Ph. D. Students (graduated)
Ph. D. Students (in school)
![]() |
![]() |
![]() |
Wu, Ming-Ni | Lee, Yu-Chiang | Lin, Chi-Nan |
![]() |
![]() |
![]() |
Lin, Chin-Yang | Yang, Jen-Ho | Chou, Yung-Chen |
![]() |
![]() |
![]() |
Lee, Jung-San | Wu, Wen-Juan | Chen, Chang-Chu |
![]() |
![]() |
|
Wu, Chia-Chi | Lin, Chih-Wei | Lin, Pei-Yu |
![]() |
![]() |
|
Tai, Wei-Liang | Hsieh, Yi-Pei | Chen, Yi-Hui |
![]() |
![]() |
![]() |
Tsai, Hao-Chuan | Lee, Chia-Yin | Pai, Shang-Chin |
![]() |
||
Lin, Keng-Chu | Tsou, Chih-Chiang |
International Exchange Student
Jochen Penne |
Master Students (graduated)
No. | Name | Thesis Title | Completion Date |
1. | Su, D. H. | Some Properties of Multi-Attribute File System Based upon Multiple Key Hashing Functions for Partial Match Queries | 5/1984 |
2. | Lian, L. S. | Toward the Strict Optimality Study on Concurrent Disk Accessing | 5/1984 |
3. | Shen, Jau-Ji | Performance Analysis of the Disk Modulo Allocation Method for Concurrent Accessing on Multiple Disk System | 5/1984 |
4. | Liang, J. | Performance Analysis of the k-nearest Neighbor Search Technique Based upon Multiple Key Hashing Functions | 5/1984 |
5. | Yuan, S. T. | A Parallel Scheme of the Closest Pair Problem and All Closest Points Problem for VLSI Systems | 5/1985 |
6. | Tsai, W. H. | A Branch and Bound Algorithm for Allocating Multi-attribute File Systems | 5/1985 |
7. | Shieh, J. C. | On the Design of Letter Oriented Minimal Perfect Hashing Functions | 5/1985 |
8. | Hung, M. F. | An Access Control Mechanism for Information Protection System | 5/1986 |
9. | Chen, C. P. | A Key-Lock-Pair Mechanism Based on Generalized Chinese Remainder Theorem | 5/1986 |
10. | Chen, H. Y. | Symbolic Gray Code as a Data Allocation Scheme for Two-Disk Systems | 5/1986 |
11. | Hsiao, M. D. | The Study of File Allocation Strategies for Concurrent Retrieval | 5/1986 |
12. | Lee, Y. P. | A Letter Oriented Minimal Perfect Rehashing Scheme Based upon Reciprocal Hashing | 5/1986 |
13. | Lin, C. H. | A Strategy of Information Secure Broadcasting | 5/1986 |
14. | Cheng, W. Y. | The Study of a User-Hierarchy Mechanism for Computer System Resources | 5/1987 |
15 | Chang, C. H. | A Dynamic Access Control Scheme Based upon Chinese Remainder Theorem | 5/1987 |
16 | Chen, C. H. | The Study of Data Missing and Data Integrity | 5/1987 |
17 | Wu, H.C. | The Design of a Minimal Perfect Hashing Function for Mandarin Symbols System | 5/1987 |
18 | Wang, C. T. | The Development of a Computer Assisted Instruction System for Structure Assembly Languages | 5/1987 |
19 | Mong, I. H. | A New Data Compression Scheme Based upon Lempel-Ziv Universal Algorithm | 5/1988 |
20 | Chang, S. S. | Optimal Properties of Binary Cartesian Product File System | 5/1988 |
21 | Chen, C. H. | Organizing Distributed Data Based for Parallel Searching | 5/1988 |
22 | Hsiao, J. Y. | Strings Near-Matching Techniques for Large Textual Files | 5/1988 |
23 | Leu, D. F. | Multi-key Sorting as a File Organization Scheme When Queries Are Not Equally Likely | 5/1988 |
24 | Chou, A. Y. H. | The Study of File Systems Suitable for Queries | 5/1989 |
25 | Chow, L. C. | The Study of Visual Form Transformation System | 5/1989 |
26 | Wu, T. C. | The Studies of Computer Authentication and Secure Broadcasting Based upon Euclidean Geometry | 5/1989 |
27 | Liao, H. T. | A New Approach to Assign Cryptographic Keys in a Tree Structure for Access Control | 5/1989 |
28 | Wu, L. H. | An Arithmetic Coding Oriented Single Key Access Control Scheme | 5/1989 |
29 | Wu, C. H. | The Study of Security Technologies for Broadcasted Network Systems | 5/1989 |
30 | Lin, J. C. | A Fast Spatial Match Accessing Scheme for Symbolic Pictures | 5/1990 |
31 | Dai, J. Y. | Sharing a Circular Storage for Multiple Stacks | 5/1990 |
32 | Chen, D. C. | A Modified Arithmetic Coding Scheme Suitable for Binary Search | 5/1990 |
33 | Hwang, S. M. | A Shape Recognition Scheme Based on Relative Distances of Feature Points from the Centroid | 5/1990 |
34 | Lin, J. F. | A Chinese Syllables Compression Scheme Based Upon Perfect Hashing | 5/1990 |
35 | Wang, S. J. | A Dynamic Key-Lock-Pair Access Control Scheme | 5/1991 |
36 | Hwang, R. J. | Controlling Access in Hierarchical Structures Using Cryptographic Keys | 11/1991 |
37 | Hwang, S. J. | Sharing a Dynamic Secret | 11/1991 |
38 | Lee, H.C. | A Solution to Generalized Group Oriented Cryptography | 5/1992 |
39 | Chen, C. Y. | A Dynamic Access Control Scheme Based Upon Ziegler's Row Displacement Method | 5/1992 |
40 | Chen, Y. W. | A Two-Dimensional Shape Recognition Scheme Based on Principal Component Analysis | 5/1992 |
41 | Kowng, H. C. | A Digital Signature Scheme Based Upon Theory of Quadratic Residues | 5/1992 |
42 | Lee, W. B. | On the Design and Implementation of an Analyzer and a Vaccination for Computer Viruses | 5/1993 |
43 | Liou, F. Y. | A Digital Multisignature Scheme Based upon Modified E1Gamal's Public Key Cryptosystem And Its Digital Signature Scheme | 5/1993 |
44 | Wang, C. H. | A Modified Lempel-Ziv-Welch Encoding Scheme Based on the Frequencies of Characters | 5/1993 |
45 | Liao, W. Y. | A Remote password authentication scheme based upon ElGamal's signature scheme | 5/1993 |
46 | Lin, T. H. | A Secure Group-Oriented Secret Sharing Scheme | 5/1993 |
47 | Lee, C. F. | A Greedy Relaxed Generalised Disc Modulo Allocation Method for Multiple Key Hashing Files on Multi-Disc Systems | 5/1994 |
48 | Tsu, S. M. | An Improvement on a Probabilistic Encryption Scheme and Its Applications | 5/1994 |
49 | Jiang, J. H. | A Spatial Filter for Similarity Retrieval | 5/1994 |
50 | Wu, W. B. | A Secure Voting System on a Public Network | 5/1994 |
51 | Horng, W. J. | A Cascade Exponentiation Evaluation Scheme Based on the Lempel-Ziv-Welch Compression Algorithm | 5/1994 |
52 | Lin, D. C. | Utilizing the Concept of Longest Common Subsequence to Retrieve Similar Chinese Characters | 5/1995 |
53 | Li, W. T. | A Fast Search Algorithm for Vector Quantization Based Upon Principal Component Analysis Technique | 5/1995 |
54 | Leu, JJyh-Jong | The Performance Analysis of Bloom and Random Filters | 5/1995 |
55 | Kuo, C. L. | Fast Codeword Search Techniques for Vector Quantization | 6/1996 |
56 | Chou, J. S. | An Image Coding Scheme Using Prediction of Euclidean Distance Computation on a Smaller Codebook | 6/1996 |
57 | Sung, C. H. | Locally Adaptive Schemes for Data Compression Using Multilist Structure | 6/1997 |
58 | Chen, L. L. | Some Searching Techniques for Block Motion Estimation for Video Compression | 6/1997 |
59 | Jau, J. J. | Image Compression and Transmission Using Vector Quantization and S-tree | 6/1998 |
60 | Hwang, P. C. | Accessing Shared Secrets in a Hierarchy | 6/1998 |
61 | Shine, F. C. | Some Techniques of Image Compression and Transmission Using Vector Quantization and Bit-plane | 6/1998 |
62 | Chen, Kuo-Lun | Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t,n) Threshold Scheme | 6/1999 |
63 | Kuo, Y. T. | Fast Algorithm for Some Meta-Operations in Cryptographic Systems | 6/1999 |
64 | Chung, P. F. | Two Copyright Protection Scheme for Digital Images | 6/2000 |
65 | Xiao, G. X. | Two Prediction Methods for Image Compression and Progressive Image Transmission | 6/2000 |
66 | Lin, Y. | Image Compression and Copyright Protection Using Edge Detection Methods | 6/2000 |
67 | Hsia, H.C. | Two Hiding Techniques for Data Security and Image Copyright Protection | 6/2000 |
68 | Chuang, J. C. | The Study of Image Tampering Detection | 6/2000 |
69 | Hsieh, C. P. | The Study of Denoising Technique for Digital Images | 6/2001 |
70 | Lu, P. W. | The Application of Vector Quantization Techniques to Digital Image Tamper Proofing | 6/2001 |
71 | Jiang,J. L. | The Design of Some Filter for Image Denoising | 6/2001 |
72 | Yeh, J. C. | The Study of Copyright Protection Schemes for Digital Images | 6/2001 |
73 | Chan, C. S. | Some Data Hiding Techniques for Digital Images | 6/2001 |
74 | Yu, T. X. | The Study of Digital Image Ciphering and Hiding Mechanisms | 6/2002 |
75 | Pan,Y. P. | The Study of Multisecret Sharing Schemes and Their Applications to Access Control in a User Hierarchy | 6/2002 |
76 | Chung, C. Y. | Some Protocols for Passing Messages Securely and Protecting Rightful Ownership | 6/2002 |
77 | Chen, G. I. | TheStudy of Lossless Image Compression an Image Magnification | 6/2002 |
78 | Su, Y. Y. | Two Color Image Quantization Schemes for Non-true-color Display | 6/2002 |
79 | Lee, C. F. | Code Transformation Between Various Image Splitting Tree Representations and Chinese Calligraphy Transmission Progressively Based on Quadtrees | 6/2003 |
80 | Wu, W. J. | Data Hiding and Content Retrieval in Digital Image Database | 6/2003 |
81 | Chen, G. M. | Lossless Vector Quantization Indices Compression and Information Hiding Schemes Based on Search-Order Coding | 6/2003 |
82 | Liao, C. T. | Some Image Compression and Data Protection Techniques Using Support Vector Machines | 6/2003 |
83 | Chou, H. C. | Some Studies on Digital Image Steganographic and Watermarking Techniques | 7/2003 |
84 | Hu, Y. H. | Retrieving Digital Images from Frequency Domain Transformed Databases | 6/2004 |
85 | Tai. W. L. | Hiding a Digital Image into Two Cover Images | 6/2004 |
86 | Liu, Y. L. | The Techniques of Digital Image Transmission and Authentication | 6/2004 |
87 | Lin, P. Y. | Two Data Hiding Schemes for Grayscale Images and Image Compression Codes | 6/2004 |
88 | Tseng, Chun-Sen | Various Secret Embedding Schemes for Binary and Gray Level Techniques | 6/2005 |
89 | Wang, Yu-Zheng | Some Image Steganography Schemes with High Embedding Capacity | 6/2005 |
90 | Yeh, Jun-Bin | Hiding Secrets in Data Compression Codes | 6/2005 |
91 | Kao, Chia-Lin | On Authentication Protocols for Communication Networks | 6/2005 |
92 | Kuo, Jui-Yi | Some Password Authentication Schemes Using Smart Cards for Single and Multiple Server Architectures | 6/2005 |
93 | Lin, Keng-Chu | Some Efficient Techniques for Secure Peer-to-Peer Networking | 6/2005 |
Master Students (in school)
![]() |
![]() |
![]() |
Chang, Pen-Yi | Shue, Yu-Wei | Cheng, Yi-Fang |
![]() |
![]() |
![]() |
Fan, Yi-Hsuan | Chiu, Yen-Chang | Chang, Kai-Jie |
![]() |
![]() |
![]() |
Lin, Shih-Yi | Li, Kuan-Ming | Chang, Shin-Chang |
![]() |
![]() |
![]() |
Cheng, Ting-Fang | Lin, Chia-Hsuan | Yah, Chia-Ming |
![]() |
||
Lee, Yi-Ta |