¡@
01. Chang, C. C. and Lee, R. C. T., (1979): "Optimal Cartesian Product Files for Partial Match Queries and Partial Match Patterns," Proceedings of NCS 1979, Taipei, Taiwan, Dec. 1979, pp. 5-27-5-37.
02.
Chang, C. C., (1982): "A
Survey of Multi-key File Design," Proceedings of the First Conference on Computer Algorithms,
Hsinchu, Taiwan,
July 1982, pp. 3-1-3-62.
03.
Chang, C. C. and Su, D. H.,
(1983): "Application of a
Heuristic Algorithm to Design Multiple Key Hashing Functions,"
Proceedings of NCS 1983,
Hsinchu, Taiwan,
Dec. 1983, pp. 205-209.
04.
Chang, C. C., (1983): "Minimal
Perfect Hashing Scheme Based upon Chinese Remainder Theorem,"
Proceedings of NCS 1983,
Hsinchu, Taiwan,
Dec. 1983, pp. 225-231.
05.
Chang, C. C. and Chen, C. P.,
(1985): "The User-Hierarchy
Structure in Information Protection System," IMC's 1985 Asia-pacific
Regional Information & Micrographic Management Congress,
Taipei, Taiwan,
July 1985, pp. 441-449.
06.
Chang, C. C. and
Liang, J., (1985): "Partially
Specified K-Nearest Neighbor Search
Using Multiple Key Hashing Functions,"
Proceedings of NCS 1985, Kaohsiung,
Taiwan, Dec. 1985,
pp. 448-454.
07.
Chang, C. C. and
Yuan, S. T., (1985): "A
Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for
VLSI Systems," Proceedings
of NCS 1985, Kaohsiung,
Taiwan, Dec. 1985,
pp. 255-268.
08. Chang, C. C. and Lee, Y. P., (1985): "A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing," Proceedings of NCS 1985, Kaohsiung, Taiwan, Dec. 1985, pp. 472-482.
09.
Chang,
C. C.
and Yuan, S. T., (1985):
"A Parallel Algorithm to Solve All Shortest Pairs Problem,"
Proceedings of NCS 1985,
Kaohsiung, Taiwan,
Dec. 1985, pp. 455-467.
10. Chang, C. C. and Lu, Y. L., (1985): "The Complexity of Multi-disk Data Allocation Problem," Proceedings of NCS 1985, Kaohsiung, Taiwan, Dec. 1985, pp. 468-471.
11.
Chang, C. C. and Chen, H. Y.,
(1985): "Toward the Estimation
of Response Times for Random Files: A Closed Noniterative Performance
Formula," Proceedings
of NCS 1985, Kaohsiung,
Taiwan, Dec. 1985,
pp. 835-842.
12.
Chang, C. C. and Hsiao, M.
D., (1985): "Short Spanning
Path as a File Allocation Scheme
for Concurrent Disk Accessing," Proceedings
of NCS 1985, Kaohsiung,
Taiwan, Dec. 1985,
pp. 269-283.
13.
Chang, C. C. and Lin, C. H.,
(1985): "A Fast Algorithm for
Nearest Neighbor Search," Proceedings
of NCS 1985, Kaohsiung,
Taiwan, Dec. 1985,
pp. 625-643.
14.
Chang, C. C. and Tsai, W. H.,
(1986): "An Algorithm to
Allocate a File on Multiple Disk System for Concurrent Retrieval,"
Proceedings of 6th Workshop on
Computer System Technology, Pinton, Taiwan,
Aug. 1986, pp. 603-625.
15.
Chang, C. C. and Hung, M. F.,
(1987): "Symbolic Solutions
for Linear Difference Equations," Proceedings
of 6th Workshop on Computer System Technology,
Sun Moon Lake, Taiwan, Aug. 1987, pp.
1033-1060.
16.
Chang, C. C. and Chen, C. H.,
(1987): "The Study of Missing
Data Problem and Data Integrity Problem,"
Proceedings of NCS 1987,
Taipei, Taiwan,
Dec. 1987, pp. 254-262.
17.
Chang, C. C. and Chang, C.
H., (1987): "A Dynamic Access
Control Scheme Based upon Chinese Remainder Theorem," Proceedings of NCS 1987,
Taipei, Taiwan,
Dec. 1987, pp. 304-311.
18.
Chang, C. C. and Chen, C. Y.,
(1987): "A Performance Note on
Multi-disk Binary Cartesian Product File Allocation Methods,"
Proceedings of the NCS 1987,
Taipei, Taiwan,
Dec. 1987, pp. 247-253.
19.
Chang, C. C. and Cheng, W,
Y., (1987): "The Study of
User-Hierarchy Mechanism for Computer System Resources,"
Proceedings of NCS 1987, Taipei,
Taiwan, Dec. 1987,
pp. 312-318.
20. Chang, C. C., Hsiao, J. Y., and Chen, C. Y., (1987): "Strings Near-matching Techniques for Large Textual Files," Proceedings of NCS 1987, Taipei, Taiwan, Dec. 1987, pp. 825-830.
21. Chang, C. C., (1990): "Recent Developments of Password Authentication Techniques," Proceedings of the First Conference on Information Security, Chiayi, Taiwan, Dec. 1990, pp. 1-24.
22.
Chang, C. C., (1991): "Current
Status and Needs of Computer
Systems Security," Proceedings of 1991 Academic Researches in SEED Project,
Taipei, Taiwan,
Oct. 1991, pp. 15-1~15-13.
23.
Chang, C. C. and Lee, H. C.,
(1991): "A Generalized Group
Oriented Cryptosystem," Proceedings
of NCS 1991, Chungli,
Taiwan, Dec. 1991,
pp. 367-371.
24.
Chang, C. C. and Hwang, S.
M., (1992): "A Password
Authentication Scheme Based upon Diffie and Hellman's Public Key System,"
Proceedings of the Second
Conference on Information Security, Tainan, Taiwan,
May 1992, pp. 85-104.
25.
Lin, C. H., Chang, C. C.,
and Lee, R. C. T., (1992): "An
Interactive Message Authentication Scheme,"
Proceedings of the Secon Conference
on Information Security, Tainan,
Taiwan, May 1992,
pp. 105-120.
26.
Jan, J. K., and Chang, C.
C., (1992): "On the
Unification to Minimal Perfect Hashing, Access Control and User Hierarchy,"
Proceedings of the Second
Conference on Information Security, Tainan,
Taiwan, May 1992,
pp. 57-84.
27.
Chang, C. C. and Lee, W. B.,
(1993): "Cryptanalysis of a
Password Authentication Scheme Based on Triangles,"
Proceedings of the Third Conference
on Information Security, Chiayi, Taiwan,
May 1993, pp.
C.2-4.1~C.2-4.5.
28.
Wu, T. C., Chang, C. C.,
and Yeh, Y. S., (1993): "A
Scheme for Holding Secure Electronic Conferences in Computer Networks,"
Proceedings of the Third Conference
on Information Security, Chiayi, Taiwain,
May 1993, pp.
A.1-4.1~A.1-4.9.
29.
Chou, A. Y. H., Chang, C. C., and
Yang, W. P., (1993): "Symbolic
Indexing by N-strings," Proceedings
of the 1993 Conference on Computer Vision, Graphics and Image Processing, Nantou, Taiwan,
Aug. 1993.
30.
Lin, C. H. and
Chang, C. C.,(1993): "A
Server-Aided Computation Protocol for RSA Enciphering Algorithm,"
Proceedings of NCS 1993,
Chiayi, Taiwan,
Dec. 1993, pp. 547-552.
31.
Tsai, H. M., Kuo, S. Y.,
Lei, C. L., and Chang, C.
C., (1993): "A Dynamic
Cryptographic Key Assignment Scheme in a Tree Hierarchy for Access
Control," Proceedings of NCS 1993,
Chiayi, Taiwan,
Dec. 1993, pp.553-559.
32.
Chang, C. C., Hwang, R. J., and
Jan, J. K., (1994): "An
Improvement to Single-Key Access Control Scheme,"
Proceedings of 4th Conference on
Information Security, Taipei,
Taiwan, May 1994,
pp. 81-87.
33.
Chang, C. C. and Lee, W. B.,
(1994): "A Conference Key
Distribution System Based on Triangles,"
Proceedings of 4th Conference on
Information Security, Taipei,
Taiwan, May 1994,
pp. 121-128
34.
Chang, C. C. and Wu, T. C.,
(1994): "Interactive Remote
Login Authentication Scheme with Smart Cards,"
Proceedings of 4th Conference on
Information Security, Taipei,
Taiwan, May 1994,
pp. 151-156.
35.
Chang, C. C., Buehrer,
D. J., and Hwang, S. J., (1995):
"A Simple Secret Key Distribution System,"
Proceedings of 5th Conference on
Information Security, Taipei,
Taiwan, May 1995.
pp. 125-128.
36.
Chang, C. C. and Wu, T. C.,
(1995): "A Group-Oriented
Secure Broadcasting Protocol in Computer Networks," Proceedings of 5th
Conference on Information Security, Taipei,
Taiwan, May 1995,
pp. 144-146.
37.
Chen, C. Y., Chang, C. C.,
and Yang, W. P., (1995): "An
Improved Multistage Sharing Scheme," Proceedings
of 5th Conference on Information Security,
Taipei, Taiwan,
May 1995, pp. 142-143.
38.
Chang, C. C., Horng, W. J.,
and Hwang, S. J., (1995): "A
New Evaluating Scheme for Cascade Exponentiation,"
Proceedings of 5th Conference on Information Security,
Taipei, Taiwan,
May 1995, pp. 165-175.
39.
Chou, A. Y. H., Chang, C. C., and
Yang, W. P., (1995): "A Very
Fast Algorithm for Designing Nearly Optimal Cartesian Product Files,"
Proceedings of 12th Workshop on
Combinatorial Mathematics and Computation Theory,
Kaohsiung, Taiwan,
1995, pp. 52-59.
40. Lee, W.B. and Chang, C. C., (1996): "A New Cryptographic Solution for Dynamic Access Control in a Hierarchy," Proceedings of 6th Conference on Information Security, Taichung, Taiwan, May 1996, pp. 124-127.
41.
Chang,
C. C.,
Hwang, S. J., and Hwang, R. J., (1996):
"A Digitized Signature Linkage Scheme,"
Proceedings of 6th Conference on
Information Security, Taichung,
Taiwan, May 1996,
pp. 48-54.
42.
Chen, T. S., Chang, C. C.,
and Hwang, M. S., (1996): "A
Virtual Image Cryptosystem Using Vector Quantization,"
Proceedings of 6th Conference on
Information Security, Taichung,
Taiwan, May 1996,
pp. 10-16.
43.
Chen, C. Y., Chang, C. C.,
and Yang, W. P., (1996): "Cryptanalysis
of a Key Sharing System for Global Telecommunications,"
Proceedings of 6th Conference on
Information Security, Taichung,
Taiwan, May 1996,
pp. 224-227.
44.
Chen, T. S. and
Chang, C. C., (1996): "A
Fast Nearest Search Algorithm for Vector Quantization Based on Principlal
Component Directions," Proceedings of 13th Workshop on Combinatorial Mathematics and
Computation Theory, Taichung,
Taiwan, July 1996,
pp. 59-66.
45.
Chang, C. C., Kuo, C. L., and
Chen, T. S., (1996): "A
Closest-Paired Tree-Structured Codeword Search Method," Proceedings of the 1996
Conference on Computer Vision, Graphics,
and Image Processing, Chiayi,
Taiwan, Aug. 1996,
pp. 70-76.
46.
Chang, C. C., Chou, J. S., and
Chen, T. S., (1996): "A
Fast Method for Estimating the Euclidean Distance between an Image Block and a
Codeword," Proceedings
of the 1996 Conference on Computer Vision,
Graphics, and Image
Processing, Chiayi,
Taiwan, Aug. 1996,
pp. 321-327.
47.
Lee, W. B. and
Chang, C. C., (1996): "On
Two Identity-Based Schemes in Computer Networks,"
Proceedings of the Second Symposium
on Computer and Communication Technology,
Taichung, Taiwan,
Oct. 1996, pp. 57-61.
48.
Chang, C. C. and Leu, J. J.,
(1996): "A New Digital
Multisignature with Message Recovery Scheme," Proceedings of the
Second Symposium on Computer and Communication Technology,
Taichung, Taiwan,
Oct. 1996, pp. 231-237.
49.
Chang, C. C., Sung, C. H., and
Chen, T. S., (1996): "An
Improved Scheme for Locally Adaptive Data Compression Using Multilist
Structure," Proceedings
of the Second Symposium on Computer and Communication Technology,
Taichung, Taiwan,
Oct. 1996, pp. 26-33.
50.
Lee, W. B. and
Chang, C. C., (1997): "Using
RSA with Low Exponent in a Public Network,"
Proceedings of 7th Information Security Conference,
Taipei, Taiwan, May 1997, pp.67-70.
51.
Lou, D. C. and
Chang, C. C., (1997): "Efficient
Normal Basis Inversion in ," Proceedings
of 7th Information Security Conference, Taipei,
Taiwan, May 1997, pp.55-58.
52.
Hwang, S. J., Chang, C.
C., and Yang, W. P., (1997):
"A Time-Stamped Password Authentication System,"
Proceedings of 7th Information
Security Conference, Taipei,
Taiwan, May 1997,
pp.165-169.
53.
Hwang, S. J., Chang, C.
C., and Yang, W. P., (1997):
"Improved Authentication Encryption Schemes,"
Proceedings of 7th Information
Security Conference, Taipei,
Taiwan, May 1997, pp.
209-212.
54.
Chang, C. C., Sung, C. H. and Chen, T. S., (1997): "A Locally
Adaptive Scheme for Image Index Compression," Proceedings
of the 1997 Conference on Computer Vision, Grahpics, and Image Processing,
Taichung, Taiwan, Aug. 1997, pp.93-99.
55.
Chang, C. C. and Tsu, S. M., (1997): "A
Seal-Based Key Distribution Scheme," Proceedings
of National Computer Symposium 1997, Taichung,
Taiwan, Dec. 1997,
pp.c120-c125.
56.
Chang, C. C. and Tsu, S. M., (1997): "An
Improvement on a Probabilistic Encryption Scheme," Proceedings
of National Computer Symposium 1997, Taichung,
Taiwan, Dec. 1997,
pp.c132-c135.
57.
Wang, C. T., Lin, C. H.,
and Chang, C. C., (1997): "Group-Oriented
Threshold Signature Schemes with Traceable Signers," Proceedings
of National Computer Symposium 1997, Taichung, Taiwan, Dec.
1997, pp.c114-c119.
58. Chen, C. Y., Chang,
C. C., and Yang, W. P., (1998):
"Cryptanalysis of the LUC Public Key Cryptosystem," Proceedings
of 8th Information Security Conference,
Kaohsiung, Taiwan,
May 1998, pp. 49-58.
59.
Chen, C. Y., Chang, C.
C., and Yang, W. P., (1998):
"Cryptoanalyzing the RSA-like Schemes by Using the Continue Fraction
Method," to appear in Proceedings
of 8th Information Security Conference,
Kaohsiung, Taiwan,
May 1998, pp. 81-90.
60. Chen, T. S. and Chang, C. C., (1998): "A Simple and Efficient Method for LBG Codebook Initialization," Proceedings of 1998 Conference on Computer Vision, Graphics, and Image Processing, Taipei, 1998, pp. 44-47.
61.
Chen, C. Y., Chang, C. C., (1999): "A Fast Modular Multiplication Algorithm for Computing
the Product AB Modulo N," Proceedings
of the
9th Information Security Conference,
Taichung, Taiwan, May 1999, pp. 41-45.
62.
Chen, C. Y., Chang, C. C., and
Yang, W. P., (1999): "A New
Subliminal Channel without Sharing a Secret Key,"
Proceedings of the
9th Information Security Conference,
Taichung, Taiwan, May 1999, pp. 237-240.
63
.
Chang, C. C., Wang, C. H., Liou, F. Y., and Sun, H. M., (1999):
"Remarks on a Digital Signature Scheme Based on Error-Correcting
Codes," Proceedings of the
9th Information Security Conference, Taichung, Taiwan, May 1999,
pp. 157-164.
64.
Hwang, R. J. and Chang, C. C., (1999): "Image Watermarking
Using Visual Cryptograph," Proceedings
of the 9th Information
Security Conference, Taichung, Taiwan, May 1999.
65.
Chen, C. Y., Hwang, S. J., and Chang, C. C., (1999): "New
Multisignature Scheme Based on One-Way Functions," Proceedings
of the 4th Multimedia Technology and Applications Symposium,
April 1999, Kaoshung, Taiwan, pp.332-240.
66
.
Hung, K. L., Chang, C. C. and Chen, T. S., (1999): "A Side
Match Reconstruction Method Using Tree-Structured VQ for Transmition Images
Progressively," Proceedings of the
National Computer Symposium, Dec. 1999, pp. C-5--C-12.
67
.
Lee, W. B. and Chang, C. C., (2000): "On the Security of the
Digital Signature Based on Factoring and Discrete Logarithm," Proceedings
of The Tenth National Conference on Information Security, Hualiam, Taiwan,
May 2000, pp. 8-12.
68.
Chen, C. Y., Chang, C. C. and Hsueh, C. C., (2001): ¡§A Fast
Modular Multiplication Algorithm with the Fixed Window Size,¡¨ to appear in the
Proceedings of the Tenth Conference National Defence Technology, Taoyuan,
Taiwan, 2001.