First Oriented Symbolic Picture Representation for Spatial Match Retrieval,” Journal of Systems and Software, Vol. 52, No. 1, 2000, pp. 11-23.

205.   Chang, C. C., Hwang, M. S. and Chen, T. S., (2001): “A New Encryption Algorithm for Image Cryptosystems,” Journal of Systems and Software, Vol. 58, 2001, pp. 83-91.

206.   Wu, T. C. and Chang, C. C., (2001): “Cryptographic Key Assignment Scheme for Hierarchical Access Control,” International Journal of Computer Systems Science and Engineering, Vol. 16, No. 1, 2001, pp. 25-28.

207.   Chan, Y. K. and Chang, C. C., (2001): “Spatial Similarity Retrieval in Video Database,” Journal of Visual Communication and Image Representation, Vol. 12, 2001, pp. 107-122.

208.   Hwang, M. S., Chang, C. C. and Hwang, K. F., (2001): “An Efficient Threshold Decryption Scheme without Session Keys,” Computer & Electrical Engineering, Vol. 27, 2001, pp. 29-35.

209.   Chan, Y. K. and Chang, C. C., (2001): “Image Matching Using Run-Length Feature,” Pattern Recognition, Vol. 22, 2001, pp. 447-455.

210.  Hu, Y. C. and Chang, C. C., (2001): “Image Coding Schemes Based on Subsampling Vector Quantization,” Optical Engineering, Vol. 40, No. 1, 2000, pp. 108-114.

211.   Chang, C. C., Chen, L. L. and Chen T. S., (2001): “A New Two-way Search Algorithm for Block Motion Estimation Estimation of Video Data,” Journal of Information Science and Engineering, Vol. 17, No. 3, 2001, pp. 405-415.

212.  Chang, C. C. and Wu, H. C., (2001): “A Secure and Robust Digital Image Copyright Protection Scheme,” Journal of Applied Systems Studies, Vol. 2, No. 3, 2001.

213.   Hwang, R. J. and Chang, C. C., (2001): Hiding a Picture in two Pictures", Optical Engineering. Vol. 40, No. 3, 2001, pp. 342-351.

214.   Chang, C. C. and Kuo, Y. T., (2001): “Employ a Data Compression Scheme to Speed up the Computations on Elliptic Curves,” International Journal of Applied Mathematics, Vol. 7, No. 1, January 2001, pp. 1-16.

215.   Tsai, C. S., Chang, C. C. and Chen,T. S., (2001): Image Steganography Using Vector Quantization and Discrete Cosine Transformation,” Imaging Science Journal, Vol. 48, 2001, pp. 205-215.

216.   Hung, K. L., Chang, C. C. and Chen, T. S., (2001): Secure Discrete Cosine Transform based Technique for Recoverable Tamper Proofing,” Optical Engineering, Vol. 40, No. 9, Sept. 2001, pp. 1950-1958.

217.   Hwang, K. F. and Chang, C. C., (2001): “Improved Nearest Codeword Search Scheme Using a Tighter Kick-out Condition,” Optical Engineering, Vol. 40, No. 9, 2001, pp.1749-1751.

218.   Hung, K. L. and Chang, C. C., (2001): “A Novel Progressive Image Transmission Technique for Chinese Calligraphy,” Journal of Computer Processing of Oriental Languages, Vol. 14, No. 4, 2001, pp. 293-307.

219.   Chang, C. C. and Chen, G. I., (2001): Bi-level Lossless Calligraphy Compression Using Location Propagation and Width Inheritance,  Computer Processing of Oriental Languages,  Vol. 14, No. 4, 2001, pp. 309-339.

220.   Chang, C. C. and Wu, H. C., (2001): A Copyright Protection Scheme of Images Based on Visual Cryptography,Imaging Science Journal, Vol. 14,  2001, pp. 141-150.

221.   Wang, C. T, Chang, C. C. and Lin, C. H., (2002): “A New Micro-Payment System Using General Payword Chain,” Electronic Commerce Research Journal, Vol. 2, 2002, pp. 159-168.

222.   Chan, Y. K and Chang, C. C., (2002): A Color Image Retrieval Method Based on Color Moment and Color Variance of Adjacent Pixels, International Journal on Pattern Recognition and Artificial Intelligence, Vol. 16, No. 1, pp. 113-125, 2002.

223.   Chang, C. C., Chen, T. S. and Chung, L. Z., (2002): A Steganographic Method Based upon JPEG and Quantization Table Modification,” Information Science: an International Journal, Vol. 141, No. 1, 2002, pp. 123-138.

224.   Chang, C. C. and Yu, T. X., (2002): Cryptanalysis of an Encryption Scheme for Binary Images, Pattern Recognition Letters, Vol. 23, No. 14, 2002, pp.1847-1852.

225.   Hwang, M. S., Chang, C. C. and Hwang, K. F., (2002): “An ELGamal-like Cryptosystem for Enciphering Large Messages,” IEEE Transactions on Knowledge and Data Engineering, Vol. 14, No. 2, 2002, pp. 445-446.

226.   Wu, H. C. and Chang, C. C., (2002): Detection and Restoration of Tampered JPEG Compressed Images, Journal of Systems and Software, Vol. 64, No. 2, 2002, pp. 151-161.

227.   Tsai, C. S., Chang, C. C. and Chen, T. S., (2002): Sharing Multiple Secrets in Digital Images, Journal of Systems and Software, Vol. 64, No. 2, 2002, pp. 163-170.

228.   Chang, C. C., Lin, M. H. and Hu, Y. C., (2002): A Fast and Secure Image Hiding Scheme Based on LSB Substitution, International Journal of Pattern Recognition and Artificial Intelligence,Vol.16, No. 4, 2002, pp. 399-416.

229.   Chang, C. C., Hwang, K. F. and Hwang, M. S., (2002):  "A Feature-Oriented Copyright Owner Proving Technique for Still Image,” International Journal of Software Engineering and Knowledge Engineering, Vol. 12, No. 3, 2002, pp.317-330.

230.    Chang, C. C. and Chuang, J. C., (2002): An Image Intellectual Property Protection Scheme for Gray-Level Images Using Visual Secret Sharing Strategy, Pattern Recognition Letters,Vol. 23, No.8, 2002, pp. 931-941.

231.   Chang, C. C., Hsiao, J. Y. and Yeh, J. C., (2002): A Color Image Copyright Protection Scheme Based on Visual Cryptography and Discrete Cosine Transform, Image Science Journal, Vol. 50, 2002, pp. 133-140.

232.   Hwang, M. S., Chang, C. C. and Hwang, K. F., (2002):  "An Improvement of an Authentication Protocal without a Trusted Third Party,” International Journal of Computational and Numerical Analysis and Applications, Vol. 1, No. 4, 2002, pp. 407-412.

233.   Hung, K. L. and Chang, C. C., (2002): “An Improvement of a Technique for Color Quantization Using Reduction of Color Space Dimentionality,”  Informatica, Vol. 26, No. 1, 2002, pp.11-16.

234.   Tsai, P. Y., Chang, C. C. and Hu, Y. C., (2002): “An Adaptive Two-Stage Edge Detection Scheme for Digital Color Images,” Journal of Real Time Imaging, Vol. 8, 2002, pp.329-343.

235.   Hung, K. L. and Chang, C. C., (2002): Error Prevention and Concealment for Chinese Calligraphy Based on Block Truncation Coding, Journal of Computer Processing of Oriental Languages, Vol. 15, No. 2, March 2002, pp.101-113.

236.   Chang, C. C., Chuang, L. Z., and Chen, T. S. (2002): “Recognition of Image Authenticity Using Significant DCT Coefficients Quantization,”  Informatica, Vol. 26, 2002, pp. 359-366.

237.   Lin, M. H., Hu, Y. C. and Chang, C. C., (2002): “Both Color and Gray Scale Secret Images Hiding in a Color Image, ” International Journal on Pattern Recognition and Artificial Intelligence, Vol. 16, No. 6, 2002, pp.697-713.

238.   Chang, C. C., Hwang, K. F. and Hwang, M. S., (2003): “Robust Authentication scheme for Protecting Copyrights of Images and Graphics,”  IEE Proceedings-Vision Image and Signal Processing, Vol. 149, No. 1, 2002, pp. 43-50.

239.   Tseng, H. W. and Chang, C. C., (2003): “Construction of Symmetrical Reversible Variable Length Codes Using Backtracking,” The Computer Journal, Vol. 46, No. 1, 2003, pp.100-105.

240.   Chang, C. C. and Chung, C. Y., (2003): “An Efficient Protocol for Anonymous Multicast and Receiption,” Information Processing Letters, Vol. 85, 2003, pp.99-103.

241.   Hung K. L. and Chang, C. C., (2003): Error Prevention and Resilience of VQ Encoded Images”, Signal Processing, Vol. 83, No. 2, Feb., 2003, pp.431-437.

242.   Chang, C. C., Hwang, K. F. and Lin, I. C., (2003): “Security Enhancement for a Modified Authenticated Key Agreement Protocol,” International Journal of Computational and Numerical Analysis and Applications, Vol. 3, No. 1, 2003, pp.1-7.

243.  Lin, I. C., Hwang, M. S. and Chang, C. C., (2003): “Security Enhancement for the Anonymous Secure E-Voting over a Network,” Computer Standards and Interfaces, Vol. 25, No. 2, May 2003, pp.131-139. 

244.   Lin, I. C., Hwang, M. S. and Chang, C. C., (2003): “A New Key Assignment Scheme for Enforcing Complicated Access Control Policies in Hierarchy,” Future Generation Computer Systems, Vol. 19, No. 4, 2003, pp.457-462.

245.   Chang, C. C. and Lai, Y. P., (2003): “A Flexible Date Attachment Scheme on E-Cash,” Computers and Security, Vol. 22, No. 2, 2003, pp.160-166.

246.   Hwang, K. F. and Chang, C. C., (2003): “A Self-Encryption for Authentication of Roaming and Teleconference Services,” IEEE Transactions on  Wireless Communications, Vol. 2, No. 2, March 2003, pp.400-407.

247.   Tseng, H. W. and Chang, C. C., (2003): “A Fast and Simple Algorithm for the Construction of Asymmetrical Reversible Variable Length Codes,”  Journal of Real Time Imaging, Vol. 9, 2003, pp.3-10.

248.   Chang, C. C. and Chen, G. I., (2003): “Enhancement Algorithm for Nonlinear Context-Based Predictors,” IEE Proc.-Vis. Image Signal Process, Vol. 150, No. 1, Feb. 2003, pp.15-19.

249.   Hung, K. L. and Chang, C. C., (2003): “A New Irregular Sampling Coding Method for Transmitting Images Progressively,” IEE Proc.-Vis. Image Signal Process, Vol. 150, No. 1, Feb. 2003, pp.44-50.

250.   Chang, C. C., Hsiao, J. Y. and Chan, C. S, (2003) : “Finding Optimal LSB Substitution in Image Hiding by Using Dynamic Programming Strategy,” Pattern Recognition, Vol. 36, 2003, pp.1583-1595.

251.   Chang, C. C. and Lin, I. C., (2003): “The Strategy of Reducing the Location Update Traffic Using Forwarding Pointers in Virtual Layer Architecture,” Computer Standards and Interfaces, Vol. 25, No. 5, Sept. 2003, pp. 501-513.

252.   Chang, C. C., Shih, T. K. and Lin, I. C., (2003): “Guessing by Neighbors: An Efficient Reconstruction Method for Transmitting Image Progressively,” Visual Computer,  Vol. 19,  No. 5, Aug. 2003, pp. 342-353.

253.   Hu, Y. C. and Chang, C. C., (2003): “Edge Detection Using Block Truncation Coding,” International Journal of Pattern Recognition and Artifical Intelligence, Vol. 17, No. 6, 2003, pp. 951-966.

254.   Chang, C. C. and Lee, W. B. (2003): “Taiwan: Focus on the Information Security Market,” ITPro Magazine, pp. 26-29.

255.   Chang, C. C. and Hwang, K. F., (2003): “Some Forgery Attacks on a Remote User Authentication Scheme Using Smart Cards,” International Journal Informatica, Vol. 14, No. 3, pp. 289-294.

256. Huang, H. F. and Chang, C. C. (2003): “An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers,” Fundamenta Informaticae,  Vol. 56, No. 3, 2003, pp. 243-253.

257. Chang, C. C. and Chang, Y. F. (2003): “Efficient Anonymous Auction Protocols,” Computer & Security. Vol. 22, No. 8, 2003, pp. 728-734.

258.   Chang, C. C. and Tsai, H. M., (1997): "A Generalized Secret Sharing Scheme," Journal of Systems and Software, Vol. 36, No. 3, 1997, pp. 267-272.

259.   Chang, C. C., Chen, L. L. and Chen, T. S., (2001): “A New Fast Search Algorithm of Block Motion Estimation Using Clustering Technique," Journal of Applied Systems Studies, Vol. 2, No. 2, 2001.

260.   Chen, T. S. and Chang, C.C., (2001): “A New Method of Secret Image Sharing Based on Vector Quantization,” Journal of Electronic Imaging, Vol. 10, No. 4, 2001, pp. 988-997.

261.   Hwang, K. F. and Chang, C. C., (2002): “A Fast Pixel Mapping Algorithm Using Principal Component Analysis,” Pattern Recognition Letters, Vol. 23 ,  No. 14, 2002, pp. 1747 - 1753.

262.   Lai,Y. P. and Chang, C. C., (2003): “Parallel Computational Algorithms for Generalized Chinese Remainder Theorem,” Computers and Electrical Engineering, Vol. 29, No. 8, 2003, pp. 801-811.

263. Hwang, H. F. and Chang, C. C. (2004): “A New Cryptographic Key Assignment Scheme with Time Bonded Access Control in a Hierarchy,”  Computer Standards & Interface, Vol. 26, No. 3, 2004, pp. 159-166.

264.   Chang, C. C. and Hu, Y. C., (2003): “An Improved Tree-Structured Codebook Search Algorithm for Image Compression,” to appear in IEE Proceedings-Vision, Image and Signal Processing. (accepted in 1999)

265. Hung, K. L, Chang, C. C. and Chen, T. S., (2003): “A Side-Match Reconstruction Method Using Tree Structure VQ for Transmitting Images Progressively,” to appear in IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science. (accepted in 2001)

266.   Chang, C. C. and Lin, I. C., (2003): “Cryptanalysis of the Modified Remote Login Authentication Scheme Based on a Geometric Approach,” to appear in Informatica. (accepted in 2002)

267.   Chang, C. C. and Chan, C. S. (2003): “A Watermarking Scheme Based on Principal Component Analysis Technique,” to appear in Informatica.  (accepted in 2003)

268.   Chang, C. C. and Yu, Y. H. (2003): “An Efficient Approach for Face Detection and Facial Feature Location Using Prune-and-Search Technique,” to appear in International Journal on Pattern Recognition and Artificial Intelligence. (accepted in 2003)

269.   Hu, Y. C. and Chang, C. C., (2003): "An Effective Codebook Search Algorithm for Image Vector Quantization," to appear in Image Science Journal . (accepted in 2003)

270.   Tsai P.Y., Hu, Y. C. and Chang, C. C. (2003): “Using Set Partitioning in Hierarchical Trees to Authenticate Digital Image,” to appear in Signal Processing : Image Communication Journal. (accepted in 2003)

271.   Chang, C. C., Chuang, J. C. and Lai Y. P., (2003): “Hiding Data in Multitone Images for Data Communications,” to appear in IEE Proceedings-Vision, Images, and Signal Processing. (accepted in 2003)

272.   Lai, Y. P. and Chang, C. C., (2003): "An Efficient Multi-Exponentiation Scheme Based on Modified Booth’s Method," to appear in International Journal of Electrics Engineering, Sept. 2002. (accepted in 2003)

273.   Tsai, C. S. and Chang, C. C. (2003): “A DWT-based Deblocking Technique Based on Edge Detection and Zero Masking for Blocking Effect,” to appear in Fundamenta Informaticae. (accepted in 2003)

274.   Wu, H. C. and Chang, C. C., (2003): “Hiding Digital Watermarks Using Fractal Compression Technique”, to appear in Fundamenta Informaticae. (accepted in 2003)

275.   Hwang, H. F. and Chang, C. C. (2003): “A New Design of Efficient Partially Blind Signature Scheme,” to appear in Journal of Systems and Software. (accepted in 2003)

276.   Tsai, P. Y., Hu, Y. C. and Chang, C. C., (2003): “A Color Image Watermarking Scheme Based on Color Quantization,” to appear in Signal Processing.  (accepted in 2003)

277.   Chang, C. C., Wu, W. C., Hu, Y. C. and Li, Y. C. (2003): “Hiding Digital Data in Music Scores Using Musical Features,” to appear in Journal of Applied Systems Studies. (accepted in 2003)

278.   Huang, H. F. and Chang, C. C. (2003): “An Efficient and Flexible Forward-Secure Signature Scheme,” to appear in Applied Mathematics and Computation. (accepted in Sept. 2003)

279.   Tsai, P. Y., Chang, C. C., Lin, M. H., and Hu, Y. C. (2003):An Adaptive Bit Rate Encoding Mechanism Based on Irregular Sample and Side-Match Vector Quantization,” to appear in The Image Science Journal.(accepted in Oct. 2003)

280.   Chang, C. C., Chuang, J. C. and Chung, C. Y. (2003): “Quadtree-Segmented Image Compression Method Using Vector Quantization and Cubic B-Spline Interpolation,” to appear in The Imaging Science Journal. (accepted in Oct. 2003)

281.   Tsai, P. Y., Hu, Y. C. and Chang, C. C., (2003): “A Novel Image Authentication Scheme Based on Quadtree Segmentation,” to appear in Signal Processing: Image Communication. (accepted in Oct. 2003)

282. Chang, C. C. and Tseng, H. W. (2003): “VQ-Based Image Watermarking Using Anti-Gray Coding,” to appear in Informatica. (accepted in Nov. 2003)

283.   Tseng, H. W. and Chang, C. C. (2003): “High Capacity Data Hiding in JPEG-Compressed Images,” to appear in Informatica. (accepted in Nov. 2003)

284.Chan, Y. K. and Chang, C. C., (2003): Block Image Retrieval Based on a Compressed Linear Quadtree,” to appear in Image and Vision Computing Journal  (accepted in Nov. 2003). 

285. Tseng, H. W. and Chang, C. C. (2003): “A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization,to appear in Informatica (accepted in Nov. 2003).

286. Chan, C. W. and Chang, C. C. (2003): “A New Channel for Image Hiding Based on Interpolating polynomials,” to appear in Fundamenta Informaticae. (accepted in Nov. 2003).

287.Chang, C. C., Chuang, J. C., and Hu, Y. S. (2003): “Retrieving Digital Images from a JPEG Compressed Image Database,” to appear in Image and Vision Computing. (accepted in Nov. 2003)

288.Chang, C. C. and Chang, Y. F. (2003): “An Efficient Three-party Encrypted Key Protocol Exchange without Server's Public Keys,” to appear in Computer Standards and Interfaces. (accepted in Nov. 2003)

289. Lin, I. C., Hwang, M. S., and Chang, C. C. (2003): “The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain,” to appear in Designs, Codes, and Cryptography. (Accepted in Nov. 2003)

290. Chang, C. C. and Lai, Y. P. (2003): “A Fast Modular Square Computing Method Based on The Generalized Chinese Remainder Theorem For Prime Moduli,” to appear in Applied Mathematics and Computation. (Accepted in Dec. 2003)

291. Chang, Y. F., Chang, C. C. and Huang, H. F. (2003): “Digital Signature with Message Recovery Using Self-certified Public Keys without Trustworthy System Authority,” to appear in Applied Mathematics and Computation. (Accepted in Dec. 2003)

292. Chang, C. C. and Chen, G. I. (2004): “A Fast Edge-Based Method for Image Magnification,” to appear in Imaging Science Journal, (Accepted in Jan. 2004)

293. Chang, C. C. and Chang, Y. F. (2004): “Signing a Digital Signature without Using One-way Hash Functions and Message Redundancy Schemes,” to appear in IEEE Communications Letters. (Accepted in Jan. 2004)

294. Chang, C. C., Chen, K. L, and Hwang, M. S., (2004) :  "Security Protocols for End-to-End Mobile Users with Double Authentication," to appear in  Wireless Personal Communications. (Accepted in Jan. 2004)

295.   Lin, M. H, Chang, C. C., and Chen, Y. R. (2004): “A Fair and Secure Mobile Agent Environment Based on Blind Signature and Proxy Host,” to appear in Computers & Security, Jan. 2003. (Accepted in Jan. 2004)

296. Tsai P.Y., Lin, M. H. and Chang, C. C. (2003): “A Side-Match Prediction Encoding Scheme for Predefined VQ Approximation Rates,” to appear in The Imaging Science Journal. (Accepted in Jan. 2004)

297.   Tsai, C. S. and Chang, C. C. (2004): “A Pattern Mapping Based Digital Image Watermarking,” to appear in Informatica. (Accepted in Jan. 2004)

298. Chang, C. C., Wu, W. C. and Hu, Y. C., (2004):" Public-Key Inter-Block Dependence Fragile Watermarking for Image Authentication Using Continued Fraction," to appear in Informatica. (Accepted in Jan. 2004)