|
||||
| Subject | Date | Location | ||
| 1 | A Design of an Efficient Hashing Function | 1982.01.07 | Institute of Computer and Decision Sciences, National Tsing Hua University | |
| 2 | Compiler Construction Techniques | 1982.03.11 | National Chung Hsing University, Department of Applied Math | |
| 3 | Design of an Optimal Multi-key File System | 1982.06.19 | Institute for Information Industry | |
| 4 | Data Recovery Automation | 1982.12.11 | National Chung Hsing University, Department of Applied Math | |
| 5 | A Design of a Multi-key File System | 1982.12.18 | Feng Chia University, Department of Applied Math | |
| 6 | Recent Developments of of Perfect Hash Functions | 1983.04.29 | National Taiwan University, Department of Computer Science and Information Engineering | |
| 7 | Application of Database Management Systems | 1983.11.26 | Tax Administratration of Taichung Government | |
| 8 | Recent Developments of Multi-key Hashing File Systems | 1984.02.29 | National Taiwan University, Department of Electrical Engineering | |
| 9 | Constructing an Optimal Information Retrieval Method | 1984.05.11 | Feng Chia University, Department of Information Engineering | |
| 10 | Experiences in Designing a Database Management System | 1984.09.22 | Institude for Information Industry | |
| 11 | Designing a Minimal Perfect Hash Function | 1984.10.08 | Institute of Computer and Decision Sciences, National Tsing Hua University | |
| 12 | Recent Development of Text Retrieval | 1984.10.19 | National Taiwan University, Department of Computer Science and Information Engineering | |
| 13 | Data Structure and Information Security - from the Perspective of Sun-Tzu Theorem | 1984.11.28 | Department of Electrical Data Processing, National Taichung Institude of Commerce | |
| 14 | Experiences in Designing an Interactive Database Management System | 1984.12.21 | Providence College of Arts and Sciences for Women, Department of Information Science | |
| 15 | Recent Developments of Key-Lock Pair Access Control Mechanism | 1985.03.15 | National Taiwan University, Department of Computer Science and Information Engineering | |
| 16 | Methodology of Computer Software Engineering | 1985.03.27 | Providence College of Arts and Sciences for Women, Department of Information Science | |
| 17 | Information Management Techniques | 1985.04.18 | Taichung First Senior High School | |
| 18 | Constructing a Symbolic Database and Information Security System | 1985.04.20 | National Cheng Kung University, Department of Electrical Engineering | |
| 19 | On Design of a Symbolic Database - from the Perspective of Theory of Numbers | 1985.05.02 | National Chiao Tung University, Department of Computer Science and Information Engineering, and Department of Computer Information and Science | |
| 20 | Computer Security Technology | 1985.06.07 | Feng Chia University, Department of Information Engineering | |
| 21 | How to Design a Symbolic Database | 1985.08.02 | CDC Computer Company: Workshop on Maintenance and Application of the User System | |
| 22 | How to Manage Enterprise Databases | 1985.09.10 | YMCA-IMC Workshop on Computer Research and Study | |
| 23 | On Developments of Theory and Techniques | 1985.10.14 | Feng Chia University, Department of Civil Engineering | |
| 24 | Computer and Information Management | 1985.10.20/10.26 | Tunghai University, International Bussiness Administration | |
| 25 | Information Protection Systems | 1986.01.23 | Academia Sinica, Institute of Information Science | |
| 26 | Information Security Systems | 1986.01.24 | Aeronautics Developement Center | |
| 27 | Recent Developments of Data Structures and Information Security | 1986.03.06 | Chung-Shan Institute of Science and Technology | |
| 28 | Recent Developments of Searching Techniques | 1986.03.13 | Providence College of Arts and Sciences for Women, Department of Information Science | |
| 29 | A Chinese Form-oriented Visual Programming System | 1986.03.18 | National Chung Hsing University | |
| 30 | Recent Developments of Data Structure Techniques | 1986.03.24 | National Taiwan Institute of Technology, Department of Electronic Technology | |
| 31 | How to Construct a Symbolic Database | 1986.03.25 | Institute of Computer and Decision Sciences, National Tsing Hua University | |
| 32 | An Efficient Data Searching Technique | 1986.03.31 | Chung Yuan Christian University, Department of Information and Computer Engineering | |
| 33 | Computer Communications Security System | 1986.04.17 | National Chiao Tung University, Department of Computer Science and Information Engineering | |
| 34 | Computers and Data Processing | 1986.05.04 | Tunghai University, International Bussiness Administration | |
| 35 | Public-Key Cryptography | 1986.06.12 | Taiwan Province Government, Electrical Data Processing Center | |
| 36 | Advanced GPSS/S | 1986.06.16-06.17 | Workshop on Software Packages and Application Systems, sponsored by Ministry of Education | |
| 37 | Searching Techniques for Static Data | 1986.08.20 | Aeronautics Developement Center | |
| 38 | Computers and Data Processing | 1986.09.13 | Tunghai University, International Bussiness Administration | |
| 39 | Visual Programming | 1986.09.20 | Institude for Information Industry | |
| 40 | Computers and Passwords | 1986.10.05 | Taiwan Provincial Taichung Libarary | |
| 41 | Visual Programming | 1986.10.06 | National Chung Hsing University, Computer and Information Network Center | |
| 42 | Office Automation | 1986.10.18 | Tunghai University, International Bussiness Administration | |
| 43 | Visual Programming | 1986.10.21 | Department of Electrical Data Processing, National Taichung Institude of Technology | |
| 44 | Information Security | 1986.10.29 | National Chung Hsing University, Computer and Information Network Center | |
| 45 | Data Encryption Techniques | 1986.11.14 | World Technology Consultant Industry | |
| 46 | Information Access Control Techniques | 1986.11.14 | World Technology Consultant Industry | |
| 47 | Secure Secret Broadcasting | 1986.11.15 | World Technology Consultant Industry | |
| 48 | Recent Developments of Data Structures and Searching Techniques | 1986.11.19 | National Central University, Department of Computer Science and Information Engineering | |
| 49 | Information Access Control Techniques | 1986.12.03 | National Tsing Hua University, Department of Industrial Engineering | |
| 50 | Computers and Communications | 1986.12.12 | National Taiwan Normal University, Department of Industrial Education | |
| 51 | Computers and Communications | 1986.12.13 | Taichung County, Ching-Shui Junior High School | |
| 52 | The Past, Present, and Future of Information Technology | 1986.12.22 | National Chin-Yi Institute of Technology | |
| 53 | Implementation and Application of a Test Items Bank for Information Courses | 1986.12.23 | Taichung Home Economical and Commercial Senior Vocational School | |
| 54 | Information Era | 1987.01.15 | Victory High School | |
| 55 | Recent Developments of Data Structures and Searching Techniques | 1987.02.24 | National/ Panasonic Taiwan | |
| 56 | Sun-Tzu as a Computer Scientist | 1987.03.15 | Taiwan Provincial Taichung Libarary | |
| 57 | Advanced GPSS/S | 1987.03.17-03.18 | Workshop on Software Packages and Application Systems, sponsored by Ministry of Education | |
| 58 | Computers and Information | 1987.03.21 | Chia-Yi YMCA | |
| 59 | Computers and Information | 1987.03.22 | Tunghai University, International Bussiness Administration | |
| 60 | The Developments of Information Retrieval Techniques | 1987.03.24 | Tatung Institute of Technology, Department of Computer Science and Engineering | |
| 61 | A Design of Secure Computer Passwords | 1987.03.26 | National Cheng Kung University, Department of Engineering Science | |
| 62 | Database Design - From the Perspective of Data Analysis | 1987.04.14 | Computer Society of the Republic of China | |
| 63 | Data Retrieval and Information Security | 1987.04.20 | National Chung Hsing University, Computer and Information Network Center | |
| 64 | Information Science - from the Perspective of Data Analysis | 1987.04.21 | National Chung Hsing University, Computer and Information Network Center | |
| 65 | Information Science - from the Perspective of Data Analysis | 1987.04.23 | Aeronautics Developement Center | |
| 66 | Information Science - from the Perspective of Dicrete Mathematics | 1987.04.28 | Tunghai University, Department of Computer Science Information Engineering | |
| 67 | Key to the Treasury of Life | 1987.05.11 | Taichung Second Senior High School | |
| 68 | Advanced GPSS/S | 1987.05.26-05.27 | Workshop on Software Packages and Application Systems, sponsored by Ministry of Education | |
| 69 | Information Era | 1987.06.23/07.07 | Ming Dao High School | |
| 70 | Visual Programming - FORMOSA | 1987.07.09 | World Technology Consultant Industry | |
| 71 | A Database Management System - System-Bee | 1987.07.10 | World Technology Consultant Industry | |
| 72 | Information Security | 1987.07.23 | Aeronautics Developement Center | |
| 73 | Workshop on Data Structures and Data Analyses | 1987.08.24-08.26 | World Technology Consultant Industry | |
| 74 | Workshop on Information Systems and Information Auditing | 1987.08.27-08.28 | Harvard Management Services | |
| 75 | Workshop on Information Engineering Technology | 1987.09.21-09.23 | Chin-Peng Management Consulting Company | |
| 76 | Information Access Control Techniques | 1987.10.28 | National Tsing Hua University, Department of Industrial Engineering | |
| 77 | Designing an Information Query System | 1987.11.02 | Institute of Computer and Decision Sciences, National Tsing Hua University | |
| 78 | Design Principles of an Information Query System | 1987.11.04 | Tunghai University, Department of Computer Science Information Engineering | |
| 79 | System Simulation | 1987.11.10 | Institute of Harbor and Marine Technology | |
| 80 | Clustering Analysis and Its Applications | 1987.11.26 | Department of Computer Engineering, National Chiao Tung University | |
| 81 | Workshop on Compilers | 1987.11.30-12.02 | World Technology Consultant Industry | |
| 82 | Clustering Analysis and Its Applications | 1987.12.08 | Department of Computer Science and Information Engineering, National Cheng Kung University | |
| 83 | A Step to Information Society - Using Computers | 1987.12.12 | Feng-Yuan Junior High School, Feng Yuan | |
| 84 | A Step to Information Society - Using Computers | 1987.12.15 | Chang-Ann Junior High School, Chang-Hua | |
| 85 | Data Compression | 1987.12.16 | Computer and Information Network Center, National Chung Hsing University | |
| 86 | Design of Distributed Databases | 1988.03.14 | Department of Computer Science and Engineering, Tatung Institute of Technology | |
| 87 | Visual Programming | 1988.03.28 | Department of Industrial Engineering and Enterprise Information, Tunghai University | |
| 88 | On Developments of Theory and Techniques | 1988.04.11 | Tunghai University, Department of Computer Science Information Engineering | |
| 89 | Visual Programming | 1988.04.13 | Aeronautic Development Center | |
| 90 | Electronic Data Compression | 1988.04.14 | Department of Electrical Data Processing, National Taichung Institude of Commerce | |
| 91 | Database Management Systems and Office Automation | 1988.04.18 | Yung-Jing Industrial Vocational Senior School | |
| 92 | Database Management System and Office Automation | 1988.04.20 | Taichung Home Economical and Commercial Senior Vocational School | |
| 93 | Information Era | 1988.08.15 | Taichung Home Economical and Commercial Senior Vocational School | |
| 94 | Information Era | 19888.08.18 | Taichung Agricultural Vocational Senior High School | |
| 95 | Database Management Systems | 1988.10.05 | Aeronautic Development Center | |
| 96 | Chinese String Searching | 1988.10.12 | Department of Computer Science and Information Engineering/Electrical Engineering, National Central University | |
| 97 | Approximate String Searching | 1988.11.01 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 98 | A User Identification Scheme on Computer Networks | 1988.11.10 | Academia Sinica | |
| 99 | Workshop on Information System Technology | 1988.11.24-11.26 | World Technology Consultant Industry | |
| 100 | Recent Developments of Information Security Technology | 1988.12.01 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 101 | Towards Information Society - Universal Information Education | 1988.12.08 | Taichung First Senior High School | |
| 102 | Towards Information Society - Universal Information Education | 1988.12.10 | Taichung Girls' Senior High School | |
| 103 | Introduction to Computer Passwords | 1989.03.15 | Department of Electrical Data Processing, National Taichung Institude of Commerce | |
| 104 | Public-Key Encryption | 1989.04.24 | Aeronautics Developement Center | |
| 105 | An Experience in Designing a Database Management System | 1989.04.26 | Computer Society of the Republic of China | |
| 106 | Data Analysis Technology and Its Applications | 1989.04.28 | Department of Computer Science and Information Engineering, National Taiwan University | |
| 107 | Data Analysis Technology and Its Applications | 1989.05.10 | Department of Industrial Education, National Taiwan Normal University | |
| 108 | Information and Computers | 1989.06.07 | National Chung Hsing University | |
| 109 | On Developments of Theory and Techniques | 1989.06.09 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 110 | Information Security | 1989.06.14 | National Chung Hsing University | |
| 111 | Workshop on Data Engineering Technology | 1989.08.28-08.30 | Center of Public and Business Administration Education, National Chengchi University | |
| 112 | Data Compression | 1989.10.05 | Department of Engineering Science, National Cheng Kung University | |
| 113 | Computer Crime and Computer Viruses | 1989.10.15 | Taiwan Provincial Taichung Library | |
| 114 | Computer Crime and Countermeasures | 1989.11.01 | Tunghai University, Department of Computer Science Information Engineering | |
| 115 | Clustering Analysis and Its Applications | 1989.12.08 | Institute of Information Science, Academia Sinica | |
| 116 | Information Security | 1989.12.11 | Department of Mathematics and Science Education, National Chiayi Teachers College | |
| 117 | Information and Computers | 1990.02.06 | Taichung Agricultural Vocational Senior High School | |
| 118 | Introduction to Computer Password Design | 1990.03.01 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 119 | Computer Cryptology | 1990.03.02 | Department of Information Engineering, Feng Chia University | |
| 120 | Data Encryption | 1990.03.08 | Department of Electrical Engineering, Tatung Institute of Technology | |
| 121 | Information Security | 1990.03.09 | Department of Electronical Data Processing, Ming Chuan College | |
| 122 | Data Encryption | 1990.03.28 | Application Mathematics Department, Chinese Culture University | |
| 123 | Design of a Chinese String Searching Machine | 1990.03.30 | Department of Electrical Data Processing, National Taichung Institude of Commerce | |
| 124 | Data Encryption | 1990.04.12 | Taichung Home Economical and Commercial Senior Vocational School | |
| 125 | Information Security | 1990.04.12 | Taichung Home Economical and Commercial Senior Vocational School | |
| 126 | Data Compression | 1990.04.14 | Taichung Home Economical and Commercial Senior Vocational School | |
| 127 | Computer Security | 1990.04.18 | College of Medicine, National Cheng Kung University | |
| 128 | Computer Crime and Computer Viruses | 1990.05.17 | Taichung Museum of Art | |
| 129 | Information Management and Applications | 1990.06.04 | Chia-Yi City Government | |
| 130 | Information Management and Applications | 1990.06.22 | Chia-Yi City Government | |
| 131 | Management Computerization | 1990.07.11 | National Yunlin Institute of Industry | |
| 132 | Information Access and Control | 1990.09.27 | Department of Applied Mathematics, National Chung Hsing University | |
| 133 | Strategies for Chinese Compression | 1990.10.18 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 134 | Computer Crime and Countermeasures | 1990.10.18 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 135 | Computer Crime and Countermeasures | 1990.10.30 | National Chung Cheng University | |
| 136 | Compression-Based Perfect Hashing Strategies | 1990.11.26 | Department of Computer Science, National Tsing Hua University | |
| 137 | Countermesures against Computer Crime and Computer Viruses | 1990.11.27 | Taiwan Cooperative Bank | |
| 138 | Data Engineering Technology | 1990.11.28 | National Defense Management College | |
| 139 | Computer Password Design | 1990.12.12 | Department of Electrical Engineering, National Yunlin Institute of Industry | |
| 140 | Applications of Clustering Technology in Information Science | 1990.12.20 | Department of Electrical Engineering, National Cheng Kung University | |
| 141 | Information Security | 1991.01.22 | YMCA, Chia-Yi | |
| 142 | Design of a Minimal Perfect Hashing Function | 1991.02.11 | Department of Computer Science and Engineering, The Chinese University of Hong Kong | |
| 143 | Office Automation | 1991.03.06 | Computer Center, National Chung Cheng University | |
| 144 | Computer Crime and Prevention | 1991.04.20 | Exhibition Center of Computer Science, National Science Council | |
| 145 | Computers and Passwords | 1991.06.14 | Department of Electronic Engineering, National Taipei Institute of Technology | |
| 146 | On File Systems | 1991.09.21 | Department of Computer Science and Information Engineering, National Cheng Kung University | |
| 147 | Applications of Cryptography in Computer Security | 1991.11.09 | Department of Computer Science and Information Engineering, National Cheng Kung University | |
| 148 | Road to Success | 1991.11.27 | Tunghai University, Department of Computer Science Information Engineering | |
| 149 | Design of Image Databases | 1991.12.04 | Department of Electrical Data Processing, National Taichung Institude of Commerce | |
| 150 | Dynamic Secret Sharing | 1992.01.10 | Department of Applied Mathematics, National Sun Yat-sen University | |
| 151 | Introduction to Computer Passwords | 1992.02.21 | Sieh-Chih Industrial and Commercial Senior Vocational School | |
| 152 | Key to Emerging | 1992.03.11 | Taiwan Provincial Wen-Hua Senior High School | |
| 153 | Information Security | 1992.04.14 | Provincial Chang-Hua Senior School of Commerence | |
| 154 | The Past, Present, and Future of Science and Technology Education | 1992.04.16 | National Chung Cheng University | |
| 155 | Methodology | 1992.05.14 | Tunghai University, Department of Computer Science Information Engineering | |
| 156 | Information Security | 1992.05.18 | Ta Tung Technological College of Commerce | |
| 157 | Group Secret Strategies | 1992.06.15 | Computer Science and Engineering Research Center, National Sun Yat-sen University | |
| 158 | Group Secret Techniques | 1992.10.02 | Department of Electrical Data Processing, National Taichung Institude of Commerce | |
| 159 | Secret Sharing | 1992.10.06 | Department of Information and Computer Education, National Taiwan Normal University | |
| 160 | Generalized Group Secret Cryptography | 1992.10.07 | National Security Bureau | |
| 161 | Methodology | 1992.10.22 | Department of Information Management, Ming Chuan College | |
| 162 | Methodology | 1992.10.28 | Department of Computer and Information Science, National Chiao Tung University | |
| 163 | Computer Password Design | 1992.11.18 | Department of Computer Science and Engineering, National Sun Yat-sen University | |
| 164 | Evolution and Applications of Mathematics | 1992.11.23 | Department of Mathematics, National Tsing Hua University | |
| 165 | Data Compression | 1992.11.24 | Provincial Chang-Hua Senior School of Commerence | |
| 166 | Developments of Contemporary Cryptology | 1992.12.01 | Taichung Home Economical and Commercial Senior Vocational School | |
| 167 | Career Planning of Computer People | 1992.12.07 | Department of Computer Science and Information Engineering, National Chung Cheng University | |
| 168 | A Secured Computer Center Management | 1993.01.07 | Taichung Home Economical and Commercial Senior Vocational School | |
| 169 | A Secured Computer Center Management | 1993.01.14 | Taichung Home Economical and Commercial Senior Vocational School | |
| 170 | A Secured Computer Center Management | 1993.02.04 | Taichung Home Economical and Commercial Senior Vocational School | |
| 171 | A Secured Computer Center Management | 1993.02.11 | Taichung Home Economical and Commercial Senior Vocational School | |
| 172 | Key to Emerging | 1993.03.04 | Department of Information Management, National Taiwan Institute of Technology | |
| 173 | Chinese Retrieval and Searching | 1993.03.24 | Provincial Chang-Hua Senior School of Commerence | |
| 174 | An Image Similar Retrieval Method Based on Modulo Arithmetics | 1993.04.23 | Workshop on Computer Applications Sponsored by National Chung Hsing University | |
| 175 | Information Security | 1993.05.04 | Department of Information Science and Management, Providence University | |
| 176 | Key to Emerging | 1993.05.24 | Chia-Yi Home Vocational School | |
| 177 | Information Security | 1993.06.02 | Department of Budget, Accounting and Statistics, Taiwan Provincial Government, R.O.C. | |
| 178 | A Master Key for an M3 Cryptoscheme | 1993.06.08 | Department of Electrical Engineering, National Defense University, Chung Cheng Institute of Technology | |
| 179 | Introduction to Computer Passwords | 1993.06.10 | Taichung Home Economical and Commercial Senior Vocational School | |
| 180 | Military Information Security | 1993.09.07 | National Defense Management College | |
| 181 | Information Searching Techniques | 1993.10.29 | National Chung Cheng University | |
| 182 | Evolution of Computer Cryptography | 1993.11.18 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 183 | Project Planning Information System Design | 1993.11.23 | Research, Development, and Evaluation Commission, Taiwan Provincial Government | |
| 184 | Career Planning | 1993.11.25 | College of Engineering, National Chung Cheng University (for the students of Department of Business Education, National Changhua University of Education) | |
| 185 | Information Security | 1993.12.01 | Provincial Training Center of Taiwan Provincial Government | |
| 186 | Developments of Computer Cryptography | 1993.12.08 | National Defense University, Chung Cheng Institute of Technology | |
| 187 | Information Security | 1993.12.27 | Provincial Training Center of Taiwan Provincial Government | |
| 188 | Applications of Instruction Network and Information Security | 1994.01.07 | Szu-Yu Junior High School | |
| 189 | Evaluation of Computer-Aided Instruction (CAI) | 1994.01.17 | Fooyin College of Nursing | |
| 190 | Evolution of Contemporary Cryptography | 1994.02.22 | Chung-Shan Institute of Science and Technology | |
| 191 | Project Planning Information System Design | 1994.03.10 | Research, Development, and Evaluation Commission, Taiwan Province | |
| 192 | Group Secret Technology | 1994.03.18 | Department of Computer Science. and Information Engineering, National Taiwan University | |
| 193 | Artificial Intelligence | 1994.03.25 | Tsau Ton Commercial and Technical Vocational School | |
| 194 | Artificial Intelligence | 1994.04.02 | Center of Automated Engineering, Da-Yeh University | |
| 195 | Computer Password Design | 1994.04.13 | Wu Feng Institute of Technology | |
| 196 | Key to Emerging | 1994.04.14 | Rotary Club of Taichung East District | |
| 197 | Computer Password Design | 1994.04.30 | National Central University | |
| 198 | Introduction to Cryptanalysis | 1994.05.06 | Department of Applied Mathematics, Feng Chia University | |
| 199 | Introduction to Cryptanalysis | 1994.05.20 | Department of Industrial Education, National Taiwan Normal University | |
| 200 | Chinese Database Management Systems | 1994.05.25 | Training Center for High School Teachers | |
| 201 | Efficient Information Retrieval | 1994.08.03 | Graduate Institute of Computer Science, National Chung Hsing University | |
| 202 | Introduction to Cryptanalysis | 1994.11.03 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 203 | Information Security | 1994.12.14 | Department of Information Management, Chaoyang Institute of Technology | |
| 204 | Information Security | 1994.12.17 | Computer and Information Network Center, National Chung Hsing University | |
| 205 | Developments of Contemporary Cryptography | 1995.03.03 | Department of Computer Science and Engineering, National Sun Yat-Sen University | |
| 206 | A Step to Information Society - Using Computers | 1995.04.24 | National Chung Cheng University | |
| 207 | Image Compression Technology | 1995.04.27 | Department of Information Science and Management, Providence University | |
| 208 | Technology and Our Life | 1995.07.27 | National Chiayi Senior Hight School | |
| 209 | Information Security and Management | 1995.08.06 | Taiwan Regional Development Institute | |
| 210 | Information Security | 1995.11.03 | Provincial Training Center of Taiwan Provincial Government | |
| 211 | The Present and Prospect of Information Security | 1995.11.09 | Department of Applied Mathematics, National Chung Hsing University | |
| 212 | Developments of Computer Cryptography | 1995.12.20 | Department of Computer Science and Information Engineering, National Dong Hwa University | |
| 213 | Developments of Computer Cryptography | 1995.12.28 | Department of Computer and Information Science, National Chiao Tung University | |
| 214 | Information Security | 1996.04.19 | Refining & Manufacturing Research Center of Chinese Petroleum Corp | |
| 215 | Contemporary Cryptography | 1996.05.03 | Department of Computer Science and Information Engineering, National Cheng Kung University | |
| 216 | Information Security | 1996.06.06 | National Changhua University of Education | |
| 217 | Information Security | 1996.08.14 | Department of Computer Science and Engineering, National Sun Yat-Sen University | |
| 218 | How to Share a Common Secret Document | 1996.12.03 | Department of Information Engineering, Feng Chia University | |
| 219 | Efficient Join Operation of Time-domain Databases | 1996.12.19 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 220 | Road to Success | 1997.03.26 | Department of Information Management, Chaoyang University of Technology | |
| 221 | Efficient Join Operation of Time-domain Databases | 1997.04.16 | Department of Computer Science, National Tsing Hua University | |
| 222 | Evolution of Information Security Technology | 1997.05.07 | National Defense University, Chung Cheng Institute of Technology | |
| 223 | Information Security | 1997.06.05 | Department of Mathematics, Chung Yuan Christian University | |
| 224 | Evolution of Information Security Technology | 1997.07.11 | National Defense Management College | |
| 225 | The Present and Prospect of Information Education of Universities in Taiwan | 1997.11.04 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 226 | Hot Issues of International Information Security Research - Theory, Techniques, and Market Trend | 1997.11.04 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 227 | Secret Sharing | 1997.11.05 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 228 | Fast Computation of Modulo Exponents | 1997.11.05 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 229 | Digital Signatures | 1997.11.06 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 230 | Image Hiding Technology | 1997.11.06 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 231 | Applications of Chinese Remainder Theorem | 1997.11.07 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 232 | Essential Qualities of a Successful Scientist | 1997.11.07 | Beijing University of Posts and Telecommunications, People¡¦s Republic of China | |
| 233 | Image Hiding Technology | 1997.12.28 | Tunghai University | |
| 234 | Progressive Image Transmission Using Edge Matching | 1998.02.24 | Department of Computer and Information Science, National Chiao Tung University | |
| 235 | Image Hiding Technology | 1998.02.26 | Department of Information Science and Management, Providence University | |
| 236 | Progressive Image Compression | 1998.02.26 | Department of Information Science and Management, Providence University | |
| 237 | Progressive Image Transmission | 1998.03.13 | Department of Business Education, National Changhua University of Education | |
| 238 | Computer Crime and Prevention | 1998.03.17 | National Taiwan Normal University | |
| 239 | A Binary Access Control Method Using Prime Factorization | 1998.03.27 | University of Tokyo, Japan | |
| 240 | An Image Hiding Scheme Based on Vector Quantization | 1998.03.27 | University of Tokyo, Japan | |
| 241 | Progressive Image Transmission | 1998.04.23 | Department of Information Management, National Taiwan University of Science and Technology | |
| 242 | The Present and Prospect of Information Security Developments | 1998.05.08 | Tung Fang Institute of Industry | |
| 243 | Techniques of Designing Digital Watermarks | 1998.05.13 | Workshop on Network Security Technology Sponsored by Industrial Technology Research Institute | |
| 244 | Key to Success in Academic Research | 1998.05.21 | Department of Applied Mathematics, National Chung Hsing University | |
| 245 | Digital Watermarking | 1998.07.03 | Kyoto University, Japan | |
| 246 | Applications of Mathematics in Information Science | 1998.10.09 | Ming-Dao High school | |
| 247 | Digital Watermarking | 1998.10.18 | Chang Gung University | |
| 248 | Road to Success | 1998.11.07 | Department of Electrical Data Processing, National Taichung Institude of Commerce | |
| 249 | A Sheme for Obtaining a Message from the Digital Multi-Signature | 1998.11.17 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 250 | Chinese Calligraphy Compression Using New S-tree Sructure | 1998.11.18 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 251 | Key to Success in Academic Research | 1998.12.15 | Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University | |
| 252 | Image Hiding Technology | 1999.02.25 | National Security Bureau, Republic of China | |
| 253 | Image Hiding | 1999.03.02 | Department of Computer Science and Information Management, Providence University | |
| 254 | Key to Success in Academic Research | 1999.03.10 | Department of Industrial Education, National Taiwan Normal University | |
| 255 | Image Hiding | 1999.03.12 | Department of Information Management, Chaoyang University of Technology | |
| 256 | On Development of Our Information Education | 1999.03.17 | Department of Business Education, National Changhua University of Education | |
| 257 | Key to Emerging | 1999.04.01 | Chin-Yi Institute of Technology and Commerce | |
| 258 | Image Hiding | 1999.04.14 | Tunghai University, Department of Computer Science Information Engineering | |
| 259 | Key to Emerging | 1999.04.14 | College of Electrical and Information Engineering, I-Shou University | |
| 260 | Secret Sharing of Image Data and Its Applications | 1999.04.29 | Department of Computer Science and Information Engineering, Tamkang University | |
| 261 | Road to Success | 1999.05.03 | Ming-Chuan University | |
| 262 | Image Hiding | 1999.05.13 | Department of Computer Science and Information Engineering, National Chiao Tung University | |
| 263 | Watermarking Using Visual Cryptography | 1999.05.15 | Chaoyang University of Technology (National Information Security Conference-Keynote Speech) | |
| 264 | Image Hiding | 1999.05.19 | Hua-Fan University | |
| 265 | Security Issues and Strategies for Electronic Commerce (EC) | 1999.05.29 | Chungtai Institute of Health Science and Technology | |
| 266 | Essential Qualities of a Successful Technologist | 1999.06.02 | College of Science and Engineering, I-Shou University | |
| 267 | A Progressive Codebook Training Algorithm for Image Vector Quantization | 1999.06.04 | Central Police University | |
| 268 | Information and Electronic Commerce | 1999.06.24 | Extension Education Center of Chinese Culture University | |
| 269 | Progressive Image Transmission Technology | 1999.07.14 | Department of Computer Science and Information Engineering, National Central University | |
| 270 | Progressive Image Transmission Technology | 1999.07.19 | Department of Chemistry, National Taiwan Normal University | |
| 271 | A Technique for Image Hiding | 1999.09.21 | Graduate School of Information System, Department of Computer Software, The University of Aizu, Japan | |
| 272 | A New Scheme of Progressive Image Transimssion Based on Bit-Plane Method | 1999.10.21 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 273 | A Block Based Digital Watermarks for Copy Protection of Images | 1999.10.21 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 274 | Progressive Image Transmission Technology | 1999.10.29 | Department of Computer Science and Information Engineering, National Cheng Kung University | |
| 275 | Progressive Image Transimssion Based on Bit-Plane Method | 1999.11.02 | Department of Computer Science & Information Management, Providence University | |
| 276 | Wonders in a Red Envelope | 1999.11.15 | BCC- The Words of Wisdom | |
| 277 | Digital Watermark Technology | 1999.12.15 | Department of Business Education, National Changhua University of Education | |
| 278 | Technical Writing Essentials | 2000.01.15 | Department of Information Management, National Taichung Institute of Technology | |
| 279 | Intellectual Property Protection Techniques for Images | 2000.03.21 | Van-Nung Institute of Technology | |
| 280 | The Present and Prospect of Our Information Education | 2000.03.30 | Pei-Men Senior Vocational School of Agriculture and Industrial | |
| 281 | Key to Success in Academic Research | 2000.04.01 | Department of Information Management, National Taichung Institute of Technology | |
| 282 | Key to Success in Academic Research | 2000.04.18 | Department of Computer Science and Information Engineering, Tamkang University | |
| 283 | Digital Watermark Technology | 2000.05.01 | Department of Information and Computer, National Taiwan Normal University | |
| 284 | Security Issues and Strategies for Electronic Commerce (EC) | 2000.05.12 | United World Chinese Commercial Bank (at Hotel National Taichung) | |
| 285 | Security Issues and Strategies for Electronic Commerce (EC) | 2000.05.15 | Ta-Te Industrial and Home Ecnomical Senior Vocational School | |
| 286 | Security Issues and Strategies for Electronic Commerce (EC) | 2000.05.19 | Rotary Club of Taichung Pei-Tuen District (at Hotel National Taichung) | |
| 287 | Image Hiding and Visual Cryptography | 2000.05.22 | Graduate Institute of Electrical Engineering, National Taiwan University | |
| 288 | Image Hiding | 2000.06.02 | Department of Computer Science and Information Engineering, National Chi Nan University | |
| 289 | Security Issues and Strategies for Electronic Commerce (EC) | 2000.06.23 | National Taichung Institute of Technology | |
| 290 | A New Scheme for Sharing Secret Color Images in Computer Network | 2000.07.06 | ICPAD 2000 Keynote Speech Sponsered by Iwate Prefectureal University, Japan | |
| 291 | Some Techniques of Digital Watermarking on Internet | 2000.09.28 | The Institution of Electrical Engineers, Hong Kong | |
| 292 | An Image Protection Scheme Based on Discrete Cosine Transformation | 2000.09.28 | Department of Electronic Engineering, City University of Hong Kong | |
| 293 | Design of the Fast Chinese Indexing System in Boshiamy Input Method | 2000.10.13 | Department of Computer Science and Information Management, Providence University | |
| 294 | The Development of Internet and Its Applications in Taiwan | 2000.10.17 | Ewha Womans University, South Korea | |
| 295 | Design of the Fast Chinese Indexing System in Boshiamy Input Method | 2000.10.31 | Department of Information Engineering and Computer Science, Feng Chia University | |
| 296 | Key to Success in Academic Research | 2000.11.06 | Department of Computer Science and Information Engineering, National Chiayi University | |
| 297 | A Method for Protection Digital Images from Being Copied Illegally | 2000.11.11 | Chung-Chou Institute of Technology | |
| 298 | Some Watermarking Techniques on Internet | 2000.11.22 | Department of Computer Science and Engineering, National Sun Yat-Sen University | |
| 299 | Digital Watermark Technology | 2000.12.22 | Graduate School of Applied Mathematics, National Chung Hsing University | |
| 300 | Some Watermarking Techniques on Internet | 2000.12.26 | National Kaohsiung University of Applied Sciences | |
| 301 | Digital Watermark Technology | 2001.01.02 | Department of Computer Science & Information Management, Providence University | |
| 302 | Digital Watermark Technology | 2001.01.05 | National Taichung Institute of Technology | |
| 303 | Key to Success in Academic Research | 2001.03.07 | Graduate School of Mechanical Engineering, National Chung Hsing University | |
| 304 | Hiding Images Using Dynamic Bit-Replacement and Human Visual System | 2001.03.20 | National Chi Nan University (China-France Multimedia Conference Keynote Speech) | |
| 305 | Hiding Images Using Dynamic Bit-Replacement and Human Visual System | 2001.04.03 | Department of Computer Science and Information Systems, the University of Hong Kong | |
| 306 | Visual Cryptography | 2001.04.26 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 307 | Color Image Hiding | 2001.04.26 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 308 | Image Hiding Based on Color Difference | 2001.04.26 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 309 | Hiding Images Using Dynamic Bit-Replacement and Human Visual System | 2001.04.26 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 310 | Hiding Binary Images Using BFT Linear Quadtrees | 2001.04.26 | Beijing University of Posts and Telecommunications, People's Republic of China | |
| 311 | Security Issues and Strategies for Electronic Commerce (EC) | 2001.06.24 | Extension Education Center of Pacific Western University (at National Taiwan Normal University) | |
| 312 | Authentication Mechanisms | 2001.06.24 | Extension Education Center of Pacific Western University (at National Taiwan Normal University) | |
| 313 | Popular Encryption Schemes | 2001.06.24 | Extension Education Center of Pacific Western University (at National Taiwan Normal University) | |
| 314 | Digital Signature Technology | 2001.06.24 | Extension Education Center of Pacific Western University (at National Taiwan Normal University) | |
| 315 | Image Hiding Technology | 2001.06.24 | Extension Education Center of Pacific Western University (at National Taiwan Normal University) | |
| 316 | Visual Cryptography | 2001.06.24 | Extension Education Center of Pacific Western University (at National Taiwan Normal University) | |
| 317 | Digital Watermark Technology | 2001.06.24 | Extension Education Center of Pacific Western University (at National Taiwan Normal University) | |
| 318 | Road to University | 2001.09.26 | Taichung Second Senior High School | |
| 319 | Key to Success in Academic Research | 2001.10.08 | Department of Computer Science and Information Engineering, National Taiwan University of Science and Technology | |
| 320 | Key to Success in Academic Research | 2001.10.30 | College of Computer Engineering, Wuhan University | |
| 321 | Experiences in Designing a Simple Database Management System | 2001.10.31 | The State's Key Laboratory of Software Engineering, Wuhan University, People's Republic of China | |
| 322 | Key to Emerging | 2001.11.06 | Taichung Healthcare and Management University | |
| 323 | Data Structure and Chinese Remainder Theorem | 2001.11.09 | Department of Computer Science & Information Management, Providence University | |
| 324 | Introduction to Cryptanalysis | 2001.11.30 | Department of Computer Science and Technology, Chung Cheng Institute of Technology, National Defense University | |
| 325 | Road to Success | 2001.12.26 | Mingdao Management College | |
| 326 | Efficient Indexing of Chinese Words by Pinyin | 2002.01.08 | Department of Computer Science & Information Management, Providence University | |
| 327 | Issues on Network Security and Crime7 | 2002.01.23 | Jean-Nan Primary School | |
| 328 | Data Structure and Chinese Remainder Theorem | 2002.03.07 | Department of Computer Science and Information Engineering, Da-Yeh University | |
| 329 | Road to Success | 2002.03.20 | National Chung Cheng University | |
| 330 | Information Hiding Techniques | 2002.04.23 | Department of Computer Science and Information Engineering, Tamkang University | |
| 331 | Digital Watermarking Techniques | 2002.04.24 | Department of Computer Science and Information Engineering, Tamkang University | |
| 332 | Digital Image Authentication | 2002.04.25 | Department of Computer Science and Information Engineering, Tamkang University | |
| 333 | Application of Mathematics in Computer Science | 2002.04.26 | St. John's & St. Mary's Institute of Technology | |
| 334 | Color Visual Cryptography | 2002.05.10 | Department of Computer Science & Information Management, Providence University | |
| 335 | Road to Success | 2002.10.31 | Department of Computer Science and Information Engineering, Tamkang University | |
| 336 | Image Hiding Techniques | 2002.11.07 | Tokyo Denki University | |
| 337 | Road to Success | 2002.11.26 | Department of Computer Science & Information Management, Providence University | |
| 338 | Mathematics and Informational Engineering | 2002.12.03 | Department of Computer Science & Information Engineering, National Chung Cheng University | |
| 339 | Visual Cryptography | 2002.12.10 | Tsinghua University, Beijing, People's Republic of China | |
| 340 | Digital Image Hiding | 2002.12.10 | Tsinghua University, Beijing, People's Republic of China | |
| 341 | Non-embedded Watermarking | 2002.12.11 | Tsinghua University, Beijing, People's Republic of China | |
| 342 | Embedded Watermarking | 2002.12.12 | Tsinghua University, Beijing, People's Republic of China | |
| 343 | Digital Image Authentication | 2002.12.12 | Tsinghua University, Beijing, People's Republic of China | |
| 344 | An Image Database Retrieval Scheme Based upon Multivariate Analysis and Data Mining | 2002.12.20 | Keynote Speech, ICS 2002, National Dong Hwa University | |
| 345 | Road to Success | 2002.12.24 | College of Management, Chaoyang University of Technology | |
| 346 | Image Hiding Technology | 2002.12.26 | Department of Information Engineering, National Chiao Tung University | |
| 347 | Road to Success | 2003.03.06 | National Huwei Institute of Technology | |
| 348 | Image Compression | 2003.03.18 | Department of Computer Science & Information Management, Providence University | |
| 349 | From Image Compression to Digital Watermarking | 2003.03.21 | Department of Information Management, National Taichung Institute of Technology | |
| 350 | The Recent Development of Information Security | 2003.04.11 | Keynote of General Education , National Chung Hsing University | |
| 351 | From Information Hiding to Research Methodology | 2003.04.25 | Department of Computer Science and Information Engineering, National Dong Hwa University | |
| 352 | Information Hiding Methodology | 2003.04.30 | National Huwei Institute of Technology | |
| 353 | From Information Hiding to Research Methodology | 2003.05.23 | Department of Computer Science & Information Management, Providence University | |
| 354 | Digital Watermark Technology | 2003.08.21 | Industrial Technology Research Institute of Taiwan, ROC | |
| 355 | Cultivating a Correct View of Learning | 2003.09.04 | Department of Computer Science and Information Engineering, National Chung Cheng University | |
| 356 | Cultivating a Correct View of Learning | 2003.11.07 | Department of Information Science and Management, Providence University | |
| 357 | Future - from the Perspective of University | 2003.11.12 | Department of Information Management, National Huwei Institute of Technology | |
| 358 | Road to Success | 2003.11.26 | Chungtai Institute of Health Sciences and Technology | |
| 359 | A Secret Information Hiding Scheme Based on Switching Tree Coding | 2003.12.05 | Institute of Information Science, Academia Sinica | |
| 360 | Information Hiding - Steganography | 2003.12.15 | School of Computer Science and Telecommunications Engineering, JiangSu University | |
| 361 | A technique gives consideration to Image Compression and Information Hiding | 2003.12.15 | School of Computer Science and Telecommunications Engineering, JiangSu University | |
| 362 | Key to Success in Academic Research | 2003.12.16 | School of Computer Science and Telecommunications Engineering, JiangSu University | |
| 363 | Information Hiding Techniques- Steganography | 2003.12.18 | Tsinghua University, Beijing, People's Republic of China | |
| 364 | A technique gives consideration to Image Compression and Information Hiding | 2003.12.18 | Tsinghua University, Beijing, People's Republic of China | |
| 365 | How to Fast Computation of Exponents | 2003.12.19 | Tsinghua University, Beijing, People's Republic of China | |
| 366 | Key to Success in Academic Research | 2003.12.23 | Chaoyang University of Technology | |
| 367 | Road to Success | 2004.03.26 | National Changhua University of Education | |
| 368 | Information Hiding Techniques- Steganography | 2004.04.02 | Graduate Institute of Computer Science, National Chung Hsing University | |
| 369 | Cultivating a Correct View of Learning | 2004.04.02 | Graduate Institute of Computer Science, National Chung Hsing University | |
| 370 | Security Techniques and Applications for Electronic Commerce | 2004.05.06 | Department of Information Management, Tatung Institute of Commerce and Technology | |
| 371 | Information Hiding Techniques- Steganography | 2004.05.19 | Department of Computer Science, National Tsing Hua University | |
| 372 | Information Hiding Techniques- Steganography | 2004.05.28 | Department of Computer Science & Information Management, Providence University | |
| 373 | Information Security Techniques- Steganography | 2004.05.29 | Chang Gung University | |
| 374 | Cultivating a Correct View of Learning | 2004.06.04 | College of Science & Technology, National Chi Nan University | |
| 375 | Information Hiding Techniques | 2004.07.15 | National Security Bureau | |
| 376 | Hiding a Secret Image in a Cover Image | 2004.07.22 | Ewha Womans University, South Korea |