International Conference Papers

01. Chang, C. C., Lee, R. C. T. and Du, H. C., (1980): “Some Properties of Cartesian Product Files,” Proceedings of the ACM SIGMOD 1980 Conference, Santa Monica, Calif., U.S.A., May 1980, pp. 157-168.

02. Chang, C. C. and Su, D. H., (1983): “Some Properties of Multi-Attribute File Systems Based upon Multiple Key Hashing Functions,” Proceedings of 21th Allerton Conference on Communication, Control and Computing, Urbana, IL., U.S.A., Oct. 1983, pp. 675-682.

*03. Chang, C. C., (1984): “Optimal Partial Match Retrieval when the Number of Buckets is a Power of Prime,” Proceedings of the ICS 1984, Taipei, Taiwan, Dec. 1984, pp. 807-813.

04. Chang, C. C. and Su, D. H., (1984): “Optimal Attribute Length Assignment when Attributes are Independently Specified,” Proceedings of the ICS 1984, Taipei, Taiwan, Dec 1984, pp. 814-820.

*05. Chang, C. C., (1985): “Data Base Research and Development in Taiwan,” Proceedings of the International Conference on Foundations of Data Organization, Kyoto, Japan, May 1985, pp. 413-414 (invited pannel paper).

06. Chang, C. C. and Shieh, J. C., (1985): “A Fast Algorithm for Constructing Reciprocal Hashing Functions,” Proceedings of International Symposium on New Directions in Computing, IEEE, Trondheim, Norway, Aug. 1985, pp. 232-236.

07. Chang, C. C. and Lin, C. H., (1986): “On the Difficulty of Construction Perfect Hashing Functions,” Proceedings of 1986 IEEE International Symposium on Information Theory, Kobe, Japan, June 1986.

08. Fang, M. T., Lee, R. C. T. and Chang, C. C., (1986): “The Idea of De-Clustering and Its Applications,” Proceedings of 12th International Conference on Very Large Data Bases, Kyoto, Japan, Aug. 1986, pp. 181-188.

09. Chang, C. C., Hsiao, M. D. and Lin, C. H., (1986): “Algorithms to Allocate a File for Concurrent Disk Accessing,” Proceedings of 6th Advanced Database System Symposium, Tokyo, Japan, Aug. 1986, pp. 201-205.

10. Chang, C. C. and Hung, M. F., (1986): “An Access Control Mechanism for Information Protection System,” Proceedings of the ICS 1986, Tainan, Taiwan, Dec. 1986, pp. 758-762.

*11. Chang, C. C., (1986): “Optimal Cartesian Product File Systems when the Bucket Size is a Power of Prime,” Proceedings of the ICS 1986, Tainan, Taiwan, Dec. 1986, pp. 763-769.

12. Chang, C. C. and Chang, C. H., (1986): “Single-Parametered Reciprocal Hashing Scheme,” Proceedings of the ICS 1986, Tainan, Taiwan, Dec. 1986, pp. 754-757.

13. Chang, C. C. and Shieh, J. C., (1986): “On the Design of Ordered Minimal Perfect Hashing Functions,” Proceedings of 2nd International Conference on Data Engineering, IEEE, Los Angeles, U. S. A., Feb. 1986, pp. 112-115.

14. Chang, C. C. and Chen, C. Y., (1986): “Lower Bounds of Using Disk Modulo Allocation Method to Allocate Cartesian Product Files in a Two-Disk System,” Proceedings of the ICS 1986, Tainan, Taiwan, Dec. 1986, pp. 770-774.

*15. Chang, C. C., (1987): “On the Implementation of User Hierarchy Structure in Information Systems,” Proceedings of International Conference on Computer Software and Applications, IEEE, Tokyo, Japan, Oct. 1987, pp. 412-415.

16. Chang, C. C. and Shen, S. D., (1988): “FORMOSA: A Chinese Visual Programming Language,” Proceedings of 1988 International Conference on Computer Processing of Chinese and Oriental Languages, Toronto, Canada, Aug. 1988, pp. 275-279.

17. Shen, S. D., Wang, C. T. and Chang, C. C., (1988): “On the Design of a Structure Assembly Language Tutor in Chinese,” Proceedings of 1988 International Conference on Computer Processing of Chinese and Oriental Languages, Toronto, Canada, Aug. 1988, pp. 600-607.

18. Chang, C. C., Jan, J. K. and Hsiao, J. Y., (1988): “Near-Matching-Patterns in Chinese Textual Files,” Proceedings of 1988 International Conference on Computer Proceedings of Chinese and Oriental Languages, Toronto, Canada, Aug. 1988, pp. 382-386.

19. Chang, C. C. and Chang, C. H., (1988): “An Access Control Mechanism with Single Key,” Proceedings of International Symposium on Mini and Microcomputers, Florida, U. S. A., Dec. 1988, pp. 181-183.

20. Chang, C. C. and Lin, C. H., (1988): “An Information Secure Broadcasting Scheme Based upon Galois Field Algebra,” Proceedings of International Symposium on Mini and Microcomputers, Florida, U. S. A., Dec. 1988, pp. 184-186.

21. Liang, J., Chang, C. C. and Lee, R. C. T., (1988): “On the Design of Multiple Key Hashing Files for Orthogonal Range Retrieval,” Proceedings of International Computer Science Conference 1988, Hong Kong, Dec. 1988, pp. 434-438.

22. Chang, C. C., Jan, J. K. and Hsiao, J. Y., (1988): “A Pattern Matching Mechanism Based upon Predictive Functions,” Proceedings of International Computer Science Conference 1988, Hong Kong, Dec. 1988, pp. 522-526.

23. Wu, T. C. and Chang, C. C., (1988): “An Authentication Scheme in Computer Networks Based upon Euclidean Geometry,” Proceedings of the ICS 1988, Taipei, Taiwan, Dec. 1988, pp. 1498-1502.

24. Lin, H. F., Hu, C. Y., Chang, C. C. and Chen, C. Y., (1988): “Sharing a Secret Using RSA Cryptosystem,” Proceedings of the ICS 1988, Taipei, Taiwan, Dec. 1988, pp. 1490-1493.

25. Chen, C. Y. and Chang, C. C., (1988): “On the Design of Bucket Address Hashing Files for Concurrent Information Retrieval Among Two Disks,” Proceedings of the ICS 1988, Taipei, Taiwan, Dec. 1988, pp. 89-93.

26. Chang, C. C., Chen, C. Y. and Chan, C. W., (1988): “On the Attribute Based Domains Design Problem for Orthogonal Range Retrieval,” Proceedings of the ICS 1988, Taipei, Taiwan, Dec. 1988, pp. 1233-1238.

27. Chang, C. C. and Leu, D. F., (1989): “Multi-key Sorting as a File Organization Scheme when Queries Are Not Equally Likely,” Proceedings of International Symposium on Database Systems for Advanced Application, Seoul, Korea, Apr. 1989, pp. 219-224.

28. Chou, Y. H., Yang, W. P. and Chang, C. C., (1989): “Greedy File A New Data Organization Concept for Partial Match Retrieval,” Proceedings of International Conference on Computer Software and Applications, Orlando, Florida, U.S.A., Sep. 1989, pp. 263-270.

29. Chang, C. C. and Shieh, J. C., (1989): “Pairwise Relatively Prime Generating Polynomials and Their Applications,” Proceedings of International Workshop on Discrete Algorithms and Complexity, Kyushu, Japan, Nov. 1989, pp. 137-140.

30.   Jan, J. K. and Chang, C. C., (1989): “Toward the Compression of Chinese Phonetic Textual Files,” Proceedings of 1989 International Conference on Computer Processing of Chinese and Oriental Languages, Changsha, Hunan, China, 1989, pp. 393-397.

31.   Chang, C. C., Chow, L. C. and Shen, S. D., (1989): “VICE-FORTRAN: A Visual Chinese Form Translator,” Proceedings of 1989 International Conference on Computer Processing of Chinese and Oriental Languages, Changsha, Hunan, China, 1989, pp. 405-411.

32.   Chang, C. C. and Chang, C. H., (1989): “A Single Key User Hierarchic Representation Mechanism,” Proceedings of International Workshop on Discrete Algorithms and Complexity, Kyushu, Japan, Nov. 1989, pp. 145-148.

33.   Chang, C. C. and Wu, T. C., (1990): “A Password Authentication Scheme without Verification Tables,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 202-204.

34. Chang, C. C. and Wu, T. C. (1990): “The Study of an Irregular Triangular Mesh Generator,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp. 228-233.

35. Chen, C. Y., Chang, C. C. and Lee, R. C. T., (1990): “Some File Organizations by the MMI Method for Orthogonal Range Retrieval,” Proceedings of International Symposium on Applied Informatics, Innsbruck, Austria, Feb. 1990, pp.337-341.

36.   Liang, J., Chang, C. C., Lee, R. C. T. and Wang, J. H., (1990): “Solving the File Design Problem with Neural Networks,” Proceedings of IEEE 10th International Phoenix Conference on Computers and Communications, Arizona, U.S.A., Mar. 1990, pp. 52-59.

37.   Chang, C. C. and Wu, L. H., (1990): “A Password Authentication Scheme Based upon Rabin's Public-key Cryptosystem,” Proceedings of International Conference on Systems Management '90, Hong Kong, June 1990, pp. 425-429.

38. Buehrer, D. J. and Chang, C. C., (1990): “An O(N*M*T) Spatial Match Retrieval Algorithm,” Proceedings of the ICS 1990, Hsinchu, Taiwan, Dec. 1990, pp. 152-158.

39. Chang, C. C. and Wu, T. C., (1990): “A Binary Implementation of Single-Key-Lock Scheme for Dynamic Access Control,” Proceedings of the ICS 1990, Hsinchu, Taiwan, Dec. 1990, pp. 321-327.

*40. Chang, C. C., (1991): “Recent Developments of Access Control Techniques,” Proceedings of the Second International Conference on Computing in Southern Africa, Blantyre, Malawi, Apr. 1991, pp. 129-136.

41. Chang, C. C., Jan, J. K. and Chen, D. C., (1991): “A Coding Scheme Based upon Modified Arithmetic Codes Suitable for Binary Search,” Proceedings of the Second International Conference on Computing in Southern Africa, Blantyre, Malawi, Apr. 1991, pp.59-68.

42. Yeh, Y. S., Wu, T. C. and Chang, C. C., (1991): “A New Cryptosystem Using Matrix Transformation,” Proceedings of IEEE International Canahan Conference on Security Technology, Taipei, Taiwan, Oct. 1991, pp. 131-138.

43. Yeh, Y. S., Wu, T. C. and Chang, C. C., (1991): “A Private Key Cryptosystem Based upon Enforced Random Substitution,” Proceedings of IEEE International Canahan Conference on Security Technology, Taipei, Taiwan, Oct. 1991, pp. 319-324.

44. Chang, C. C. and Hwang, S. J., (1991): “Cryptographic Authentication of Passwords,” Proceedings of IEEE International Canahan Conference on Security Technology, Taipei, Taiwan, Oct. 1991, pp. 126-130.

45. Chang, C. C. and Lin, C. H., (1991): “An ID-Based Signature Scheme Based upon Rabin's Public Key Cryptosystem,” Proceedings of IEEE International Canahan Conference on Security Technology, Taipei, Taiwan, Oct. 1991, pp. 139-141.

46. Chang, C. C. and Hwang, R. J., (1991): “A Strategy to Transform Public Key Cryptosystems to ID-Based Public Key Cryptosystems,” Proceedings of IEEE International Canahan Conference on Security Technology, Taipei, Taiwan, Oct. 1991, pp. 68-72.

47. Buehrer, D. J. and Chang, C. C., (1991): “A Cryptographic Mechanism for Sharing Databases,” Proceedings of International Conference on Information & Systems, Hangzhou, China, 1991, pp. 1039-1045.

48. Chang, C. C., Hwang, S. J. and Buehrer, D. J., (1991): “On the Design of Image Databases for Concurrent Spatial Match Retrieval,” Proceedings of International Conference on Information & Systems, Hangzhou, China, 1991, pp. 1034-1038.

49. Chang, C. C., Wu, T. C. and Yeh, Y. S., (1992): “On the Design of a Secure Broadcasting Cryptosystem,” Proceedings of International Conference on Microwaves and Communications, Nanjing, China, July 1992, pp. 216-221.

50. Chang, C. C., Hsieh, C. C. and Lu, Y. L., (1992): “A Doubly Modular Hashing Scheme for Letter-oriented Keywords,” Proceedings of SEARCC '92, Malaysia, Aug. 1992, pp. 51.01-51.15.

51. Chang, C. C. and Buehrer, D. J., (1992): “A Database Sharing Scheme Based upon Galois Field Algebra,” Proceedings of SEARCC '92, Malaysia, Aug. 1992, pp. 52.08-52.14.

52. Wu, H. C. and Chang, C. C., (1992): “A Fast Chinese Words Accessing Scheme,” Proceedings of 3rd International Conference in Chinese Information Processing, Beijing, China, Oct. 1992, pp. 13-19.

53. Chang, C. C., Hwang, R. J. and Wu, T. C., (1992): “A Cryptographic Key Management Scheme for Access Control in a Tree Structure,” Proceedings of ICS 1992, Taichung, Taiwan, Dec. 1992, pp. 174-178.

54. Chang, C. C. and Hwang, S. J., (1992): “Sharing a Dynamic Secret,” Proceedings of the International Phoenix Conference on Computers and Communications, Arizona, U. S. A., 1992, pp. 267-271.

55. Chang, C. C., Hwang, R. J. and Hwang, S. J., (1992): “The Study of a Data Compression Scheme for English - Chinese Dictionaries,” Proceedings of 3rd International Conference on Chinese Information Processing, Beijing, China, 1992, pp. 142-151.

56. Chang, C. C., Hwang, R. J. and Buehrer, D. J., (1993): “Using Smart Card to Authenticate Passwords, Proceedings of 27th Annual IEEE International Carnahan Conference on Security Technology, Ottawa, Canada, Oct. 1993, pp. 19-21.

57. Chang, C. C., Jiang, J. H. and Shen, J. J., (1993): “Organization of Pictorial Databases for Spatial Match Retrieval,” Proceedings of International Symposium on Next Generation Database Systems and Their Applications, Fukuoka, Japan, Sep. 1993, pp. 205-210 (invited paper).

58. Chang, C. C. and Wu, T. C., (1993): “Authenticating Passwords with Smart Cards,” Proceedings of Information Science '93, Taejon, Korea, Oct. 1993, pp. 559-564.

59. Chang, C. C. and Buehrer, D. J., (1993): “Transmitting Multiple Secrets Securely in Broadcasting Networks,” Proceedings of 27th Annual IEEE International Carnahan Conference on Security Technology, Ottawa, Canada, 1993, pp. 19-21.

*60. Chang, C. C., (1994): “A Fast Retrieving Algorithm for Similar Chinese Characters,” Proceedings of 1994 International Conference on Computer Processing of Oriental Languages, Taejon, Korea, May 1994, pp. 407-411.

61. Chang, C. C. and Jiang, J. H., (1994): “A Fast Spatial Match Retrieval Using a Superimposed Coding Technique,” Proceedings of the International Symposium on Advanced Database Technologies and Their Integration, Nara, Japan, Oct. 1994, pp. 71-78.

62.   Chen, C. Y., Chang, C. C. and Lee, R. C. T., (1994): “A Line Segment Intersection Based Temporal Join,” Proceedings of the International Symposium on Advanced Database Technologies and Their Integration, Nara, Japan, Oct. 1994, pp. 183-187.

63.   Chen, C. Y., Chang, C. C. and Yang, W. P., (1994): “New Signature with Message Recovery Against Forgery,” Proceedings of International Computer Symposium 1994, Hsinchu, Taiwan, Dec. 1994, pp. 293-296.

64.Hwang, S. J., Chang, C. C. and Yang, W. P., (1994): “A New Verification Mechanism on the Server-Aided Secret Computation Protocols for the Modular Exponentiation,” Proceedings of International Computer Symposium 1994, Hsinchu, Taiwan, Dec. 1994, pp. 445-450.

65. Lee, W. B. and Chang, C. C., (1995): “Authenticate Yourself by Login a Remote Password,” Proceedings of the Cryptography-Policy and Algorithms Conference, Brisbane, Australia, July 1995, pp. 149-162.

66. Chen, C. Y., Chang, C. C. and Yang, W. P., (1995): “A λ(p-1) Method of Factoring RSA's Modulous,” Proceedings of the Cryptography-Policy and Algorithms Conference, Brisbane, Australia, July 1995, pp. 225-231.

67. Chang, C. C. and Lin, D. C., (1995): “A Fast and Flexible Algorithm to Retrieve Similar Chinese Characters,” Proceedings of the International Conference on Computer Processing of Oriental Languages, Hawaii, U.S.A., Nov. 1995, pp. 279-285.

68. Chen, C. Y., Chang, C. C. and Lee, R. C. T., (1996): “A Temporal Join Algorithm Based on Rank Key-to-Address Transformation,” Proceedings of the International Conference on Distributed System, Software Engineering and Database Systems, Kaohsiung, Taiwan, Dec. 1996, pp. 169-176.    

69. Hwang, S. J. and Chang, C. C., (1996): “A Dynamic Secret Sharing with Cheater Detection,” Proceedings of the Australian Conference on Information Security and Privacy, Sydney, Australia, June 1996, pp. 38-48

70. Chen, C. Y., Chang, C. C., Lee, R. C. T. and Lin, D. C., (1996): “Optimal Linear Hashing Files for Orthogonal Range Retrieval,” Proceedings of 20th International Conference on Computer Software and Applications, Seoul, Korea, Aug. 1996, pp. 406-413.

71. Chan, Y. K. and Chang, C. C., (1996): “Image Retrieval by String-Mapping,” Proceedings of the International Symposium on Combinatorics and Applications, Tianjin, China, June 1996, pp. 65-76.

72. Chang, C. C. and Lin, C. H., (1996): “How to Converse Securely in a Conference,” Proceedings of 30th Annual IEEE International Carnahan Conference on Security Technology, Kentucky, U. S. A., Oct. 1996, pp. 42-45.

73. Chen, C. Y., Chang, C. C. and Yang, W. P., (1996): “Fast RSA-type Cryptoschemes Based on Pell Equations over Z*N,” Proceedings of the International Conference on Cryptology and Information Security, Kaohsiung, Taiwan, Dec. 1996, pp. 1-5.

74. Hwang, S. J., Chang, C. C. and Yang, W. P., (1996): “A Key Distribution Protocol for Mobile Communication Systems with Untrusted Centers,” Proceedings of the International Conference on Cryptology and Information Security, Kaohsiung, Taiwan, Dec. 1996, pp. 67-74.

75. Chang, C. C. and Lee, T. F., (1996): “A Generalized Non-redundant 2D String Representation for Symbolic Pictures,” Proceedings of the International Conference on Distributed System, Software Engineering and Database Systems, Kaohsiung, Taiwan, Dec. 1996, pp. 41-45.

76. Chen, C. Y., Chang, C. C. and Yang, W. P., (1996): “Cryptanalysis of Short Secret Exponent and Large Public Exponent of RSA,” Proceedings of the International Conference on Cryptology and Information Security, Kaohsiung, Taiwan, Dec. 1996, pp. 14-18.

77. Hwang, T., Lee, N. Y. and Chang, C. C., (1996): “On the Security of Chang et al.'s Cryptographic Key Assignment Scheme for Access Control in a Hierarchy,” Proceedings of the International Conference on Cryptology and Information Security, Kaohsiung, Taiwan, Dec. 1996, pp. 75-81.

78. Hwang, R. J. and Chang, C. C., (1997): “The Security Analysis of Low-Computation Blind Signature Schemes Based on Quadratic Residues,” Proceedings of the 1997 International Conference on Computer Systems Technology for Industrial Applications, Hsinchu, Taiwan, Apr. 1997, pp. 221-225.

79.   Chang, C. C. and Lee, C. F., (1997): “Retrieving Chinese Characters Using DAYI Chinese Input Method,” Proceedings of 17th International Conference on Computer Processing of Oriental Languages, Hong Kong, Apr. 1997, pp. 387-391.

80.   Chang, C. C., Lin, T. H. and Hwang, R. J., (1997): “A Secure Group-oriented Secret Sharing Scheme,” Proceedings of the 1997 International Conference on Computer Systems Technology for Industrial Applications, Hsinchu, Taiwan, Apr. 1997, pp. 214-220.

81.   Chen, C. Y., Lee, W. B. and Chang, C. C., (1998): “A Software Key Escrow System Suitable for Broadcasting,” Proceedings of the 1998 ICS Workshop on Cryptology and Information Security, Tainan, Taiwan, R.O.C., Dec. 1998, pp. 155-158.

82.   Chan, Y. K. and Chang, C. C., (1998): “An Efficient Data Structure for Storing Similar Binary Images,” Proceedings of 5th International Conference on Fundations of Data Organization, Kobe, Japan, Nov. 1998, pp. 268-275.

83.   Shen, J. J. and Chang, C. C., (1998): “A False-Drop-Free Spelling Check Technique of Mandarin Phonetic Transcriptions for Chinese Characters,” Proceedings of 1998 International Conference on Chinese Information Processing, Beijing, China, Nov. 1998, pp. 398-405.

84.   Chang, C. C., Jau, C. C. and Chen, T. S, (1998): “Chinese Calligraphy Compression Using New S-tree Structure,” Proceedings of 1998 International Conference on Chinese Information Processing, Beijing, China, Nov. 1998, pp. 38-47.

85.   Chen, C. Y., Chang, C. C. and Yang, W. P., (1998): “A New Multilevel Database Field Encryption and Authentication Cryptosystem,” Proceedings of the 1998 ICS Workshop on Cryptology and Information Security, Tainan, Taiwan, R.O.C., Dec. 1998, pp. 29-35.

86.   Chang, C. C. and Hong, K. L. (1998): “Signature- Based Chinese Character Retrieval Schemes Using DAYI Input Method,” Proceedings of the 1998 ICS Workshop on Software Engineering and Database System, Dec. 1998, Tainan, Taiwan, R.O.C., Dec. 1998, pp. 109-114.

87.   Chang, C. C., Jau, C. C. and Chen, T. S., (1999): “K-ary TSVQ: A New Improvement of Tree Structured Vector Quantization,” Proceedings of IASTED International Conference Modeling and Simulation (MS’99), Philadephia USA, May 5-8, 1999, pp. 235-239.

88.   Wu, Y. J. and Chang, C. C., (1999): “National Founding Mechanism of Science and Technology Efucation Project in Taiwan,” Proceedings of 1999 International Conference on Engineering Education, Ostrava, Czech, Aug. 10-12, 1999, pp. 2410.

89.   Lee, C. F. and Chang, C. C., (1999): “A New Iconic Indexing Scheme for Similarity Retrieval of Complex Spatial Objects,” Proceedings of Joint Conference of the Third World Multiconference on Systemics, Cybernetics and Informatics (SCI’99) and the Fifth International Conference on Information Systems Analysis and Synthesis (ISAS’99), Vol. 6, Oralando, USA, July 1999, pp. 109-114.

90.   Chang, C. C., Shiue, F. J. and Chen, T. S., (1999): “Tree Structured Vector Quantization with Dynamic Path Search,” Proceedings of International Workshop on Multimedia Network Systems (MMNS), Aizu, Japan, 1999, pp. 536-541.

91.   Chang, C. C., Shine, F. C. and Chen, T. S., (1999): “A New Scheme of Progressive Image Transmission Based on Bit-Plane Method,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, Beijing, China, 1999, pp. 892-895.

92.   Chang, C. C., Hwang, K. F. and Hwang, M. S., (1999): “A Block Based Digital Watermarks for Copy Protection of Images,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, Beijing, China, 1999, pp. 977-980.

93.   Hu, Y. C. and Chang, C. C., (1999): “A Novel Method of Designing Better TSVQ Codebooks,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 1, Beijing, China, 1999, pp. 747-750.

94.   Hu, Y. C. and Chang, C. C., (1999): “A Progressive Codebook Training Algorithm for Image Vector Quantization,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Optoelectronics and Communications Conference (APCC/OECC 99’), Vol. 2, Beijing, China, 1999, pp. 936-939.

95.   Jiang, J. H., Chang, C. C. and Chen, T. S., (1999): “A New Huffman Decoding Method Using Pattern Partition and Look-up Table,” Proceedings of the Fifth Asia-Pacific Conference on Communications and Fourth Opto-electronics and Communications Conference (APCC/OECC'99), Beijing, China, Oct. 1999, pp. 904-907.

96.   Chang, C. C., Chen, T. S. and Lin, Y., (2000): “An Efficient Edge Detection Scheme of Color Images,” Proceedings of the Fifth Joint Conference on Information Sciences, Vol. II, (invited plenary paper), New Jersey, U.S.A., Feb. 2000, pp. 448-455.

97.   Chang, C. C. and Wu, H. C., (2000): “Computing Watermarks from Images Using Quadtrees, Proceedings of the Second International Workshop on Multimedia Network Systems, Japan, July 2000, pp.123-128.

98.   Chang, C. C., Chen, T. S. and Tsai, C.S., (2000): “A New Scheme for Sharing Secret Color Images in Computer Network,” Proceedings of International Conference on Parallel and Distributed Systems, Japan, July 2000, pp. 21-27. (Invited keynote paper).

99.   Chang, C. C. and Wu, H. C., (2000):  "An Image Protection Scheme Based on Discrete Cosine Transformation,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Barden-Barden, Germany, Aug. 2000, Vol. 2, pp. 90-94.

100.Chang, C. C. and Chan, Y. K., (2000): “A Fast Filter of Image Retrieval Based on Color-Spatial Features,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 47-51.   

101.Chan, Y. K. and Chang, C. C., (2000): “A Fast Filter of Spatial Video Retrieval,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 42-46.

102.Chang, C. C. and Tsai, C. S., (2000): “A Robust Intellectual Property Rights Protection Scheme for Digital Images,” Proceedings of the Second International Workshop on Software Engineering and Multimedia Applications, Vol. 2, Barden-Barden, Germany, Aug. 2000, pp. 85-89

103.Chang, C. C., Hsia, H. C. and Chen, T. S., (2000): “Reliable Information Hiding for Printed Color Images,” Proceedings of International Symposium on Information Theory and Its Applications (ISITA 2000), Hawaii, Nov. 2000, pp.97-100.

104.Chang, C. C., Hwang, K. F. and Lin, Y., (2000): “A Proof of Copyright Ownership Using Moment-preserving,” Proceedings of COMPSAC’2000, Taipei, Taiwan, 2000, pp. 198-203.

105.Chang, C. C. and Chan, C. W., (2000): “A Detecting Dealer Cheating in Secret Sharing Systems,” Proceedings of COMPSAC’2000, Taipei, Taiwan, 2000, pp. 449-453.

106.Chang, C. C., Chen, T. S. and Xiao, G. X., (2000): “An Improved Prediction Method for Quadtree Image Coding,” Proceedings of International Symposium on Multimedia Software Engineering, Taipei, Taiwan, Dec. 11-13, 2000, pp. 269-275.

107.Chang, C. C., Chen, T. S. and Lin. Y., (2000): “An Efficient Accessing Technique of Chinese Characters Using Boshiamy Chinese Input System,” Proceedings of the International Workshop on Information Retrieval for Asian Languages (IRAL'2000), Hong Kong, Sep. 2000, pp.61-67.

108.Hwang, M. S., Chang, C. C. and Lin, I. C., (2000): “Security Enhancement for the Simple Authentication Key Agreement Algorithm,” Proceedings of COMPSAC’2000, Taipei, Taiwan, 2000, pp. 113-115.

109.Chan, Y. K and Chang, C. C., (2000): “Image Retrieval Based on Tolerable Difference of Direction,” Proceedings of ICOIN-15, Beppu, Japan, Jan. 2000, pp. 387-392.

110.Chang, C. C. and Lou, D. C., (2000):  "An Integration of User Authentication and Dynamic Access Control,” Proceedings of International Symposium on Consumer Electronics, Hong Kong, Dec. 2000, pp. 123-127.

111.Chang, C. C., Buehrer, D. J. and Lee, W. B., (2000): “A Generalized Group-Oriented Cryptosystem,” Proceedings of the First Workshop on Information Security Applications (WISA’2000), Korea, Nov. 2000, pp. 119-124.

112.Chang, C. C., Yeh, J. C. and Hsiao, J. Y., (2000): “A Method for Protection Digital Images from Being Copied Illegally,” Proceedings of 2000 Kyoto International Conference on Digital Libraries: Research and Practice, Kyoto, Japan, Nov. 2000, pp. 348-355.

113.Chang, C. C., (2000): “A Perspective on the Development of Digital Libraries in Taiwan,” Proceedings of 2000 Kyoto International Conference on Digital Libraries: Research and Practice, Kyoto, Japan, Nov. 2000, pp. 44-46.

114.Chan, Y. K. and Chang, C. C., (2001): “Concealing a Secret Image Using the Breadth first Traversal Linear Quadtree Structure,” Proceedings of the Third International Symposium on Cooperative Database Systems for Advanced Applications CODAS’01, Beijing, China, April 2001, pp. 194-199.

115. Chang, C. C., Shih, T. K. and Lin, I. C., (2001): “GBN: An Efficient Progressive Image Transmission Method Based on Guessing by Neighbors,” Multimedia Modeling – Modeling Meltimedia Information and System (L. Rutledge and D. C. A. Bulterman Eds.), CWI, Amsterdam, Netherlands, Nov. 2001, pp. 109-126.

116.Chang, C. C., Lu, P. W. and Hsiao, J. Y., (2001): “Two Stages Content-Based Retrieval for Music Collections,” Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, Sept. 2001, pp. 423-426.

117.Chang, C. C., Chen, T. S. and Lin, Y., (2001): “A New Image Compression Method Based on Block Truncation Coding and Edge Detection,” Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, Sept. 2001, pp. 448-451.

118.Hung, K. L. and Chang, C. C., (2001): “A Novel VQ-Based Compression Method without Having the Phenomenon of Ragged Edges,” Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, Sept. 2001, pp. 461-465.

119.Chang, C. C. and Chang, Y. F., (2001): “An Image Steganographic Scheme Based on Modified Rabin’s Public Key Cryptosystem,” Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, Sept. 2001, pp. 108-114.

120.Chang, C. C. and Wu, H. C., (2001): “A (t, n)-threshold Secret Sharing Scheme for Hidden Images Based on a Watermarking Technique,” Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, Sept. 2001, pp. 281-288.

121.Chang, C. C. and Chang, Y. F., (2001): “Cryptanalysis of Some Diffie-Hellman Typed Authenticated Key Agreement Protocols,” Proceedings of the 2001 International Workshop on Cryptography and Network Security, Taipei, Taiwan, Sept. 2001, pp. 142-145.

122.Chang, C. C. and Lai, Y. P., (2001): “A Fast Exponentiation Using a Data Compression Method for Large Exponents,” Proceedings of the 2001 International Workshop on Cryptography and Network Security, Taipei, Taiwan, Sept. 2001, pp. 212-218.

123.Wang, C. T., Chang, C. C. and Lin, C. H., (2001): “Group-Oriented Authenticated Encryption Based on Self-Certified Public Keys,” Proceedings of the Second Workshop on Information Security Applications (WISA’2001), Seoul, Korea, Sept. 2001, pp.385-395.

124.Chang, C. C. and Wu, M. N., (2001): “A Data Hiding Scheme for Chinese Calligraphy,” Proceedings of the International Conference on Chinese Computing (ICCC 2001), Singapore, Nov. 2001, pp.234-241.

125.Chang, C. C. and Lin, I. C., (2001): “A Progressive Chinese Calligraphy                                                                                        Transmission Technique,” Proceedings of the International Conference on Chinese Computing (ICCC 2001), Singapore, Nov. 2001, pp.223-233.

126.Chang, C. C., Shih, T. K. and Lin, I. C., (2002): “An Efficient Edge Detection Technique for Chinese Calligraphy,” Proceedings of Second International Workshop on Intelligent Multimedia Computing and Networking (IMMCN2002), North Carolina, U.S.A., March 2002, pp.960-963.

127.Chang, C. C., Hwang, R. J. and Chen, T. S., (2001): “Using a Mouse as a Login Device for Visual Cryptosystem Oriented Password Authentication Scheme,” Proceedings of the Seventh International Conference on Distributed Multimedia Systems, Taipei, Taiwan, Sept. 2001, pp. 11-23. (Keynote Position Paper)

128.Chang, C. C. and Wu, M. N., (2002): “An Algorithm for Color Image Compression Based on Common Bit Map Block Truncation Coding,” Proceedings of Second International Workshop on Intelligent Multimedia Computing and Networking (IMMCN2002), North Carolina, U.S.A., March 2002, pp.964-967.

129.Chan, Y. K. and Chang, C. C., (2002): “Similar Video Retrieval System Based on Color and Spatial Attributes,” Proceedings of the Third International Conference on Virtual Reality and Its Application in Industry, Hongzhou, China, April 9-12, 2002, pp. 567-570.

130.Chang, C. C. and Su, Y. Y., (2002): “A New Approach of Color Image Quantization Based on Multi-Dimensional Directory,” Proceedings of the Third International Conference on Virtual Reality and Its Application in Industry, Hongzhou, China, April 9-12, 2002, pp. 508-514.

131.Chang, C. C., Chan, C. S. and Hsiao, J. Y., (2002): “A Color Image Hiding Scheme Based on the Predetermined Ordering of Color Images,” Proceedings of the First International Conference on Information and Management Science, Xi’an, China, May 2002, pp.169-174.

132.Chang, C. C. and Pan. Y. P., (2002): “An Efficient Publicly Verifiable Multisecret Sharing Mechanism,” Proceedings of the First International Conference on Information Management Science, Xi’an, China, May 2002, pp.150-155.

133.Chang, C. C., Hsiao, J. Y. and Lu, P. W., (2002): “A Color Image Recovery and Tamper Proofing Method Based on the Color Palette,” Proceedings of the First International Conference on Information and Management Science, Xi’an, China, May 2002, pp.156-161.

134.Chang, C. C., Chiang, C. L. and Hsiao, J. Y., (2002): “Image Denoising by Median Filter with Edge Detection,” Proceedings of the First International Conference on Information and Management Science, Xi’an, China, May 2002, pp.51-56.

135.Lu, T. C., Chang, C. C. and Changchien, S. W., (2002): “A Mining Frequent Itemsets Procedure Using a Classification Network,” Proceedings of the First International Conference on Information and Management Science, Xi’an, China, May 2002, pp.76-82.

136.Chan, Y. K. and Chang, C. C., (2002):  "A Similar Color Image Retrieval System Based on Quadtree Representation,” Proceedings of the First International Conference on Information and Management Science, Xi’an, China, May 2002, pp.162-168.

137.Chang, C. C. and Chung, C. Y., (2002): “An Anonymous Electronic Voting Scheme Based on the Latest Decision on Voters’ Intentions,” Proceedings of the International Conference on E-business, Beijing, China, May 2002, pp.197-200.

138.Hwang, J. C., Chang, C. C. and Shih, T. K., (2002): “Copyright Protection with Program Gene,” Proceedings of Pacific Rim Workshop on Digital Steganography 2002, Kyushu, Japan, July 2002, pp. 158-161.

139.Chang, C. C., Wu, M. N. and Hwang, K. F., (2002): “High Perceptual Quality Data Hiding Technique for Two-Color Images,” Proceedings of Pacific Rim Workshop on Digital Steganography 2002, Kyushu, Japan, July 2002, pp. 65-70.

140.Tsai, P. Y., Hu, Y. C. and Chang, C. C., (2002): “An Image Hiding Technique Using the Block Truncation Coding,” Proceedings of Pacific Rim Workshop on Digital Steganography 2002, Kyushu, Japan, July 2002, pp. 54-64

141.Hwang, K. F. and Chang, C. C., (2002): “A Run-Length Mechanism for Hiding Data into Binary Images,” Proceedings of Pacific Rim Workshop on Digital Steganography 2002, Kyushu, Japan, July 2002, pp. 71-74.

142.Chang, C. C. and Pan, Y. P., (2002): “Some Flaws in a Cryptographic Key Assignment Scheme for Dynamic Access Control in a User Hierarchy,” Proceedings of the Second International Conference on Information Security (InfoSecu’02), Shanghai, China, July 2002, pp. 5-9.

143.Chang, C. C. and Chan, C. W., (2002): “Two Types of RSA-like Master-Keys and Their Applications to Secure Group Communications,” Proceedings of the Second International Conference on Information Security (InfoSecu’02), Shanghai, China, July 2002, pp. 70-76.

144.Hwang, K. F., Lin, I. C. and Chang, C. C., (2002): “A Credit Card-based Mobile Payment System,” Proceedings of the Second International Conference on Information Security (InfoSecu’02), Shanghai, China, July 2002, pp. 82-88.

145.Hwang, H. F. and Chang, C. C., (2002): “Cryptanalysis of the WD Public-key Cryptosystem,” Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Nov. 2002, pp.249-254.

146.Chang, C. C. and Yu. T. X., (2002): “Sharing a Secret Gray Image in Multiple Images,” Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Nov. 2002, pp.230-237.

147.Chang, C. C., Lu, P. W. and Hsiao, J. Y., (2002): “A Hybrid Method for Estimating the Euclidean Distance between Two Vectors,” Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Nov. 2002, pp.183-190.

148.Chang, C. C., Hsiao, J. Y. and Chiang, C. L., (2002): “An Image Copyright Protection Scheme Based on Torus Automorphism,” Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Nov. 2002, pp.217-224.

149.Chan, C. W. and Chang, C. C., (2002): “Key Exchange Protocol for Multiparty Communication Services,” Proceedings of International Symposium on Cyber Worlds: Theories and Practice, Tokyo, Japan, Nov. 2002, pp.241-248.

150.Lu, T. C., Chang, C. C. and Changchien, S. W., (2002): “An Association Rule Mining Method for Spatial Databases,” Proceedings of IASTED International Conference on Information Systems and Databases, Tokyo, Japan, Sep. 2002, pp.281-286.

151.Chan, Y. K., Chang, C. C. and Shen, J. J., (2002): “A Compact Patricia Trie for a Large Set of Keys,” Proceedings of IASTED International Conference on Information Systems and Databases, Tokyo, Japan, Sep. 2002, pp. 31-36.

152.Chang, C. C., Chan, C. S. and Pan, Y. P., (2002): “An Inverse Halftones Technique Using Genetic Algorithm,” Proceedings of IASTED International Conference on Information Systems and Databases, Tokyo, Japan, Sep. 2002, pp.184-189.

153.Chan, C. W. and Chang, C. C., (2002): “A Scheme for Digital Gift Certificates,” Proceedings of the Second International Workshop for Asian Public Key Infrastructures (IWAP 2002), Taipei Taiwan, Oct. 2002, pp.136-141.

154.Hwang, H. F. and Chang, C. C., (2002): “Enhancement of the Authenticated Encryption Scheme with Message Linkages,” Proceedings of the Second International Workshop for Asian Public Key Infrastructures (IWAP 2002), Taipei Taiwan, Oct. 2002, pp.59-62.

155.Chang, C. C. and Lu, T. C., (2002): “An Image Database Retrieval Scheme Based Upon Multivariate Analysis and Data Mining,” Proceedings of the International Computer Symposium: Database and Software Engineering Workshop (ICS 2002), Session 4, Dec. 2002. (keynote speech paper)

156.Hung, K. L. and Chang, C. C., (2003): “An Efficient Block-Based Scheme for Progressively Transmitting Lossless Images,” Proceedings of International Conference on Multimedia Modeling, Taipei, Taiwan, Jan. 2003, pp.313-328.

157.Wang, C. T., Chang, C. C. and Lin, C. H., (2003):  "Signature Schemes Based on Two Hard Problems Simultaneously,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA), Xi’an China, Mar. 2003, pp.557-560.

158.Chan, C. W. and Chang, C. C., (2003): “Huffman Tree Decomposition and Its Coding Applications,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA), Xi’an China, Mar. 2003, pp.683-688.

159.Chang, C. C., Chan, C. S. and Hsiao, J. Y., (2003): “Lossless Image Compression Based on Two-way Smaller Difference,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA), Xi’an China, May 2003, pp.821-824.

160.Chang, C. C., Kuo, Y. T. and Lin, C. H., (2003):  "Fast Algorithms for Common-Multiplicand and Exponentiation by Performing Complements,” Proceedings of International Conference on Advanced Information Networking and Applications (AINA), Xi’an China, May 2003, pp.807-811.

161.Chang, C. C., Chuang, J. C. and Chen, T. S., (2003):" Image Tamper Proofing Technique Based Upon Public-Key Cryptosystem with Hierarchical Approach,”  Proceedings of the 5th International Conference Advanced Communication Technology (ICACT 2003), Phoenix Park, Korea, Jan. 2003, pp.809-812.

162.Chang, C. C. and Wu, M. N., (2003): “A Color Image Progressive Transmission Method by Common Bit,” Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, Beijing China, April 2003, pp.1774-1778.

163.  Lin, M. H., Hu, Y. C. and Chang, C. C., (2003): “An Image Self-Verification Scheme Based on the Rehash Technique,” Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, Beijing China, April 2003, pp.1883-1886.

164.  Chang, C. C., Hsiao, J. Y. and Hsieh, C. P., (2003): “A New Approach to Lossless Image Compression,” Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, Beijing China, April 2003, pp.1734-1738.

165.  Chang, C. C. and Chung, C. Y., (2003): “An Enhanced Buyer Seller Watermarking Protocol,” Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 2, Beijing China, April 2003, pp.1779-1783.

166.  Chang, C. C. and Chung, C. Y., (2003): “An Efficient Session Key Generation Protocol,” Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 1, Beijing China, April 2003, pp.203-207.

167. Chang, C. C. and Lin, I. C., (2003): “A New (t, n) Threshold Image Hiding Scheme for Sharing a Secret Color Image,” Proceedings of the International Conference on Communication Technology (ICCT 2003), Vol. 1, Beijing China, April 2003, pp.196-202.

168.Chang, C. C., Chang, Y. F., (2003): “Security of Digital Signature Scheme Based on Factoring and Discrete Logarithms,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 331-332.

169.  Lu, T. C., Changchien, S. W. and Chang, C. C., (2003): “A Characteristic Rules Mining Scheme Based on Weighted Incidence Matrices,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 316-322.

170.  Chang, C. C. and Pan, Y. P. (2003): “A Hierarchy Weighted Threshold Multi-secret Sharing Scheme,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 333-340.

171.  Chang, C. C. and Liao, C. T. (2003): “A Prediction of VQ Indices by Utilizing DWT and Support Vector Machines,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 273-279.

172.  Chang, C. C. and Liao, C. T. (2003): “An Intellectual Property Right Protection Scheme for Digital Images Using Support Vector Machines,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 288-295.

173.  Jiang, J. H. ,Chang, C. C., and Chen, T. S. (2003):  " Rehash Method: A Compression Technique of Sparse Binary-Matrices," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 377-384.

174.  Chang, C. C. and Lin, I. C., (2003): “An ID-Based Conference Key Agreement Protocol for Secure Network Communications,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 252-256.

175.  Hwang, H. F. and Chang, C. C. (2003): “Designing a Broadcasting Cryptosystem for Low Computation Capabilities,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 296-299.

176.  Jiang, J. H., Chang, C. C., and Chen, T. S., (2003):  "A New Improvement of Lempel-Ziv-Welch Method," Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 311-315.

177.  Chan, Y. K. and Chang, C. C., (2003): “A Color Image Retrieval Method Based on Regional Color Moment and Wavelet-Based Features,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 398-404.

178.  Chang, C. C. and Yu, T. X. (2003): “A High Capacity Image Hiding Scheme for Binary images,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 362-370.

179.  Tsai P.Y., Hu, Y. C. and Chang, C. C. (2003): “An Adaptive Two-Stage Codebook Search Algorithm Using Principal Component Analysis and Dynamic Subspace Rechecking,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 349-355.

180.  Chang, C. C., Li, Y. C., and Liao, C. T. (2003): “A Fast Method for Linear Space Pairwise Sequence Alignment,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 257-264.

181. Chang, C. C., Hwang, S. J., and Wu, W. B. (2003): “Improvements on Generalized Threshold Cryptosystems,” Proceedings of the Second International Conference on Information and Management Sciences (IMS2003), Chengdu, China, Aug. 2003, pp. 265-268.

182.Chang, C. C., and Lou, D. C. (2003): “Fast Parallel Computation of Multi-Exponentiation for Public Key Cryptosystems,” Proceedings of International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Chengdu, China, August 2003, pp. 955-958.

183.Chang, C. C. and Chuang, J. C. (2003): “Image Authentication for Chinese Calligraphy Images Using S-Tree Approach,” Proceedings of 20th International Conference on Computer Processing of Oriental Languages (ICCPOL 2003), Shenyang, China, Aug. 2003, pp. 548-554.

184.  Lu, T. C. and Chang, C. C. (2003): “A Calligraphic Images Retrieval Scheme (CIRS) Based on Color and Ink Density,” Proceedings of 20th International Conference on Computer Processing of Oriental Languages (ICCPOL 2003), Shenyang, China, Aug. 2003, pp. 385-391.

185.  Chang, C. C. and Chan, C. S. (2003): “A Watermarking Scheme for Chinese Calligraphic Images,” Proceedings of 20th International Conference on Computer Processing of Oriental Languages (ICCPOL 2003), Shenyang, China, Aug. 2003, pp. 541-547.

186.Chang, C. C., Chen, T. S., and Hsia, H. C. (2003) "An Effective Image Steganographic Scheme Based on Wavelet Transformation and Pattern-Based Modification," Proceedings of International Conference on Computer Networks and Mobile Computing, Shanghai, Shanghai, China, Oct. 2003, pp.450-453.

187.Chang, C. C. and Chan, C. W., (2003): “A Database Record Encryption Scheme Using the RSA Public Key Cryptosystem and its Master Keys,” Proceedings of International Conference on Computer Networks and Mobile Computing, Shanghai, Shanghai, China, Oct. 2003, pp.345-348.

188.Chang, C. C. and Chan, C. W., (2003): “A Hypersphere Oriented Key Exchange Scheme for Multiparty,” Proceedings of International Conference on Computer Networks and Mobile Computing, Shanghai, China, Oct. 2003, pp. 27-30.

189.  Chang, C. C. and Hwang, K. F., (2003): “Remarks on Digital Signature Schemes Using Self-Certified Public Keys,” Proceedings of  the Fourth International Workshop on Information Security Application (WISA2003), Jeju Island, Korea, Aug. 2003, pp.559-563.

190.  Chang, C. C., Shih, K. J., and Lin, I. C. (2003): “An Intellectual Placement of Chinese Phonetic Symbols on the Keypads of Mobile Phones,” Proceedings of 2003 IEEE International Conference on Natural Language Processing and Knowledge Engineering, NLP-KE'03, Beijing, China, Oct. 2003, pp.506-511.

191. Chang, C. C., Lu, T. C., and Chen G. M. (2003): “An Efficient Promoter Prediction Scheme Based on Principal Component Analysis,” Proceedings of the 2003 International Conference on Informatics, Cybernetics and Systems (ICICS 2003), Kaohsiung, Taiwan, Dec. 2003, pp. 1498-1504.

192.  Chan, Y. K. and Chang, C. C., (2003): "Spatial Video Retrieval Based on the Piecewise Method," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

193.  Chang, C. C., Lin, I. C., and Tsai, H. M. (2003):  "A Dynamic Mechanism for Determining Relationships in a Partially Ordered User Hierarchy," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

194.  Chang, C. C., Lin, C. H., and Hwang, P. C., (2003): "Secret Sharing with Hierarchical Access Structure in a Hierarchy," to appear in the Proceedings of  the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

195.  Chang, C. C., and Hwang, R.J., (2003):  "A New Scheme To Protect Confidential Image," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

196.  Wang, C. T., Chang, C. C., and Lin, C. H., (2003): "Using IC Cards to Remotely Login Passwords without Verification Tables," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

197.  Wang, C. T., Lin, C. H., and Chang, C. C., (2003): "Supervising Secret-key Agreements in a Level-Based Hierarchy," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

198.  Hwang, R. J. and Chang, C. C., (2003): "Enhancing the Efficiency of (v, r, n)- Fairness Secret Sharing Scheme," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

199.  Chang, C. C., Lin, I. C., Tsai, H. M., and Wang, H. H., (2003):  "A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

200.  Chang, C.C. and Chang Y.F. (2003): “Yet Another Attack on a QR-based Password Authentication System,” to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan.

201. Chang, C.C. and Lu, T.C. (2003): "A Bandwidth Efficiency of the Image Compression Method for Information Hiding," to appear in the Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA2004), March 2004, Fukuoka, Japan. 

202. Chang, C.C., Lu, T.C. and Liu, Y.L, "A Secret Information Hiding Scheme Based on Switching Tree Coding," Proceedings of 2003 International Workshop on Advanced Developments in Software and Systems Security (WADIS), Taipei, Taiwan, Dec. 2003, pp.9-21.

203. Chang, C. C., Chen, T. S., and Xiao, G. X., (2003): "An Effective and Efficient VQ Codebook Design," to appear in the Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), Singapore, Dec. 2003.

204.  Chang, C. C., Lee, C. T., Xiao, G. X., and Chen, T. S., (2003) “A New Speech Hiding Scheme Based upon Sub-Band Coding,” to appear in the Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), Singapore, Dec. 2003.

205.  Chang, C. C., Hsieh, C. P., and Hsiao, J. Y., (2003): “A Fast Noise Reduction Method Based on Human Visual System,” to appear in the Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), Singapore, Dec. 2003.

206.  Tsai P.Y., Lin, M. H. and Chang, C. C. (2003): “A Character-Based Authentication Scheme for Chinese Calligraphy Images,” to appear in the Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), Singapore, Dec. 2003.

207.  Chang, C. C., Li, C. F., and Hu, Y. C. (2003): “Code Transformation of DF-expression Between Bintree and Quadtree,” to appear in the Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), Singapore, Dec. 2003.

208.  Chan, Y. K and Chang, C. C. (2003): “Block Image Retrieval Based on a Compressed Linear Quadtree”, to appear in the Proceedings of Fourth International Conference on Information, Communications & Signal Processing - Fourth IEEE Pacific-Rim Conference on Multimedia (ICICS-PCM’03), Singapore, Dec. 2003.