What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chin-Chen Chang
Google Scholar
42
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage.
Hui Tian
Mengcheng Wang
Hanyu Quan
Chin-Chen Chang
Athanasios V. Vasilakos
2025
journals/istr
Crypto-space reversible data hiding for 3D mesh models with k-Degree neighbor diffusion.
Kai Gao
Ji-Hwei Horng
Ching-Chun Chang
Chin-Chen Chang
2025
journals/istr
Hiding information in encrypted images with ( ) secret sharing for IoT and cloud services.
Yijie Lin
Chia-Chen Lin
Ching-Chun Chang
Chin-Chen Chang
2024
journals/istr
) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix.
Yijie Lin
Chia-Chen Lin
Jui-Chuan Liu
Chin-Chen Chang
2024
journals/istr
A divide-and-conquer approach to privacy-preserving high-dimensional big data release.
Rong Wang
Junchuan Liang
Siyu Wang
Chin-Chen Chang
2023
journals/istr
Crypto-space image steganography based on blind flipping.
Jiang-Yi Lin
Chin-Chen Chang
Ji-Hwei Horng
2023
journals/tifs
Separable Convolution Network With Dual-Stream Pyramid Enhanced Strategy for Speech Steganalysis.
Yiqin Qiu
Hui Tian
Haizhou Li
Chin-Chen Chang
Athanasios V. Vasilakos
2023
conf/ih
Perceptual Robust Hashing for Video Copy Detection with Unsupervised Learning.
Gejian Zhao
Chuan Qin
Xiangyang Luo
Xinpeng Zhang
Chin-Chen Chang
2022
journals/istr
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction.
Sisheng Chen
Chin-Chen Chang
2022
journals/istr
Steganalysis of adaptive multi-rate speech streams with distributed representations of codewords.
Yiqin Qiu
Hui Tian
Lili Tang
Wojciech Mazurczyk
Chin-Chen Chang
2020
journals/compsec
Privacy-preserving high-dimensional data publishing for classification.
Rong Wang
Yan Zhu
Chin-Chen Chang
Qiang Peng
2020
journals/istr
An efficient general data hiding scheme based on image interpolation.
Yong-qing Chen
Wei-jiao Sun
Liyao Li
Chin-Chen Chang
Xu Wang
2016
journals/istr
A magic cube based information hiding scheme of large payload.
Qiong Wu
Chen Zhu
Jianjun Li
Chin-Chen Chang
Zhi-Hui Wang
2015
conf/asiajcis
Secure Electronic Coupons.
Chin-Chen Chang
Iuon-Chang Lin
Yi-Lun Chi
2013
journals/tifs
A Novel Electronic English Auction System With a Secure On-Shelf Mechanism.
Chin-Chen Chang
Ting-Fang Cheng
Wei-yi Chen
2012
conf/asiajcis
Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability.
Chin-Chen Chang
Hai-Duong Le
Ching-Hsiang Chang
2012
conf/asiajcis
Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction.
Chin-Chen Chang
Ngoc-Tu Huynh
Chia-Chun Lin
2010
journals/compsec
An efficient and fair buyer-seller fingerprinting scheme for large scale networks.
Chin-Chen Chang
Hao-Chuan Tsai
Yi-Pei Hsieh
2009
journals/compsec
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Jen-Ho Yang
Chin-Chen Chang
2009
journals/tifs
Self-verifying visual secret sharing using error diffusion and interpolation techniques.
Chin-Chen Chang
Chia-Chen Lin
T. Hoang Ngan Le
Hoai Bac Le
2007
journals/tifs
Lossless Data Embedding With High Embedding Capacity Based on Declustering for VQ-Compressed Codes.
Chin-Chen Chang
Yi-Pei Hsieh
Chih-Yang Lin
2007
conf/icics
A Semi-blind Watermarking Based on Discrete Wavelet Transform.
Chin-Chen Chang
Yung-Chen Chou
Tzu-Chuen Lu
2006
journals/compsec
An anonymous voting mechanism based on the key exchange protocol.
Chin-Chen Chang
Jung-San Lee
2006
journals/tifs
Reversible Steganography for VQ-Compressed Images Using Side Matching and Relocation.
Chin-Chen Chang
Chih-Yang Lin
2006
conf/wisa
A Novel Key Agreement Scheme in a Multiple Server Environment.
Chin-Chen Chang
Chia-Chi Wu
2005
journals/compsec
A novel digital image watermarking scheme based on the vector quantization technique.
Hsien-Chu Wu
Chin-Chen Chang
2004
journals/compsec
A fair and secure mobile agent environment based on blind signature and proxy host.
Min-Hui Lin
Chin-Chen Chang
Yan-Ren Chen
2003
journals/compsec
Efficient anonymous auction protocols with freewheeling bids.
Chin-Chen Chang
Ya-Fen Chang
2003
journals/compsec
A flexible date-attachment scheme on e-cash.
Chin-Chen Chang
Yeu-Pong Lai
2003
conf/icics
An Efficient Convertible Authenticated Encryption Scheme and Its Variant.
Hui-Feng Huang
Chin-Chen Chang
2001
conf/icics
Cryptanalysis of the Improved User Efficient Blind Signatures.
Chin-Chen Chang
Iuon-Chang Lin
2001
conf/icics
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.
Chin-Chen Chang
Kuo-Feng Hwang
1998
conf/pkc
A Scheme for Obtaining a Message from the Digital Multisignature.
Chin-Chen Chang
Jyh-Jong Leu
Pai-Cheng Huang
Wei-Bin Lee
1996
conf/acisp
A group-oriented (t, n) undeniable signature scheme without trusted center.
Chu-Hsing Lin
Ching-Te Wang
Chin-Chen Chang
1996
conf/acisp
A dynamic secret sharing scheme with cheater detection.
Shin-Jia Hwang
Chin-Chen Chang
1995
journals/compsec
A cryptographic implementation for dynamic access control in a user hierarchy.
Hui-Min Tsai
Chin-Chen Chang
1994
journals/compsec
Authentication and protection of public keys.
Chi-Sung Laih
Wen-Hong Chiou
Chin-Chen Chang
1994
journals/compsec
A scheme to determine the relationship between two users in a hierarchy.
Chin-Chen Chang
Jinn-Ke Jan
Daniel J. Buehrer
1994
journals/compsec
Access control with binary keys.
Chin-Chen Chang
Jao-Ji Shen
Tzong-Chen Wu
1992
conf/sec
A Solution to Generalized Group Oriented Cryptography.
Chin-Chen Chang
Horng-Chin Lee
1992
conf/asiacrypt
The Design of a Conference Key Distribution System.
Chin-Chen Chang
Tzong-Chen Wu
C. P. Chen
1991
journals/compsec
A dynamic key-lock-pair access control scheme.
Jinn-Ke Jan
Chin-Chen Chang
S. J. Wang
Coauthors
Athanasios V. Vasilakos
(2)
C. P. Chen
(1)
Chen Zhu
(1)
Chi-Sung Laih
(1)
Chia-Chen Lin
(3)
Chia-Chi Wu
(1)
Chia-Chun Lin
(1)
Chih-Yang Lin
(2)
Chin-Chen Chang
(42)
Ching-Chun Chang
(2)
Ching-Hsiang Chang
(1)
Ching-Te Wang
(1)
Chu-Hsing Lin
(1)
Chuan Qin
(1)
Daniel J. Buehrer
(1)
Gejian Zhao
(1)
Hai-Duong Le
(1)
Haizhou Li
(1)
Hanyu Quan
(1)
Hao-Chuan Tsai
(1)
Hoai Bac Le
(1)
Horng-Chin Lee
(1)
Hsien-Chu Wu
(1)
Hui Tian
(3)
Hui-Feng Huang
(1)
Hui-Min Tsai
(1)
Iuon-Chang Lin
(2)
Jao-Ji Shen
(1)
Jen-Ho Yang
(1)
Ji-Hwei Horng
(2)
Jiang-Yi Lin
(1)
Jianjun Li
(1)
Jinn-ke Jan
(2)
Jui-Chuan Liu
(1)
Junchuan Liang
(1)
Jung-San Lee
(1)
Jyh-Jong Leu
(1)
Kai Gao
(1)
Kuo-Feng Hwang
(1)
Lili Tang
(1)
Liyao Li
(1)
Mengcheng Wang
(1)
Min-Hui Lin
(1)
Ngoc-Tu Huynh
(1)
Pai-Cheng Huang
(1)
Qiang Peng
(1)
Qiong Wu
(1)
Rong Wang
(2)
S. J. Wang
(1)
Shin-Jia Hwang
(1)
Sisheng Chen
(1)
Siyu Wang
(1)
T. Hoang Ngan Le
(1)
Ting-Fang Cheng
(1)
Tzong-Chen Wu
(2)
Tzu-Chuen Lu
(1)
Wei-Bin Lee
(1)
Wei-jiao Sun
(1)
Wei-yi Chen
(1)
Wen-Hong Chiou
(1)
Wojciech Mazurczyk
(1)
Xiangyang Luo
(1)
Xinpeng Zhang
(1)
Xu Wang
(1)
Ya-Fen Chang
(1)
Yan Zhu
(1)
Yan-Ren Chen
(1)
Yeu-Pong Lai
(1)
Yi-Lun Chi
(1)
Yi-Pei Hsieh
(2)
Yijie Lin
(2)
Yiqin Qiu
(2)
Yong-qing Chen
(1)
Yung-Chen Chou
(1)
Zhi-Hui Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to