Subject Date Location
1 A Design of an Efficient Hashing Function 1982.01.07 Institute of Computer and Decision Sciences, National Tsing Hua University
2 Compiler Construction Techniques 1982.03.11 National Chung Hsing University, Department of Applied Math
3 Design of an Optimal Multi-key File System 1982.06.19 Institute for Information Industry
4 Data Recovery Automation 1982.12.11 National Chung Hsing University, Department of Applied Math
5 A Design of a Multi-key File System 1982.12.18 Feng Chia University, Department of Applied Math
6 Recent Developments of of Perfect Hash Functions 1983.04.29 National Taiwan University, Department of Computer Science and Information Engineering
7 Application of Database Management Systems 1983.11.26 Tax Administratration of Taichung Government
8 Recent Developments of Multi-key Hashing File Systems 1984.02.29 National Taiwan University, Department of Electrical Engineering
9 Constructing an Optimal Information Retrieval Method 1984.05.11 Feng Chia University, Department of Information Engineering
10 Experiences in Designing a Database Management System 1984.09.22 Institude for Information Industry
11 Designing a Minimal Perfect Hash Function 1984.10.08 Institute of Computer and Decision Sciences, National Tsing Hua University
12 Recent Development of Text Retrieval 1984.10.19 National Taiwan University, Department of Computer Science and Information Engineering
13 Data Structure and Information Security - from the Perspective of Sun-Tzu Theorem 1984.11.28 Department of Electrical Data Processing, National Taichung Institude of Commerce
14 Experiences in Designing an Interactive Database Management System 1984.12.21 Providence College of Arts and Sciences for Women, Department of Information Science
15 Recent Developments of Key-Lock Pair Access Control Mechanism 1985.03.15 National Taiwan University, Department of Computer Science and Information Engineering
16 Methodology of Computer Software Engineering 1985.03.27 Providence College of Arts and Sciences for Women, Department of Information Science
17 Information Management Techniques 1985.04.18 Taichung First Senior High School
18 Constructing a Symbolic Database and Information Security System 1985.04.20 National Cheng Kung University, Department of Electrical Engineering
19 On Design of a Symbolic Database - from the Perspective of Theory of Numbers 1985.05.02 National Chiao Tung University, Department of Computer Science and Information Engineering, and Department of Computer Information and Science
20 Computer Security Technology 1985.06.07 Feng Chia University, Department of Information Engineering
21 How to Design a Symbolic Database 1985.08.02 CDC Computer Company: Workshop on Maintenance and Application of the User System
22 How to Manage Enterprise Databases 1985.09.10 YMCA-IMC Workshop on Computer Research and Study
23 On Developments of Theory and Techniques 1985.10.14 Feng Chia University, Department of Civil Engineering
24 Computer and Information Management 1985.10.20/10.26 Tunghai University, International Bussiness Administration
25 Information Protection Systems 1986.01.23 Academia Sinica, Institute of Information Science
26 Information Security Systems 1986.01.24 Aeronautics Developement Center
27 Recent Developments of Data Structures and Information Security 1986.03.06 Chung-Shan Institute of Science and Technology
28 Recent Developments of Searching Techniques 1986.03.13 Providence College of Arts and Sciences for Women, Department of Information Science
29 A Chinese Form-oriented Visual Programming System 1986.03.18 National Chung Hsing University
30 Recent Developments of Data Structure Techniques 1986.03.24 National Taiwan Institute of Technology, Department of Electronic Technology
31 How to Construct a Symbolic Database 1986.03.25 Institute of Computer and Decision Sciences, National Tsing Hua University
32 An Efficient Data Searching Technique 1986.03.31 Chung Yuan Christian University, Department of Information and Computer Engineering
33 Computer Communications Security System 1986.04.17 National Chiao Tung University, Department of Computer Science and Information Engineering
34 Computers and Data Processing 1986.05.04 Tunghai University, International Bussiness Administration
35 Public-Key Cryptography 1986.06.12 Taiwan Province Government, Electrical Data Processing Center
36 Advanced GPSS/S 1986.06.16-06.17 Workshop on Software Packages and Application Systems, sponsored by Ministry of Education
37 Searching Techniques for Static Data 1986.08.20 Aeronautics Developement Center
38 Computers and Data Processing 1986.09.13 Tunghai University, International Bussiness Administration
39 Visual Programming 1986.09.20 Institude for Information Industry
40 Computers and Passwords 1986.10.05 Taiwan Provincial Taichung Libarary
41 Visual Programming 1986.10.06 National Chung Hsing University, Computer and Information Network Center
42 Office Automation 1986.10.18 Tunghai University, International Bussiness Administration
43 Visual Programming 1986.10.21 Department of Electrical Data Processing, National Taichung Institude of Technology
44 Information Security 1986.10.29 National Chung Hsing University, Computer and Information Network Center
45 Data Encryption Techniques 1986.11.14 World Technology Consultant Industry
46 Information Access Control Techniques 1986.11.14 World Technology Consultant Industry
47 Secure Secret Broadcasting 1986.11.15 World Technology Consultant Industry
48 Recent Developments of Data Structures and Searching Techniques 1986.11.19 National Central University, Department of Computer Science and Information Engineering
49 Information Access Control Techniques 1986.12.03 National Tsing Hua University, Department of Industrial Engineering
50 Computers and Communications 1986.12.12 National Taiwan Normal University, Department of Industrial Education
51 Computers and Communications 1986.12.13 Taichung County, Ching-Shui Junior High School
52 The Past, Present, and Future of Information Technology 1986.12.22 National Chin-Yi Institute of Technology
53 Implementation and Application of a Test Items Bank for Information Courses 1986.12.23 Taichung Home Economical and Commercial Senior Vocational School
54 Information Era 1987.01.15 Victory High School
55 Recent Developments of Data Structures and Searching Techniques 1987.02.24 National/ Panasonic Taiwan
56 Sun-Tzu as a Computer Scientist 1987.03.15 Taiwan Provincial Taichung Libarary
57 Advanced GPSS/S 1987.03.17-03.18 Workshop on Software Packages and Application Systems, sponsored by Ministry of Education
58 Computers and Information 1987.03.21 Chia-Yi YMCA
59 Computers and Information 1987.03.22 Tunghai University, International Bussiness Administration
60 The Developments of Information Retrieval Techniques 1987.03.24 Tatung Institute of Technology, Department of Computer Science and Engineering
61 A Design of Secure Computer Passwords 1987.03.26 National Cheng Kung University, Department of Engineering Science
62 Database Design - From the Perspective of Data Analysis 1987.04.14 Computer Society of the Republic of China
63 Data Retrieval and Information Security 1987.04.20 National Chung Hsing University, Computer and Information Network Center
64 Information Science - from the Perspective of Data Analysis 1987.04.21 National Chung Hsing University, Computer and Information Network Center
65 Information Science - from the Perspective of Data Analysis 1987.04.23 Aeronautics Developement Center
66 Information Science - from the Perspective of Dicrete Mathematics 1987.04.28 Tunghai University, Department of Computer Science Information Engineering
67 Key to the Treasury of Life 1987.05.11 Taichung Second Senior High School
68 Advanced GPSS/S 1987.05.26-05.27 Workshop on Software Packages and Application Systems, sponsored by Ministry of Education
69 Information Era 1987.06.23/07.07 Ming Dao High School
70 Visual Programming - FORMOSA 1987.07.09 World Technology Consultant Industry
71 A Database Management System - System-Bee 1987.07.10 World Technology Consultant Industry
72 Information Security 1987.07.23 Aeronautics Developement Center
73 Workshop on Data Structures and Data Analyses 1987.08.24-08.26 World Technology Consultant Industry
74 Workshop on Information Systems and Information Auditing 1987.08.27-08.28 Harvard Management Services
75 Workshop on Information Engineering Technology 1987.09.21-09.23 Chin-Peng Management Consulting Company
76 Information Access Control Techniques 1987.10.28 National Tsing Hua University, Department of Industrial Engineering 
77 Designing an Information Query System 1987.11.02 Institute of Computer and Decision Sciences, National Tsing Hua University
78 Design Principles of an Information Query System 1987.11.04 Tunghai University, Department of Computer Science Information Engineering
79 System Simulation 1987.11.10 Institute of Harbor and Marine Technology
80 Clustering Analysis and Its Applications 1987.11.26 Department of Computer Engineering, National Chiao Tung University
81 Workshop on Compilers 1987.11.30-12.02 World Technology Consultant Industry
82 Clustering Analysis and Its Applications 1987.12.08 Department of Computer Science and Information Engineering, National Cheng Kung University
83 A Step to Information Society - Using Computers 1987.12.12 Feng-Yuan Junior High School, Feng Yuan
84 A Step to Information Society - Using Computers 1987.12.15 Chang-Ann Junior High School, Chang-Hua
85 Data Compression 1987.12.16 Computer and Information Network Center, National Chung Hsing University
86 Design of Distributed Databases  1988.03.14 Department of Computer Science and Engineering, Tatung Institute of Technology
87 Visual Programming 1988.03.28 Department of Industrial Engineering and Enterprise Information, Tunghai University
88 On Developments of Theory and Techniques 1988.04.11 Tunghai University, Department of Computer Science Information Engineering
89 Visual Programming 1988.04.13 Aeronautic Development Center
90 Electronic Data Compression 1988.04.14 Department of Electrical Data Processing, National Taichung Institude of Commerce
91 Database Management Systems and Office Automation 1988.04.18 Yung-Jing Industrial Vocational Senior School
92 Database Management System and Office Automation 1988.04.20 Taichung Home Economical and Commercial Senior Vocational School
93 Information Era 1988.08.15 Taichung Home Economical and Commercial Senior Vocational School
94 Information Era 19888.08.18 Taichung Agricultural Vocational Senior High School
95 Database Management Systems 1988.10.05 Aeronautic Development Center
96 Chinese String Searching 1988.10.12 Department of Computer Science and Information Engineering/Electrical Engineering, National Central University
97 Approximate String Searching 1988.11.01 Department of Computer Science and Information Engineering, National Chiao Tung University
98 A User Identification Scheme on Computer Networks 1988.11.10 Academia Sinica
99 Workshop on Information System Technology 1988.11.24-11.26 World Technology Consultant Industry
100 Recent Developments of Information Security Technology 1988.12.01 Department of Computer Science and Information Engineering, National Chiao Tung University
101 Towards Information Society - Universal Information Education 1988.12.08 Taichung First Senior High School
102 Towards Information Society - Universal Information Education 1988.12.10 Taichung Girls' Senior High School
103 Introduction to Computer Passwords 1989.03.15 Department of Electrical Data Processing, National Taichung Institude of Commerce
104 Public-Key Encryption 1989.04.24 Aeronautics Developement Center
105 An Experience in Designing a Database Management System 1989.04.26 Computer Society of the Republic of China
106 Data Analysis Technology and Its Applications 1989.04.28 Department of Computer Science and Information Engineering, National Taiwan University
107 Data Analysis Technology and Its Applications 1989.05.10 Department of Industrial Education, National Taiwan Normal University
108 Information and Computers 1989.06.07 National Chung Hsing University
109 On Developments of Theory and Techniques 1989.06.09 Department of Computer Science and Information Engineering, National Chiao Tung University
110 Information Security 1989.06.14 National Chung Hsing University
111 Workshop on Data Engineering Technology 1989.08.28-08.30 Center of Public and Business Administration Education, National Chengchi University
112 Data Compression 1989.10.05 Department of Engineering Science, National Cheng Kung University
113 Computer Crime and Computer Viruses 1989.10.15 Taiwan Provincial Taichung Library
114 Computer Crime and Countermeasures 1989.11.01 Tunghai University, Department of Computer Science Information Engineering
115 Clustering Analysis and Its Applications 1989.12.08 Institute of Information Science, Academia Sinica
116 Information Security 1989.12.11 Department of Mathematics and Science Education, National Chiayi Teachers College
117 Information and Computers 1990.02.06 Taichung Agricultural Vocational Senior High School
118 Introduction to Computer Password Design 1990.03.01 Department of Computer Science and Information Engineering, National Chiao Tung University
119 Computer Cryptology 1990.03.02 Department of Information Engineering, Feng Chia University
120 Data Encryption 1990.03.08 Department of Electrical Engineering, Tatung Institute of Technology
121 Information Security 1990.03.09 Department of Electronical Data Processing, Ming Chuan College
122 Data Encryption 1990.03.28 Application Mathematics Department, Chinese Culture University
123 Design of a Chinese String Searching Machine 1990.03.30 Department of Electrical Data Processing, National Taichung Institude of Commerce
124 Data Encryption 1990.04.12 Taichung Home Economical and Commercial Senior Vocational School
125 Information Security 1990.04.12 Taichung Home Economical and Commercial Senior Vocational School
126 Data Compression 1990.04.14 Taichung Home Economical and Commercial Senior Vocational School
127 Computer Security 1990.04.18 College of Medicine, National Cheng Kung University
128 Computer Crime and Computer Viruses 1990.05.17 Taichung Museum of Art
129 Information Management and Applications 1990.06.04 Chia-Yi City Government
130 Information Management and Applications 1990.06.22 Chia-Yi City Government
131 Management Computerization 1990.07.11 National Yunlin Institute of Industry
132 Information Access and Control 1990.09.27 Department of Applied Mathematics, National Chung Hsing University
133 Strategies for Chinese Compression 1990.10.18 Department of Computer Science and Information Engineering, National Chiao Tung University
134 Computer Crime and Countermeasures 1990.10.18 Department of Computer Science and Information Engineering, National Chiao Tung University
135 Computer Crime and Countermeasures 1990.10.30 National Chung Cheng University
136 Compression-Based Perfect Hashing Strategies 1990.11.26 Department of Computer Science, National Tsing Hua University
137 Countermesures against Computer Crime and Computer Viruses 1990.11.27 Taiwan Cooperative Bank
138 Data Engineering Technology 1990.11.28 National Defense Management College
139 Computer Password Design 1990.12.12 Department of Electrical Engineering, National Yunlin Institute of Industry
140 Applications of Clustering Technology in Information Science 1990.12.20 Department of Electrical Engineering, National Cheng Kung University
141 Information Security 1991.01.22 YMCA, Chia-Yi
142 Design of a Minimal Perfect Hashing Function 1991.02.11 Department of Computer Science and Engineering, The Chinese University of Hong Kong
143 Office Automation 1991.03.06 Computer Center, National Chung Cheng University
144 Computer Crime and Prevention 1991.04.20 Exhibition Center of Computer Science, National Science Council
145 Computers and Passwords 1991.06.14 Department of Electronic Engineering, National Taipei Institute of Technology
146 On File Systems 1991.09.21 Department of Computer Science and Information Engineering, National Cheng Kung University
147 Applications of Cryptography in Computer Security 1991.11.09 Department of Computer Science and Information Engineering, National Cheng Kung University
148 Road to Success 1991.11.27 Tunghai University, Department of Computer Science Information Engineering
149 Design of Image Databases 1991.12.04 Department of Electrical Data Processing, National Taichung Institude of Commerce
150 Dynamic Secret Sharing 1992.01.10 Department of Applied Mathematics, National Sun Yat-sen University
151 Introduction to Computer Passwords 1992.02.21 Sieh-Chih  Industrial and Commercial Senior Vocational School
152 Key to Emerging 1992.03.11 Taiwan Provincial Wen-Hua Senior High School
153 Information Security 1992.04.14 Provincial Chang-Hua Senior School of Commerence
154 The Past, Present, and Future of Science and Technology Education 1992.04.16 National Chung Cheng University
155 Methodology 1992.05.14 Tunghai University, Department of Computer Science Information Engineering
156 Information Security 1992.05.18 Ta Tung Technological College of Commerce
157 Group Secret Strategies 1992.06.15 Computer Science and Engineering Research Center, National Sun Yat-sen University
158 Group Secret Techniques 1992.10.02 Department of Electrical Data Processing, National Taichung Institude of Commerce
159 Secret Sharing 1992.10.06 Department of Information and Computer Education, National Taiwan Normal University
160 Generalized Group Secret Cryptography 1992.10.07 National Security Bureau
161 Methodology 1992.10.22 Department of Information Management, Ming Chuan College
162 Methodology 1992.10.28 Department of Computer and Information Science, National Chiao Tung University
163 Computer Password Design 1992.11.18 Department of Computer Science and Engineering, National Sun Yat-sen University
164 Evolution and Applications of Mathematics 1992.11.23 Department of Mathematics, National Tsing Hua University
165 Data Compression 1992.11.24 Provincial Chang-Hua Senior School of Commerence
166 Developments of Contemporary Cryptology 1992.12.01 Taichung Home Economical and Commercial Senior Vocational School
167 Career Planning of Computer People 1992.12.07 Department of Computer Science and Information Engineering, National Chung Cheng University
168 A Secured Computer Center Management 1993.01.07 Taichung Home Economical and Commercial Senior Vocational School
169 A Secured Computer Center Management 1993.01.14 Taichung Home Economical and Commercial Senior Vocational School
170 A Secured Computer Center Management 1993.02.04 Taichung Home Economical and Commercial Senior Vocational School
171 A Secured Computer Center Management 1993.02.11 Taichung Home Economical and Commercial Senior Vocational School
172 Key to Emerging 1993.03.04 Department of Information Management, National Taiwan Institute of Technology
173 Chinese Retrieval and Searching 1993.03.24 Provincial Chang-Hua Senior School of Commerence
174 An Image Similar Retrieval Method Based on Modulo Arithmetics 1993.04.23 Workshop on Computer Applications Sponsored by National Chung Hsing University
175 Information Security 1993.05.04 Department of Information Science and Management, Providence University
176 Key to Emerging 1993.05.24 Chia-Yi Home Vocational School
177 Information Security 1993.06.02 Department of Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C.
178 A Master Key for an M3 Cryptoscheme 1993.06.08 Department of Electrical Engineering, National Defense University, Chung Cheng Institute of Technology
179 Introduction to Computer Passwords 1993.06.10 Taichung Home Economical and Commercial Senior Vocational School
180 Military Information Security 1993.09.07 National Defense Management College
181 Information Searching Techniques 1993.10.29 National Chung Cheng University
182 Evolution of Computer Cryptography 1993.11.18 Department of Computer Science and Information Engineering, National Chiao Tung University
183 Project Planning Information System Design 1993.11.23 Research, Development, and Evaluation Commission, Taiwan Provincial Government
184 Career Planning 1993.11.25 College of Engineering, National Chung Cheng University (for the students of Department of Business Education, National Changhua University of Education)
185 Information Security 1993.12.01 Provincial Training Center of Taiwan Provincial Government
186 Developments of Computer Cryptography 1993.12.08 National Defense University, Chung Cheng Institute of Technology
187 Information Security 1993.12.27 Provincial Training Center of Taiwan Provincial Government
188 Applications of Instruction Network and Information Security 1994.01.07 Szu-Yu Junior High School
189 Evaluation of Computer-Aided Instruction (CAI) 1994.01.17 Fooyin College of Nursing
190 Evolution of Contemporary Cryptography 1994.02.22 Chung-Shan Institute of Science and Technology
191 Project Planning Information System Design 1994.03.10 Research, Development, and Evaluation Commission, Taiwan Province
192 Group Secret Technology 1994.03.18 Department of Computer Science. and Information Engineering, National Taiwan University
193 Artificial Intelligence 1994.03.25 Tsau Ton Commercial and Technical Vocational School
194 Artificial Intelligence 1994.04.02 Center of Automated Engineering, Da-Yeh University
195 Computer Password Design 1994.04.13 Wu Feng Institute of Technology
196 Key to Emerging 1994.04.14 Rotary Club of Taichung East District
197 Computer Password Design 1994.04.30 National Central University
198 Introduction to Cryptanalysis 1994.05.06 Department of Applied Mathematics, Feng Chia University
199 Introduction to Cryptanalysis 1994.05.20 Department of Industrial Education, National Taiwan Normal University
200 Chinese Database Management Systems 1994.05.25 Training Center for High School Teachers
201 Efficient Information Retrieval 1994.08.03 Graduate Institute of Computer Science, National Chung Hsing University
202 Introduction to Cryptanalysis 1994.11.03 Department of Computer Science and Information Engineering, National Chiao Tung University
203 Information Security 1994.12.14 Department of Information Management, Chaoyang Institute of Technology
204 Information Security 1994.12.17 Computer and Information Network Center, National Chung Hsing University
205 Developments of Contemporary Cryptography 1995.03.03 Department of Computer Science and Engineering, National Sun Yat-Sen University
206 A Step to Information Society - Using Computers 1995.04.24 National Chung Cheng University
207 Image Compression Technology 1995.04.27 Department of Information Science and Management, Providence University
208 Technology and Our Life 1995.07.27 National Chiayi Senior Hight School
209 Information Security and Management 1995.08.06 Taiwan Regional Development Institute
210 Information Security 1995.11.03 Provincial Training Center of Taiwan Provincial Government
211 The Present and Prospect of Information Security 1995.11.09 Department of Applied Mathematics, National Chung Hsing University
212 Developments of Computer Cryptography 1995.12.20 Department of Computer Science and Information Engineering, National Dong Hwa University
213 Developments of Computer Cryptography 1995.12.28 Department of Computer and Information Science, National Chiao Tung University
214 Information Security 1996.04.19 Refining & Manufacturing Research Center of Chinese Petroleum Corp
215 Contemporary Cryptography 1996.05.03 Department of Computer Science and Information Engineering, National Cheng Kung University
216 Information Security 1996.06.06 National Changhua University of Education
217 Information Security 1996.08.14 Department of Computer Science and Engineering, National Sun Yat-Sen University
218 How to Share a Common Secret Document 1996.12.03 Department of Information Engineering, Feng Chia University
219 Efficient Join Operation of Time-domain Databases 1996.12.19 Department of Computer Science and Information Engineering, National Chiao Tung University
220 Road to Success 1997.03.26 Department of Information Management, Chaoyang University of Technology
221 Efficient Join Operation of Time-domain Databases 1997.04.16 Department of Computer Science, National Tsing Hua University
222 Evolution of Information Security Technology 1997.05.07 National Defense University, Chung Cheng Institute of Technology
223 Information Security 1997.06.05 Department of Mathematics, Chung Yuan Christian University
224 Evolution of Information Security Technology 1997.07.11 National Defense Management College
225 The Present and Prospect of Information Education of Universities in Taiwan 1997.11.04 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
226 Hot Issues of International Information Security Research - Theory, Techniques, and Market Trend 1997.11.04 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
227 Secret Sharing 1997.11.05 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
228 Fast Computation of Modulo Exponents 1997.11.05 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
229 Digital Signatures 1997.11.06 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
230 Image Hiding Technology 1997.11.06 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
231 Applications of Chinese Remainder Theorem 1997.11.07 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
232 Essential Qualities of a Successful Scientist 1997.11.07 Beijing University of Posts and Telecommunications, People¡¦s Republic of China
233 Image Hiding Technology 1997.12.28 Tunghai University
234 Progressive Image Transmission Using Edge Matching 1998.02.24 Department of Computer and Information Science, National Chiao Tung University
235 Image Hiding Technology 1998.02.26 Department of Information Science and Management, Providence University
236 Progressive Image Compression 1998.02.26 Department of Information Science and Management, Providence University
237 Progressive Image Transmission 1998.03.13 Department of Business Education, National Changhua University of Education
238 Computer Crime and Prevention 1998.03.17 National Taiwan Normal University
239 A Binary Access Control Method Using Prime Factorization 1998.03.27 University of Tokyo, Japan
240 An Image Hiding Scheme Based on Vector Quantization 1998.03.27 University of Tokyo, Japan
241 Progressive Image Transmission 1998.04.23 Department of Information Management, National Taiwan University of Science and Technology
242 The Present and Prospect of Information Security Developments 1998.05.08 Tung Fang Institute of Industry
243 Techniques of Designing Digital Watermarks 1998.05.13 Workshop on Network Security Technology Sponsored by Industrial Technology Research Institute
244 Key to Success in Academic Research 1998.05.21 Department of Applied Mathematics, National Chung Hsing University
245 Digital Watermarking 1998.07.03 Kyoto University, Japan
246 Applications of Mathematics in Information Science 1998.10.09 Ming-Dao High school
247 Digital Watermarking 1998.10.18 Chang Gung University
248 Road to Success 1998.11.07 Department of Electrical Data Processing, National Taichung Institude of Commerce
249 A Sheme for Obtaining a Message from the Digital Multi-Signature 1998.11.17 Beijing University of Posts and Telecommunications, People's Republic of China
250 Chinese Calligraphy Compression Using New S-tree Sructure 1998.11.18 Beijing University of Posts and Telecommunications, People's Republic of China
251 Key to Success in Academic Research 1998.12.15 Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University
252 Image Hiding Technology 1999.02.25 National Security Bureau, Republic of China
253 Image Hiding 1999.03.02 Department of Computer Science and Information Management, Providence University
254 Key to Success in Academic Research 1999.03.10 Department of Industrial Education, National Taiwan Normal University
255 Image Hiding 1999.03.12 Department of Information Management, Chaoyang University of Technology
256 On Development of Our Information Education 1999.03.17 Department of Business Education, National Changhua University of Education
257 Key to Emerging 1999.04.01 Chin-Yi Institute of Technology and Commerce
258 Image Hiding 1999.04.14 Tunghai University, Department of Computer Science Information Engineering
259 Key to Emerging 1999.04.14 College of Electrical and Information Engineering, I-Shou University
260 Secret Sharing of Image Data and Its Applications 1999.04.29 Department of Computer Science and Information Engineering, Tamkang University
261 Road to Success 1999.05.03 Ming-Chuan University
262 Image Hiding 1999.05.13 Department of Computer Science and Information Engineering, National Chiao Tung University
263 Watermarking Using Visual Cryptography 1999.05.15 Chaoyang University of Technology (National Information Security Conference-Keynote Speech)  
264 Image Hiding 1999.05.19 Hua-Fan University
265 Security Issues and Strategies for Electronic Commerce (EC) 1999.05.29 Chungtai Institute of Health Science and Technology
266 Essential Qualities of a Successful Technologist 1999.06.02 College of Science and Engineering, I-Shou University
267 A Progressive Codebook Training Algorithm for Image Vector Quantization 1999.06.04 Central Police University
268 Information and Electronic Commerce 1999.06.24 Extension Education Center of Chinese Culture University
269 Progressive Image Transmission Technology 1999.07.14 Department of Computer Science and Information Engineering, National Central University
270 Progressive Image Transmission Technology 1999.07.19 Department of Chemistry, National Taiwan Normal University
271 A Technique for Image Hiding 1999.09.21 Graduate School of Information System, Department of Computer Software, The University of Aizu, Japan
272 A New Scheme of Progressive Image Transimssion Based on Bit-Plane Method 1999.10.21 Beijing University of Posts and Telecommunications, People's Republic of China
273 A Block Based Digital Watermarks for Copy Protection of Images 1999.10.21 Beijing University of Posts and Telecommunications, People's Republic of China
274 Progressive Image Transmission Technology 1999.10.29 Department of Computer Science and Information Engineering, National Cheng Kung University
275 Progressive Image Transimssion Based on Bit-Plane Method 1999.11.02 Department of Computer Science & Information Management, Providence University
276 Wonders in a Red Envelope 1999.11.15 BCC- The Words of Wisdom
277 Digital Watermark Technology 1999.12.15 Department of Business Education, National Changhua University of Education
278 Technical Writing Essentials 2000.01.15 Department of Information Management, National Taichung Institute of Technology
279 Intellectual Property Protection Techniques for Images 2000.03.21 Van-Nung Institute of Technology
280 The Present and Prospect of Our Information Education 2000.03.30 Pei-Men Senior Vocational School of Agriculture and Industrial
281 Key to Success in Academic Research 2000.04.01 Department of Information Management, National Taichung Institute of Technology
282 Key to Success in Academic Research 2000.04.18 Department of Computer Science and Information Engineering, Tamkang University
283 Digital Watermark Technology 2000.05.01 Department of Information and Computer, National Taiwan Normal University
284 Security Issues and Strategies for Electronic Commerce (EC) 2000.05.12 United World Chinese Commercial Bank (at Hotel National Taichung)
285 Security Issues and Strategies for Electronic Commerce (EC) 2000.05.15 Ta-Te Industrial and Home Ecnomical Senior Vocational School
286 Security Issues and Strategies for Electronic Commerce (EC) 2000.05.19 Rotary Club of Taichung Pei-Tuen District (at Hotel National Taichung)
287 Image Hiding and Visual Cryptography 2000.05.22 Graduate Institute of Electrical Engineering, National Taiwan University
288 Image Hiding 2000.06.02 Department of Computer Science and Information Engineering, National Chi Nan University
289 Security Issues and Strategies for Electronic Commerce (EC) 2000.06.23 National Taichung Institute of Technology
290 A New Scheme for Sharing Secret Color Images in Computer Network 2000.07.06 ICPAD 2000 Keynote Speech Sponsered by Iwate Prefectureal University, Japan
291 Some Techniques of Digital Watermarking on Internet 2000.09.28 The Institution of Electrical Engineers, Hong Kong
292 An Image Protection Scheme Based on Discrete Cosine Transformation 2000.09.28 Department of Electronic Engineering, City University of Hong Kong
293 Design of the Fast Chinese Indexing System in Boshiamy Input Method 2000.10.13 Department of Computer Science and Information Management, Providence University
294 The Development of Internet and Its Applications in Taiwan 2000.10.17 Ewha Womans University, South Korea
295 Design of the Fast Chinese Indexing System in Boshiamy Input Method 2000.10.31 Department of Information Engineering and Computer Science, Feng Chia University
296 Key to Success in Academic Research 2000.11.06 Department of Computer Science and Information Engineering, National Chiayi University
297 A Method for Protection Digital Images from Being Copied Illegally 2000.11.11 Chung-Chou Institute of Technology
298 Some Watermarking Techniques on Internet 2000.11.22 Department of Computer Science and Engineering, National Sun Yat-Sen University
299 Digital Watermark Technology 2000.12.22 Graduate School of Applied Mathematics, National Chung Hsing University
300 Some Watermarking Techniques on Internet 2000.12.26 National Kaohsiung University of Applied Sciences
301 Digital Watermark Technology 2001.01.02 Department of Computer Science & Information Management, Providence University
302 Digital Watermark Technology 2001.01.05 National Taichung Institute of Technology
303 Key to Success in Academic Research 2001.03.07 Graduate School of Mechanical Engineering, National Chung Hsing University
304 Hiding Images Using Dynamic Bit-Replacement and Human Visual System 2001.03.20 National Chi Nan University (China-France Multimedia Conference Keynote Speech)
305 Hiding Images Using Dynamic Bit-Replacement and Human Visual System 2001.04.03 Department of Computer Science and Information Systems, the University of Hong Kong
306 Visual Cryptography 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
307 Color Image Hiding 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
308 Image Hiding Based on Color Difference 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
309 Hiding Images Using Dynamic Bit-Replacement and Human Visual System 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
310 Hiding Binary Images Using BFT Linear Quadtrees 2001.04.26 Beijing University of Posts and Telecommunications, People's Republic of China
311 Security Issues and Strategies for Electronic Commerce (EC) 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
312 Authentication Mechanisms 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
313 Popular Encryption Schemes 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
314 Digital Signature Technology 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
315 Image Hiding Technology 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
316 Visual Cryptography 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
317 Digital Watermark Technology 2001.06.24 Extension Education Center of Pacific Western University (at National Taiwan Normal University)
318 Road to University 2001.09.26 Taichung Second Senior High School
319 Key to Success in Academic Research 2001.10.08 Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology
320 Key to Success in Academic Research 2001.10.30 College of Computer Engineering, Wuhan University
321 Experiences in Designing a Simple Database Management System 2001.10.31 The State's Key Laboratory of Software Engineering, Wuhan University, People's Republic of China
322 Key to Emerging 2001.11.06 Taichung Healthcare and Management University
323 Data Structure and Chinese Remainder Theorem 2001.11.09 Department of Computer Science & Information Management, Providence University
324 Introduction to Cryptanalysis 2001.11.30 Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University
325 Road to Success 2001.12.26 Mingdao Management College
326 Efficient Indexing of Chinese Words by Pinyin 2002.01.08 Department of Computer Science & Information Management, Providence University
327 Issues on Network Security and Crime7 2002.01.23 Jean-Nan Primary School
328 Data Structure and Chinese Remainder Theorem 2002.03.07 Department of Computer Science and Information Engineering, Da-Yeh University
329 Road to Success 2002.03.20 National Chung Cheng University
330 Information Hiding Techniques  2002.04.23 Department of Computer Science and Information Engineering, Tamkang University
331 Digital Watermarking Techniques 2002.04.24 Department of Computer Science and Information Engineering, Tamkang University
332 Digital Image Authentication 2002.04.25 Department of Computer Science and Information Engineering, Tamkang University
333 Application of Mathematics in Computer Science 2002.04.26 St. John's & St. Mary's Institute of Technology
334 Color Visual Cryptography 2002.05.10 Department of Computer Science & Information Management, Providence University
335 Road to Success 2002.10.31 Department of Computer Science and Information Engineering, Tamkang University
336 Image Hiding Techniques 2002.11.07 Tokyo Denki University
337 Road to Success 2002.11.26 Department of Computer Science & Information Management, Providence University
338 Mathematics and Informational Engineering  2002.12.03 Department of Computer Science & Information Engineering, National Chung Cheng University
339 Visual Cryptography 2002.12.10 Tsinghua University, Beijing, People's Republic of China
340 Digital Image Hiding 2002.12.10 Tsinghua University, Beijing, People's Republic of China
341 Non-embedded Watermarking 2002.12.11 Tsinghua University, Beijing, People's Republic of China
342 Embedded Watermarking 2002.12.12 Tsinghua University, Beijing, People's Republic of China
343 Digital Image Authentication 2002.12.12 Tsinghua University, Beijing, People's Republic of China
344 An Image Database Retrieval Scheme Based upon Multivariate Analysis and Data Mining 2002.12.20 Keynote Speech, ICS 2002, National Dong Hwa University
345 Road to Success 2002.12.24 College of Management, Chaoyang University of Technology
346 Image Hiding Technology 2002.12.26 Department of Information Engineering, National Chiao Tung University
347 Road to Success 2003.03.06 National Huwei Institute of Technology
348 Image Compression 2003.03.18 Department of Computer Science & Information Management, Providence University
349 From Image Compression to Digital Watermarking 2003.03.21 Department of Information Management, National Taichung Institute of Technology
350 The Recent Development of Information Security  2003.04.11 Keynote of  General Education , National Chung Hsing University
351 From Information Hiding to Research Methodology 2003.04.25 Department of Computer Science and Information Engineering, National Dong Hwa University
352 Information Hiding Methodology 2003.04.30 National Huwei Institute of Technology
353 From Information Hiding to Research Methodology 2003.05.23 Department of Computer Science & Information Management, Providence University
354 Digital Watermark Technology 2003.08.21 Industrial Technology Research Institute of Taiwan, ROC
355 Cultivating a Correct View of Learning 2003.09.04 Department of Computer Science and Information Engineering, National Chung Cheng University
356 Cultivating a Correct View of Learning 2003.11.07 Department of Information Science and Management, Providence University
357 Future - from the Perspective of University 2003.11.12 Department of Information Management, National Huwei Institute of Technology
358 Road to Success 2003.11.26 Chungtai Institute of Health Sciences and Technology
359 A Secret Information Hiding Scheme Based on Switching Tree Coding 2003.12.05 Institute of Information Science, Academia Sinica
360 Information Hiding - Steganography 2003.12.15 School of Computer Science and Telecommunications Engineering, JiangSu University 
361 A technique gives consideration to Image Compression and Information Hiding 2003.12.15 School of Computer Science and Telecommunications Engineering, JiangSu University 
362 Key to Success in Academic Research 2003.12.16 School of Computer Science and Telecommunications Engineering, JiangSu University 
363 Information Hiding Techniques- Steganography 2003.12.18 Tsinghua University, Beijing, People's Republic of China
364 A technique gives consideration to Image Compression and Information Hiding 2003.12.18 Tsinghua University, Beijing, People's Republic of China
365 How to Fast Computation of Exponents 2003.12.19 Tsinghua University, Beijing, People's Republic of China
366 Key to Success in Academic Research 2003.12.23 Chaoyang University of Technology
367 Road to Success 2004.03.26 National Changhua University of Education
368 Information Hiding Techniques- Steganography 2004.04.02 Graduate Institute of Computer Science, National Chung Hsing University
369 Cultivating a Correct View of Learning 2004.04.02 Graduate Institute of Computer Science, National Chung Hsing University
370 Security Techniques and Applications for Electronic Commerce 2004.05.06 Department of Information Management, Tatung Institute of Commerce and Technology
371 Information Hiding Techniques- Steganography 2004.05.19 Department of Computer Science, National Tsing Hua University
372 Information Hiding Techniques- Steganography 2004.05.28 Department of Computer Science & Information Management, Providence University
373 Information Security Techniques- Steganography 2004.05.29 Chang Gung University
374 Cultivating a Correct View of Learning 2004.06.04 College of Science & Technology, National Chi Nan University
375 Information Hiding Techniques 2004.07.15 National Security Bureau
376 Hiding a Secret Image  in a Cover Image 2004.07.22 Ewha Womans University, South Korea