Local Conference Papers

¡@

01. Chang, C. C.  and  Lee, R. C. T., (1979):  "Optimal Cartesian Product Files for Partial Match Queries and Partial Match Patterns,"  Proceedings of NCS 1979,  Taipei,  Taiwan,  Dec. 1979,  pp. 5-27-5-37.

02. Chang, C. C., (1982):  "A Survey of Multi-key File Design,"  Proceedings of the First Conference on Computer Algorithms,  Hsinchu,  Taiwan,  July 1982,  pp. 3-1-3-62.

03. Chang, C. C.  and  Su, D. H., (1983):  "Application of a Heuristic Algorithm to Design Multiple Key Hashing Functions,"  Proceedings of NCS 1983,  Hsinchu,  Taiwan,  Dec. 1983,  pp. 205-209.

04. Chang, C. C., (1983):  "Minimal Perfect Hashing Scheme Based upon Chinese Remainder Theorem,"  Proceedings of NCS 1983,  Hsinchu,  Taiwan,  Dec. 1983,  pp. 225-231.

05. Chang, C. C.  and  Chen, C. P., (1985):  "The User-Hierarchy Structure in Information Protection System,"  IMC's 1985 Asia-pacific Regional Information & Micrographic Management Congress,  Taipei,  Taiwan,  July 1985,  pp. 441-449.

06. Chang, C. C.  and  Liang, J., (1985):  "Partially Specified  K-Nearest Neighbor Search Using Multiple Key Hashing Functions,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp. 448-454.

07. Chang, C. C.  and  Yuan, S. T., (1985):  "A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp. 255-268.

08. Chang, C. C.  and  Lee, Y.  P., (1985):  "A Letter Oriented Minimal Perfect Rehashing Scheme Based  upon Reciprocal Hashing,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp.  472-482.

09. Chang, C. C.  and  Yuan, S. T., (1985):  "A Parallel Algorithm to Solve All Shortest Pairs Problem,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp. 455-467.

10. Chang, C. C.  and  Lu, Y. L.,  (1985):  "The Complexity of Multi-disk Data Allocation Problem,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp. 468-471.

11. Chang, C. C.  and  Chen, H. Y., (1985):  "Toward the Estimation of Response Times for Random Files: A Closed Noniterative Performance Formula,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp. 835-842.

12. Chang, C. C.  and  Hsiao, M. D., (1985):  "Short Spanning Path  as a File Allocation Scheme for Concurrent Disk Accessing,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp. 269-283.

13. Chang, C. C.  and  Lin, C. H., (1985):  "A Fast Algorithm for Nearest Neighbor Search,"  Proceedings of NCS 1985,  Kaohsiung,  Taiwan,  Dec. 1985,  pp. 625-643.

14. Chang, C. C.  and  Tsai, W. H., (1986):  "An Algorithm to Allocate a File on Multiple Disk System for Concurrent Retrieval,"  Proceedings of 6th Workshop on Computer System Technology,  Pinton,  Taiwan,  Aug. 1986,  pp. 603-625.

15. Chang, C. C.  and  Hung, M. F., (1987):  "Symbolic Solutions for Linear Difference Equations,"  Proceedings of 6th Workshop on Computer System Technology,  Sun Moon Lake,  Taiwan,  Aug. 1987,  pp. 1033-1060.

16. Chang, C. C.  and  Chen, C. H., (1987):  "The Study of Missing Data Problem and Data Integrity Problem,"  Proceedings of NCS 1987,  Taipei,  Taiwan,  Dec. 1987,  pp. 254-262.

17. Chang, C. C.  and  Chang, C. H., (1987):  "A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem,"  Proceedings of NCS 1987,  Taipei,  Taiwan,  Dec. 1987,  pp. 304-311.

18.   Chang, C. C.  and  Chen, C. Y., (1987):  "A Performance Note on Multi-disk Binary Cartesian Product File Allocation Methods,"  Proceedings of the NCS 1987,  Taipei,  Taiwan,  Dec. 1987,  pp. 247-253.

19. Chang, C. C.  and  Cheng, W, Y., (1987):  "The Study of  User-Hierarchy Mechanism for Computer System Resources,"  Proceedings of NCS 1987,  Taipei,  Taiwan,  Dec. 1987,  pp. 312-318.

20. Chang, C. C.,  Hsiao, J. Y.,  and Chen, C. Y., (1987):  "Strings Near-matching Techniques for Large Textual Files,"  Proceedings of NCS 1987,  Taipei,  Taiwan,  Dec. 1987,  pp. 825-830.

21. Chang, C. C., (1990):  "Recent Developments of Password Authentication Techniques,"  Proceedings of the First Conference on Information Security,  Chiayi,  Taiwan,  Dec. 1990,  pp. 1-24.

22. Chang, C. C., (1991):  "Current Status and Needs of  Computer Systems Security,"  Proceedings of 1991 Academic Researches in SEED Project,  Taipei,  Taiwan,  Oct. 1991,  pp. 15-1~15-13.

23. Chang, C. C.  and  Lee, H. C., (1991):  "A Generalized Group Oriented Cryptosystem,"  Proceedings of NCS 1991,  Chungli,  Taiwan,  Dec. 1991,  pp. 367-371.

24. Chang, C. C.  and  Hwang, S. M., (1992):  "A Password Authentication Scheme Based upon Diffie and Hellman's Public Key System,"  Proceedings of the Second Conference on Information Security,  Tainan,  Taiwan,  May 1992,  pp. 85-104.

25.   Lin, C. H.,  Chang, C. C.,  and Lee, R. C. T., (1992):  "An Interactive Message Authentication Scheme,"  Proceedings of the Secon Conference on Information Security,  Tainan,  Taiwan,  May 1992,  pp. 105-120.

26.   Jan, J. K.,  and Chang, C. C., (1992):  "On the Unification to Minimal Perfect Hashing, Access Control and User Hierarchy,"  Proceedings of the Second Conference on Information Security,  Tainan,  Taiwan,  May 1992,  pp. 57-84.

27. Chang, C. C.  and  Lee, W. B., (1993):  "Cryptanalysis of a  Password Authentication Scheme Based on Triangles,"  Proceedings of the Third Conference on Information Security,  Chiayi,  Taiwan,  May 1993,  pp. C.2-4.1~C.2-4.5.

28.   Wu, T. C.,  Chang, C. C.,  and Yeh, Y. S., (1993):  "A Scheme for Holding Secure Electronic Conferences in Computer Networks,"  Proceedings of the Third Conference on Information Security,  Chiayi,  Taiwain,  May 1993,  pp. A.1-4.1~A.1-4.9.

29.   Chou, A. Y. H.,  Chang, C. C.,  and Yang, W. P., (1993):  "Symbolic Indexing by N-strings,"  Proceedings of the 1993 Conference on Computer Vision, Graphics and Image Processing,  Nantou,  Taiwan,  Aug. 1993.

30.   Lin, C. H.  and  Chang, C. C.,(1993):  "A Server-Aided Computation Protocol for RSA Enciphering Algorithm,"  Proceedings of NCS 1993,  Chiayi,  Taiwan,  Dec. 1993,  pp. 547-552.

31. Tsai, H. M.,  Kuo, S. Y.,  Lei, C. L.,  and Chang, C. C., (1993):  "A Dynamic Cryptographic Key Assignment Scheme in a Tree Hierarchy for Access Control,"  Proceedings of NCS 1993,  Chiayi,  Taiwan,  Dec. 1993,  pp.553-559.

32. Chang, C. C.,  Hwang, R. J.,  and Jan, J. K., (1994):  "An Improvement to Single-Key Access Control Scheme,"  Proceedings of 4th Conference on Information Security,  Taipei,  Taiwan,  May 1994,  pp. 81-87.

33. Chang, C. C.  and  Lee, W. B., (1994):  "A Conference Key Distribution System Based on Triangles,"  Proceedings of 4th Conference on Information Security,  Taipei,  Taiwan,  May 1994,  pp. 121-128

34. Chang, C. C.  and  Wu, T. C., (1994):  "Interactive Remote Login Authentication Scheme with Smart Cards,"  Proceedings of 4th Conference on Information Security,  Taipei,  Taiwan,  May 1994,  pp. 151-156.

35.   Chang, C. C.,  Buehrer, D. J.,  and Hwang, S. J., (1995):  "A Simple Secret Key Distribution System,"  Proceedings of 5th Conference on Information Security,  Taipei,  Taiwan,  May 1995.  pp. 125-128.

36. Chang, C. C.  and  Wu, T. C., (1995):  "A Group-Oriented Secure Broadcasting Protocol in Computer Networks,"  Proceedings of 5th Conference on Information Security,  Taipei,  Taiwan,  May 1995,  pp. 144-146.

37. Chen, C. Y.,  Chang, C. C.,  and Yang, W. P., (1995):  "An Improved Multistage Sharing Scheme,"  Proceedings of 5th Conference on Information Security,  Taipei,  Taiwan,  May 1995,  pp. 142-143.

38. Chang, C. C.,  Horng, W. J.,  and Hwang, S. J., (1995):  "A New Evaluating Scheme for Cascade Exponentiation,"  Proceedings of 5th Conference on Information Security,  Taipei,  Taiwan,  May 1995,  pp. 165-175.

39. Chou, A. Y. H.,  Chang, C. C.,  and Yang, W. P., (1995):  "A Very Fast Algorithm for Designing Nearly Optimal Cartesian Product Files,"  Proceedings of 12th Workshop on Combinatorial Mathematics and Computation Theory,  Kaohsiung,  Taiwan,  1995,  pp. 52-59.

40. Lee, W.B.  and  Chang, C. C., (1996):  "A New Cryptographic Solution for Dynamic Access Control in a Hierarchy,"  Proceedings of 6th Conference on Information Security,  Taichung,  Taiwan,  May 1996,  pp. 124-127.

41. Chang, C. C.,  Hwang, S. J.,  and Hwang, R. J., (1996):  "A Digitized Signature Linkage Scheme,"  Proceedings of 6th Conference on Information Security,  Taichung,  Taiwan,  May 1996,  pp. 48-54.

42. Chen, T. S.,  Chang, C. C.,  and Hwang, M. S., (1996):  "A Virtual Image Cryptosystem Using Vector Quantization,"  Proceedings of 6th Conference on Information Security,  Taichung,  Taiwan,  May 1996,  pp. 10-16.

43. Chen, C. Y.,  Chang, C. C.,  and Yang, W. P., (1996):  "Cryptanalysis of a Key Sharing System for Global Telecommunications,"  Proceedings of 6th Conference on Information Security,  Taichung,  Taiwan,  May 1996,  pp. 224-227.

44. Chen, T. S.  and  Chang, C. C., (1996):  "A Fast Nearest Search Algorithm for Vector Quantization Based on Principlal Component Directions,"  Proceedings of 13th Workshop on Combinatorial Mathematics and Computation Theory,  Taichung,  Taiwan,  July 1996,  pp. 59-66.

45. Chang, C. C.,  Kuo, C. L.,  and Chen, T. S., (1996):  "A Closest-Paired Tree-Structured Codeword Search Method,"  Proceedings of the 1996 Conference on Computer Vision,  Graphics,  and Image Processing,  Chiayi,  Taiwan,  Aug. 1996,  pp. 70-76.

46. Chang, C. C.,  Chou, J. S.,  and  Chen, T. S., (1996):  "A Fast Method for Estimating the Euclidean Distance between an Image Block and a Codeword,"  Proceedings of the 1996 Conference on Computer Vision,  Graphics,  and Image Processing,  Chiayi,  Taiwan,  Aug. 1996,  pp. 321-327.

47. Lee, W. B.  and  Chang, C. C., (1996):  "On Two Identity-Based Schemes in Computer Networks,"  Proceedings of the Second Symposium on Computer and Communication Technology,  Taichung,  Taiwan,  Oct. 1996,  pp. 57-61.

48. Chang, C. C.  and  Leu, J. J., (1996):  "A New Digital Multisignature with Message Recovery Scheme,"  Proceedings of the Second Symposium on Computer and Communication Technology,  Taichung,  Taiwan,  Oct. 1996,  pp. 231-237.

49. Chang, C. C.,  Sung, C. H.,  and  Chen, T. S., (1996):  "An Improved Scheme for Locally Adaptive Data Compression Using Multilist Structure,"  Proceedings of the Second Symposium on Computer and Communication Technology,  Taichung,  Taiwan,  Oct. 1996,  pp. 26-33.

50. Lee, W. B.  and  Chang, C. C., (1997):  "Using RSA with Low Exponent in a Public Network,"  Proceedings of 7th Information Security Conference,  Taipei, Taiwan, May 1997, pp.67-70.

51. Lou, D. C.  and  Chang, C. C., (1997):  "Efficient Normal Basis Inversion in ,"  Proceedings of 7th Information Security Conference,  Taipei,  Taiwan,  May 1997, pp.55-58.

52. Hwang, S. J.,  Chang, C. C.,  and Yang, W. P., (1997):  "A Time-Stamped Password Authentication System,"  Proceedings of 7th Information Security Conference,  Taipei,  Taiwan,  May 1997, pp.165-169.

53. Hwang, S. J.,  Chang, C. C.,  and Yang, W. P., (1997):  "Improved Authentication Encryption Schemes,"  Proceedings of 7th Information Security Conference,  Taipei,  Taiwan,  May 1997, pp. 209-212.

54. Chang, C. C., Sung, C. H. and Chen, T. S., (1997): "A Locally Adaptive Scheme for Image Index Compression," Proceedings of the 1997 Conference on Computer Vision, Grahpics, and Image Processing, Taichung, Taiwan, Aug. 1997, pp.93-99.

55. Chang, C. C.  and  Tsu, S. M., (1997):  "A Seal-Based Key Distribution Scheme,"   Proceedings of National Computer Symposium 1997, Taichung,  Taiwan,  Dec. 1997,  pp.c120-c125.

56. Chang, C. C.  and  Tsu, S. M., (1997):  "An Improvement on a Probabilistic Encryption Scheme," Proceedings of National Computer Symposium 1997, Taichung,  Taiwan,  Dec. 1997,  pp.c132-c135.

57. Wang, C. T.,  Lin, C. H.,  and Chang, C. C., (1997):  "Group-Oriented Threshold Signature Schemes with Traceable Signers," Proceedings of National Computer Symposium 1997, Taichung,  Taiwan,  Dec. 1997,  pp.c114-c119.

58. Chen, C. Y.,  Chang, C. C.,  and Yang, W. P., (1998):  "Cryptanalysis of the LUC Public Key Cryptosystem," Proceedings of 8th Information Security Conference,  Kaohsiung,  Taiwan,  May 1998, pp. 49-58.

59.  Chen, C. Y.,  Chang, C. C.,  and Yang, W. P., (1998):  "Cryptoanalyzing the RSA-like Schemes by Using the Continue Fraction Method," to appear in  Proceedings of 8th Information Security Conference,  Kaohsiung,  Taiwan,  May 1998, pp. 81-90.

60.      Chen, T. S.  and  Chang, C. C., (1998): "A Simple and Efficient Method for LBG Codebook Initialization," Proceedings of 1998 Conference on Computer Vision, Graphics, and Image Processing, Taipei, 1998, pp. 44-47.

 61.  Chen, C. Y., Chang, C. C., (1999):  "A Fast Modular Multiplication Algorithm for Computing the Product AB Modulo N,"  Proceedings of  the 9th Information Security Conference,  Taichung, Taiwan, May 1999, pp. 41-45.

62.  Chen, C. Y., Chang, C. C.,  and Yang, W. P., (1999):  "A New Subliminal Channel without Sharing a Secret Key,"  Proceedings of the 9th Information Security Conference,  Taichung, Taiwan, May 1999, pp. 237-240.

63 . Chang, C. C., Wang, C. H., Liou, F. Y., and Sun, H. M., (1999): "Remarks on a Digital Signature Scheme Based on Error-Correcting Codes," Proceedings of the 9th Information Security Conference, Taichung, Taiwan, May 1999, pp. 157-164.

64.      Hwang, R. J. and Chang, C. C., (1999): "Image Watermarking Using Visual Cryptograph," Proceedings of the 9th Information Security Conference, Taichung, Taiwan, May 1999.

65.  Chen, C. Y., Hwang, S. J., and Chang, C. C., (1999): "New Multisignature Scheme Based on One-Way Functions," Proceedings of the 4th Multimedia Technology and Applications Symposium, April 1999, Kaoshung, Taiwan, pp.332-240.

66 . Hung, K. L., Chang, C. C. and Chen, T. S., (1999): "A Side Match Reconstruction Method Using Tree-Structured VQ for Transmition Images Progressively," Proceedings of the National Computer Symposium, Dec. 1999, pp. C-5--C-12.

67 . Lee, W. B. and Chang, C. C., (2000): "On the Security of the Digital Signature Based on Factoring and Discrete Logarithm," Proceedings of The Tenth National Conference on Information Security, Hualiam, Taiwan, May 2000, pp. 8-12.

68.  Chen, C. Y., Chang, C. C. and Hsueh, C. C., (2001): ¡§A Fast Modular Multiplication Algorithm with the Fixed Window Size,¡¨ to appear in the Proceedings of the Tenth Conference National Defence Technology, Taoyuan, Taiwan, 2001.