*01. Chang, C. C., (1983): “On Cartesian Product Files,” Journal of Electrical Engineering, Vol. 26, No. 2, Apr. 1983, pp. 5-23.
02. Chang, C. C. and Lian L. S., (1984): “Toward the Strict Optimality Study of Generalized Disk Modulo Allocation Method,” Journal of Science and Engineering, NCHU, Vol. 21, Nov. 1984, pp. 157-172.
03. Chang, C. C. and Yuan, S. T., (1985): “Parallel Algorithms for the Matrix Multiplication Problem and the Transitive Closure Problem,” Journal of Science and Engineering, NCHU, Vol. 22, Nov. 1985, pp. 195-210.
04. Chang, C. C. and Liang, J., (1985): “Performance Analysis of a K-Nearest Neighbor Searching Technique,” Journal of the Chinese Institute of Engineers, Vol. 8, No. 2, 1985, pp. 157-169.
05. Chang, C. C. and Shen, J. J., (1985): “Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk Systems,” Journal of the Chinese Institute of Engineers, Vol. 8, No. 3, 1985, pp. 271-283.
06. Chang, C. C. and Shieh, J. C., (1985): “On the Design of Letter Oriented Minimal Perfect Hashing Functions,” Journal of the Chinese Institute of Engineers, Vol. 8, No. 3, 1985, pp. 285-297.
07. Chang, C. C. and Tsai, W. H., (1985): “Performance Analysis of Purely Random Allocation Scheme and Evenly Random Allocation Scheme,” Journal of Electrical Engineering, Vol. 28, No. 2, 1985, pp. 1-11.
08. Chang, C. C. and Hung, M. F., (1986): “A User Hierarchy Mechanism for Computer System Resources,” Journal of Science and Engineering, NCHU, Vol. 22, Nov. 1986, pp. 183-194.
09. Chang, C. C. and Chen, C. P., (1986): “A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem,” Journal of the Chinese Institute of Engineers, Vol. 9, No. 4, 1986, pp. 383-390.
10. Chang, C. C. and Chang, S. S, (1987): “Optimal Cartesian Product Files for Orthogonal Range Queries,” Journal of the Chinese Institute of Engineers, Vol. 10, No. 6, Nov. 1987, pp. 727-731.
11. Chang, C. C. and Su, D. H., (1987): “Performance Analysis of Multi-Attribute Files Based upon Multiple Key Hashing Functions and Haphazard Files,” Journal of the Chinese Institute of Engineers, Vol. 10, No. 1, 1987, pp. 99-105.
12. Jan, J. K., Chang, C. C. and Chen, C. Y., (1988): “A High-Speed Chinese Character Retrieving Algorithm Utilizing Phonetic Syllables,” Journal of Electrical Engineering, Vol. 31, No. 2, Apr. 1988, pp. 138-148.
*13. Chang, C. C., (1988): “Toward a Message-Guided Data Base Language,” Tunghai Journal, Vol. 29, June 1988, pp. 713-734.
14. Chang, C. C. and Lin, C. H., (1988): “A Cryptosystem for Secure Broadcasting,” Proceedings of National Science Council, Vol. 12, No. 4, July 1988, pp. 233-239.
15. Chang, C. C. and Liaw, H. T., (1988): “A Parallel Approach for Stable Marriage Problem,” Journal of Management Science, Vol. 5, No. 2, Dec. 1988, pp. 167-177.
16. Chang, C. C. and Wu, C. S., (1988): “The Study of a Secure Broadcasting Network System,” Journal of Electrical Engineering, Vol. 31, No. 6, Dec. 1988, pp. 398-403.
17. Chang, C. C. and Chang, S. S., (1988): “Correction to Optimal Cartesian Product Files for Orthogonal Range Queries,” Journal of the Chinese Institute of Engineers, Vol. 11, No. 3, May 1988, pp. 317-318.
18. Jan, J. K. and Chang, C. C., (1988): “Addressing for Letter-Oriented Keys,” Journal of the Chinese Institute of Engineers, Vol. 11, No. 3, May 1988, pp. 279-284.
19. Mong, I. H., Chang, C. C. and Chin, Y. H.,(1989): “Lempel-Ziv-Q Scheme : A New Data Compression Method,” Journal of Electrical Engineering, Vol. 32, No. 1, Feb. 1989, pp. 37-44.
20. Chang, C. C., Lin, J. F. and Jan, J. K., (1989): “A Chinese Data Compression Scheme,” Journal of Computers, Vol. 2, No. 2, Summer 1989, pp. 1-9 (invited paper).
21. Chang, C. C. and Liaw, H. T., (1989): “A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control,” Journal of Electrical Engineering, Vol. 32, No. 3, June 1989, pp. 185-191.
22. Chang, C. C. and Liaw, H. T., (1989): “Sharing a Polynomial for Password Authentication,” Journal of Computers, Vol. 1, No. 4, Winter 1989, pp. 11-17 (invited paper).
23. Chang, C. C. and Chen, C. H., (1989): “Organizing Distributed Data Base for Parallel Searching,” Journal of the Chinese Institute of Engineers, Vol. 12, No. 2, May 1989, pp. 215-221.
24. Chang, C. C. and Wu, H. C., (1990): “A New Chinese Characters Retrieval Scheme Based upon Chinese Radical Spatial Relationships,” Journal of Electrical Engineering, Vol. 34, No. 2, Apr. 1990, pp. 93-98.
25. Chang, C. C. and Lin, J. C., (1990): “A Fast Spatial Match Accessing Scheme for Symbolic Pictures,” Journal of Electrical Engineering, Vol. 33, No. 3, June 1990, pp. 129-137.
26. Chang, C. C., Jan, J. K. and Lin, J. F., (1990): “A Chinese Syllables Compression Scheme Based upon Perfect Hashing,” Journal of Computers, Vol. 2, No. 3, Sep. 1990, pp. 1-17.
27. Chang, C. C. and Lin, J. F., (1990): “A New Approach of Automatic Identification to Chinese Seal Imprints with Square Shape,” Journal of Electrical Engineering, Vol. 33, No. 5, Oct. 1990, pp. 285-292.
28. Chang, C. C. and Wu, H. C., (1990): “A Module-Oriented Signature Extraction Method to Retrieve Symbolic Pictures,” Journal of Computers, Vol. 2, No. 4, Dec. 1990, pp. 1-10.
29. Lin, C. H., Chang, C. C. and Lee, R. C. T., (1991): “An Efficient Access Control Scheme for Files Protection,” Journal of the Chinese Institute of Engineers, Vol. 14, No. 3, May 1991, pp. 319-324.
30. Chang, C. C. and Tsai, W. H., (1991): “A Compression Scheme Based upon Lempel-Ziv Method for Chinese Texts,” Journal of Computers, Vol. 3, No. 2, June 1991, pp. 13-19.
31. Chang, C. C. and Chen, C. Y.,(1992): “A Dynamic Access Control Scheme Based upon Ziegler's Row Displacement Method,” Journal of Electrical Engineering, Vol. 35, No. 1, Feb. 1992, pp. 59-68.
32. Chang, C. C. and Chen, C. Y., (1992): “A Look-Ahead Digital Signature Scheme Based upon Linked Lists,” Journal of Electrical Engineering, Vol.35, No.2, Apr. 1992, pp. 115-122.
33. Chang, C. C. and Chen, Y. W., (1992): “Looking up Words in a Compressed Chinese - English Dictionary,” Journal of Electrical Engineering, Vol.35, No.2, Apr. 1992, pp. 145-154.
34. Chang, C. C., Buehrer, D. J., Hwang, S. J. and Diay, J. Y.,(1992): “Sharing a Circular Storage for Multiple Stacks Operations,” Journal of the Chinese Institute of Engineers, Vol. 15, No. 2, Mar. 1992, pp. 115-121.
35. Chang, C. C. and Chen, C. Y., (1993): “A Fast Accessing Scheme to Retrieve Multi-Character Words,” Journal of Computers, Vol.5, No. 1, 1993, pp. 1-17.
36. Chang, C. C. and Wang, C. H., (1993): “A Modified Lempel-Ziv-Welch Encoding Scheme,” Journal of Computers, Vol. 5, No. 1, Apr. 1993, pp. 1-17.
37. Chang, C. C., Lee, W. B., Liao, W. Y. and Jiang, C. H., (1993): “An Identity-Based Cryptosystem Suitable for Smart Cards,” Journal of Computers, Vol. 5, No. 2, 1993, pp. 7-21.
38. Chang, C. C. and Tsai, W. H., (1994): “Two Locally Adaptive Data Compression Schemes for Chinese Phonetic Syllables,” Journal of Computers, Vol. 6, No. 1, Spring 1994, pp. 48-57.
39. Chang, C. C., Liou, F. Y. and Buehrer, D. J., (1994): “A Practical Database Encryption System,” Journal of Computers, Vol. 6, No. 3, 1994, pp. 20-25.
40. Chang, C. C., Wu, W. B. and Wu, T. C., (1995): “Cryptanalysis and Improvement on a Conference Key Distribution System,” Journal of the Chinese Institute of Engineers, Vol. 18, No. 3, May 1995, pp. 391-396.
41. Chen, C. Y., Chang, C. C. and Yang, W. P., (1995): “A New Subliminal Channel in RSA-Like Variant of the Fiat-Shamir Signature Scheme,” Journal of the Chinese Institute of Engineers, Vol. 18, No. 6, Nov. 1995, pp. 867-872.
42. Hwang, S. J., Chang, C. C. and Yang, W. P., (1995): “An Encryption/Signature Scheme with Low Message Expansion,” Journal of the Chinese Institute of Engineers, Vol. 18, No. 4, July 1995, pp. 591-595.
43. Chang, C. C. and Chou, J. S., (1995): “A Fast Codeword Searching Mechanism for Quantization Strategy,” Journal of Computers, Vol. 7, No. 3&4, Dec. 1995, pp. 10-16.
44. Chang, C. C. and Lee, C. F., (1996): “A Greedy Relaxed Generalized Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems,” Journal of the Chinese Institute of Engineers, Vol. 19, No. 2, Mar. 1996, pp. 155-169.
45. Chang, C. C. and Leu, J. J., (1996): “The Performance Analysis of Bloom and Random Filters,” Journal of the Chinese Institute of Engineers, Vol. 19, No. 4, July 1996, pp. 451-458.
46. Chang, C. C. and Lin, C. H., (1996): “A Generalized Secure Broadcasting Cryptosystem,” Journal of Computers, Vol. 8, No. 4, Dec. 1996, pp. 13-18.
47. Chang, C. C. and Lee, C. F., (1998): “A Two-level Signature File Based on a Block-oriented Data Model for Spatial Match Retrieval,” Journal of the Chinese Institute of Engineers, Vol. 21, No. 4, 1998, pp. 467-478.
48. Chang, C. C. and Tsu, S. M., (2000): “An Improvement on Shimada’s Public-key Cryptosystem,” Tamkang Journal of Science and Engineering, Vol. 3, No. 2, 2000, pp. 75-80.
49. Buehrer, D. J., Lu, C. S. and Chang, C. C., (2000): “A Shape Recognition Scheme Based on Real-valued Boundary Points,” Tamkang Journal of Science and Engineering, Vol. 3, No. 1, 2000, pp. 55-74. (Invited paper)
50. Jan, J. K., Lee, J. C., Lin, C. H. and Chang, C. C., (2000): “Reducing Space for Storing Keys in a Single Key Access Control System,” Tankang Journal of Science and Engineering, Vol. 3, No. 4, 2000, pp. 229-242.
51. Wu, T. C., Lin, T. Y. and Chang, C. C., (2002): “Modifications of Elgamal’s Cryptoscheme with/without One-Way Hash Function,” Journal of the Chinese Institute of Electronical Engineering, Vol. 9, No. 1, 2002, pp. 55-58.
52. Chang, C. C. and Hwang, K. F., (2002): “An Information Hiding Technique for Halftone Images Based on Human Visual Effects,” Journal of China Institute of Communications, Vol. 23, No. 5, 2002, pp.9-17.
53. Chang, C. C., Chan, C. S. and Hsiao, J. Y., (2001): “Sharing a Secret Image in a Sequence of Linear Ordered Images,” Communications of the CCISA, Vol. 8, No. 1, Dec. 2001, pp. 93-103.
54. Chang, C. C. and Pan, Y. P, (2002): “An IC Card Based Remote Password Authentication Mechanism,” Communications of IICM, Vol. 5, No. 1, March 2002, pp.1-8.