Local Journal Papers

*01. Chang, C. C., (1983): “On Cartesian Product Files,” Journal of Electrical Engineering, Vol. 26, No. 2, Apr. 1983, pp. 5-23.

02. Chang, C. C.  and  Lian L. S., (1984): “Toward the Strict Optimality Study of Generalized Disk Modulo Allocation Method,” Journal of Science and Engineering, NCHU, Vol. 21, Nov. 1984, pp. 157-172.

03. Chang, C. C.  and  Yuan, S. T., (1985): “Parallel Algorithms for the Matrix Multiplication Problem and the Transitive Closure Problem,” Journal of Science and Engineering, NCHU, Vol. 22, Nov. 1985, pp. 195-210.

04. Chang, C. C.  and  Liang, J., (1985): “Performance Analysis of a K-Nearest Neighbor Searching Technique,” Journal of the Chinese Institute of Engineers, Vol. 8, No. 2, 1985, pp. 157-169.

05. Chang, C. C.  and  Shen, J. J., (1985): “Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk Systems,” Journal of the Chinese Institute of Engineers, Vol. 8, No. 3, 1985, pp. 271-283.

06. Chang, C. C.  and  Shieh, J. C., (1985): “On the Design of Letter Oriented Minimal Perfect Hashing Functions,” Journal of the Chinese Institute of Engineers, Vol. 8, No. 3, 1985, pp. 285-297.

07. Chang, C. C.  and  Tsai, W. H., (1985): “Performance Analysis of Purely Random Allocation Scheme and Evenly Random Allocation Scheme,” Journal of Electrical Engineering, Vol. 28, No. 2, 1985, pp. 1-11.

08. Chang, C. C.  and  Hung, M. F., (1986): “A User Hierarchy Mechanism for Computer System Resources,” Journal of Science and Engineering, NCHU, Vol. 22, Nov. 1986, pp. 183-194.

09. Chang, C. C.  and  Chen, C. P., (1986): “A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem,” Journal of the Chinese Institute of Engineers, Vol. 9, No. 4, 1986, pp. 383-390.

10. Chang, C. C.  and  Chang, S. S, (1987): “Optimal Cartesian Product Files for Orthogonal Range Queries,” Journal of the Chinese Institute of Engineers, Vol. 10, No. 6, Nov. 1987, pp. 727-731.

11. Chang, C. C.  and  Su, D. H., (1987): “Performance Analysis of Multi-Attribute Files Based upon Multiple Key Hashing Functions and Haphazard Files,” Journal of the Chinese Institute of Engineers, Vol. 10, No. 1, 1987, pp. 99-105.

12. Jan, J. K., Chang, C. C. and Chen, C. Y., (1988): “A High-Speed Chinese Character Retrieving Algorithm Utilizing Phonetic Syllables,” Journal of Electrical Engineering, Vol. 31, No. 2, Apr. 1988, pp. 138-148.

*13. Chang, C. C., (1988): “Toward a Message-Guided Data Base Language,” Tunghai Journal, Vol. 29, June 1988, pp. 713-734.

14. Chang, C. C.  and  Lin, C. H., (1988): “A Cryptosystem for Secure Broadcasting,” Proceedings of National Science Council, Vol. 12, No. 4, July 1988, pp. 233-239.

15. Chang, C. C.  and  Liaw, H. T., (1988): “A Parallel Approach for Stable Marriage Problem,” Journal of Management Science, Vol. 5, No. 2, Dec. 1988, pp. 167-177.

16. Chang, C. C.  and  Wu, C. S., (1988): “The Study of a Secure Broadcasting Network System,” Journal of Electrical Engineering, Vol. 31, No. 6, Dec. 1988, pp. 398-403.

17. Chang, C. C.  and  Chang, S. S., (1988): “Correction to Optimal Cartesian Product Files for Orthogonal Range Queries,” Journal of the Chinese Institute of Engineers, Vol. 11, No. 3, May 1988, pp. 317-318.

18. Jan, J. K.  and  Chang, C. C., (1988): “Addressing for Letter-Oriented Keys,” Journal of the Chinese Institute of Engineers, Vol. 11, No. 3, May 1988, pp. 279-284.

19. Mong, I. H., Chang, C. C. and Chin, Y. H.,(1989): “Lempel-Ziv-Q Scheme :  A New Data Compression Method,” Journal of Electrical Engineering, Vol. 32, No. 1, Feb. 1989, pp. 37-44.

20. Chang, C. C., Lin, J. F. and Jan, J. K., (1989): “A Chinese Data Compression Scheme,” Journal of Computers, Vol. 2, No. 2, Summer 1989, pp. 1-9 (invited paper).

21. Chang, C. C.  and  Liaw, H. T., (1989): “A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control,” Journal of Electrical Engineering, Vol. 32, No. 3, June 1989, pp. 185-191.

22. Chang, C. C.  and  Liaw, H. T., (1989): “Sharing a Polynomial for Password Authentication,” Journal of Computers, Vol. 1, No. 4, Winter 1989, pp. 11-17 (invited paper).

23. Chang, C. C.  and  Chen, C. H., (1989): “Organizing Distributed Data Base for Parallel Searching,” Journal of the Chinese Institute of Engineers, Vol. 12, No. 2, May 1989, pp. 215-221.

24. Chang, C. C.  and  Wu, H. C., (1990): “A New Chinese Characters Retrieval Scheme Based upon Chinese Radical Spatial Relationships,” Journal of Electrical Engineering, Vol. 34, No. 2, Apr. 1990, pp. 93-98.

25. Chang, C. C.  and  Lin, J. C., (1990): “A Fast Spatial Match Accessing Scheme for Symbolic Pictures,” Journal of Electrical Engineering, Vol. 33, No. 3, June 1990, pp. 129-137.

26. Chang, C. C., Jan, J. K. and Lin, J. F., (1990): “A Chinese Syllables Compression Scheme Based upon Perfect Hashing,” Journal of Computers, Vol. 2, No. 3, Sep. 1990, pp. 1-17.

27. Chang, C. C.  and  Lin, J. F., (1990): “A New Approach of Automatic Identification to Chinese Seal Imprints with Square Shape,” Journal of Electrical Engineering, Vol. 33, No. 5, Oct. 1990, pp. 285-292.

28. Chang, C. C.  and  Wu, H. C., (1990): “A Module-Oriented Signature Extraction Method to Retrieve Symbolic Pictures,” Journal of Computers, Vol. 2, No. 4, Dec. 1990, pp. 1-10.

29. Lin, C. H., Chang, C. C. and Lee, R. C. T., (1991): “An Efficient Access Control Scheme for Files Protection,” Journal of the Chinese Institute of Engineers, Vol. 14, No. 3, May 1991, pp. 319-324.

30. Chang, C. C.  and  Tsai, W. H., (1991): “A Compression Scheme Based upon Lempel-Ziv Method for Chinese Texts,” Journal of Computers, Vol. 3, No. 2, June  1991, pp. 13-19.

31. Chang, C. C.  and  Chen, C. Y.,(1992): “A Dynamic Access Control Scheme Based upon Ziegler's Row Displacement Method,” Journal of Electrical Engineering, Vol. 35, No. 1, Feb. 1992, pp. 59-68.

32. Chang, C. C.  and  Chen, C. Y., (1992): “A Look-Ahead Digital Signature Scheme Based upon Linked Lists,” Journal of Electrical Engineering, Vol.35, No.2, Apr. 1992, pp. 115-122.

33. Chang, C. C.  and  Chen, Y. W., (1992): “Looking up Words in a Compressed Chinese - English Dictionary,” Journal of Electrical Engineering, Vol.35, No.2, Apr. 1992, pp. 145-154.

34. Chang, C. C., Buehrer, D. J., Hwang, S. J. and  Diay, J. Y.,(1992): “Sharing a Circular Storage for Multiple Stacks Operations,” Journal of the Chinese Institute of Engineers, Vol. 15, No. 2, Mar. 1992, pp. 115-121.

35. Chang, C. C.  and  Chen, C. Y., (1993): “A Fast Accessing Scheme to Retrieve Multi-Character Words,” Journal of Computers, Vol.5, No. 1, 1993, pp. 1-17.

36. Chang, C. C.  and  Wang, C. H., (1993): “A Modified Lempel-Ziv-Welch Encoding Scheme,” Journal of Computers, Vol. 5, No. 1, Apr. 1993, pp. 1-17.

37. Chang, C. C., Lee, W. B., Liao, W. Y. and Jiang, C. H., (1993): “An Identity-Based Cryptosystem Suitable for Smart Cards,” Journal of Computers, Vol. 5, No. 2, 1993, pp. 7-21.

38. Chang, C. C.  and  Tsai, W. H., (1994): “Two Locally Adaptive Data Compression Schemes for Chinese Phonetic Syllables,” Journal of Computers, Vol. 6, No. 1, Spring 1994, pp. 48-57.

39. Chang, C. C., Liou, F. Y. and Buehrer, D. J., (1994): “A Practical Database Encryption System,” Journal of Computers, Vol. 6, No. 3, 1994, pp. 20-25.

40. Chang, C. C., Wu, W. B. and Wu, T. C., (1995): “Cryptanalysis and Improvement on a Conference Key Distribution System,” Journal of the Chinese Institute of Engineers, Vol. 18, No. 3, May 1995, pp. 391-396.

41. Chen, C. Y., Chang, C. C. and Yang, W. P., (1995): “A New Subliminal Channel in RSA-Like Variant of the Fiat-Shamir Signature Scheme,” Journal of the Chinese Institute of Engineers, Vol. 18, No. 6, Nov. 1995, pp. 867-872.

42. Hwang, S. J., Chang, C. C. and Yang, W. P., (1995): “An Encryption/Signature Scheme with Low Message Expansion,” Journal of the Chinese Institute of Engineers, Vol. 18, No. 4, July 1995, pp. 591-595.

43. Chang, C. C.  and  Chou, J. S., (1995): “A Fast Codeword Searching Mechanism for Quantization Strategy,” Journal of Computers, Vol. 7, No. 3&4, Dec. 1995, pp. 10-16.

44. Chang, C. C.  and  Lee, C. F., (1996): “A Greedy Relaxed Generalized Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems,” Journal of the Chinese Institute of Engineers, Vol. 19, No. 2, Mar. 1996, pp. 155-169.

45. Chang, C. C.  and  Leu, J. J., (1996): “The Performance Analysis of Bloom and Random Filters,” Journal of the Chinese Institute of Engineers, Vol. 19, No. 4, July 1996, pp. 451-458.

46.   Chang, C. C.  and  Lin, C. H., (1996): “A Generalized Secure Broadcasting Cryptosystem,” Journal of Computers, Vol. 8, No. 4, Dec. 1996, pp. 13-18.

47.   Chang, C. C.  and  Lee, C. F., (1998): “A Two-level Signature File Based on a Block-oriented Data Model for Spatial Match Retrieval,” Journal of the Chinese Institute of Engineers, Vol. 21, No. 4, 1998, pp. 467-478.

48. Chang, C. C. and Tsu, S. M., (2000): “An Improvement on Shimada’s Public-key Cryptosystem,” Tamkang Journal of Science and Engineering, Vol. 3, No. 2, 2000, pp. 75-80.

49.  Buehrer, D. J., Lu, C. S. and Chang, C. C., (2000): “A Shape Recognition Scheme Based on Real-valued Boundary Points,” Tamkang Journal of Science and Engineering, Vol. 3, No. 1, 2000, pp. 55-74. (Invited paper)

50. Jan, J. K., Lee, J. C., Lin, C. H. and Chang, C. C., (2000): “Reducing Space for Storing Keys in a Single Key Access Control System,” Tankang Journal of Science and Engineering, Vol. 3, No. 4, 2000, pp. 229-242.

51.   Wu, T. C., Lin, T. Y. and Chang, C. C., (2002): “Modifications of Elgamal’s Cryptoscheme with/without One-Way Hash Function,” Journal of the Chinese Institute of Electronical Engineering, Vol. 9, No. 1, 2002, pp. 55-58.

52.   Chang, C. C. and Hwang, K. F., (2002): “An Information Hiding Technique for Halftone Images Based on Human Visual Effects,” Journal of China Institute of Communications, Vol. 23, No. 5, 2002, pp.9-17.

53.   Chang, C. C., Chan, C. S. and Hsiao, J. Y., (2001): “Sharing a Secret Image in a Sequence of Linear Ordered Images,” Communications of the CCISA, Vol. 8, No. 1, Dec. 2001, pp. 93-103.

54.   Chang, C. C. and Pan, Y. P, (2002): “An IC Card Based Remote Password Authentication Mechanism,” Communications of IICM, Vol. 5, No. 1, March 2002, pp.1-8.