BibTeX records: Lih-Chyau Wuu

download as .bib file

@article{DBLP:journals/jifs/KuoWKW19,
  author       = {Wen{-}Chung Kuo and
                  Chun{-}Cheng Wang and
                  Shao{-}Hung Kuo and
                  Lih{-}Chyau Wuu},
  title        = {Verifiable data hiding scheme with tamper detection},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {36},
  number       = {2},
  pages        = {1311--1321},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-169902},
  doi          = {10.3233/JIFS-169902},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/KuoWKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/WangKHW18,
  author       = {Chun{-}Cheng Wang and
                  Wen{-}Chung Kuo and
                  Yu{-}Chih Huang and
                  Lih{-}Chyau Wuu},
  title        = {A high capacity data hiding scheme based on re-adjusted {GEMD}},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {5},
  pages        = {6327--6341},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4541-0},
  doi          = {10.1007/S11042-017-4541-0},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/WangKHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/KuoSHW17,
  author       = {Wen{-}Chung Kuo and
                  Po{-}Wei Shih and
                  Yu{-}Chih Huang and
                  Lih{-}Chyau Wuu},
  title        = {Anonymous and Authentication Protocol For Multi-Server},
  journal      = {Inf. Technol. Control.},
  volume       = {46},
  number       = {2},
  pages        = {235--245},
  year         = {2017},
  url          = {https://doi.org/10.5755/j01.itc.46.2.13781},
  doi          = {10.5755/J01.ITC.46.2.13781},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/KuoSHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuoLWWH16,
  author       = {Wen{-}Chung Kuo and
                  Jyun{-}Jia Li and
                  Chun{-}Cheng Wang and
                  Lih{-}Chyau Wuu and
                  Yu{-}Chih Huang},
  title        = {An Improvement Data Hiding Scheme Based on Formula Fully Exploiting
                  Modification Directions and Pixel Value Differencing Method},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {136--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.20},
  doi          = {10.1109/ASIAJCIS.2016.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuoLWWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jihmsp/KuoLWW15,
  author       = {Wen{-}Chung Kuo and
                  Po{-}Yu Lai and
                  Chun{-}Cheng Wang and
                  Lih{-}Chyau Wuu},
  title        = {A Formula Diamond Encoding Data Hiding Scheme},
  journal      = {J. Inf. Hiding Multim. Signal Process.},
  volume       = {6},
  number       = {6},
  pages        = {1167--1176},
  year         = {2015},
  url          = {http://bit.kuas.edu.tw/\%7Ejihmsp/2015/vol6/JIH-MSP-2015-06-009.pdf},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jihmsp/KuoLWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/KuoKCW15,
  author       = {Wen{-}Chung Kuo and
                  Shao{-}Hung Kuo and
                  Hong{-}Yi Chang and
                  Lih{-}Chyau Wuu},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Isao Echizen},
  title        = {Authenticated Secret Sharing Scheme Based on {GMEMD}},
  booktitle    = {Digital-Forensics and Watermarking - 14th International Workshop,
                  {IWDW} 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9569},
  pages        = {395--405},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31960-5\_32},
  doi          = {10.1007/978-3-319-31960-5\_32},
  timestamp    = {Thu, 28 May 2020 12:51:39 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdw/KuoKCW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ChenKW14,
  author       = {Bae{-}Ling Chen and
                  Wen{-}Chung Kuo and
                  Lih{-}Chyau Wuu},
  title        = {Robust smart-card-based remote user password authentication scheme},
  journal      = {Int. J. Commun. Syst.},
  volume       = {27},
  number       = {2},
  pages        = {377--389},
  year         = {2014},
  url          = {https://doi.org/10.1002/dac.2368},
  doi          = {10.1002/DAC.2368},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ChenKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WuuHK14,
  author       = {Lih{-}Chyau Wuu and
                  Chi{-}Hsiang Hung and
                  Wen{-}Chung Kuo},
  title        = {Group Key Management based on (2, 2) Secret Sharing},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {3},
  pages        = {1144--1156},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.03.025},
  doi          = {10.3837/TIIS.2014.03.025},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/WuuHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/KuoCW13,
  author       = {Wen{-}Chung Kuo and
                  Bae{-}Ling Chen and
                  Lih{-}Chyau Wuu},
  title        = {Secure Indefinite-Index {RFID} Authentication Scheme with Challenge-Response
                  Strategy},
  journal      = {Inf. Technol. Control.},
  volume       = {42},
  number       = {2},
  pages        = {124--130},
  year         = {2013},
  url          = {https://doi.org/10.5755/j01.itc.42.2.1615},
  doi          = {10.5755/J01.ITC.42.2.1615},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itc/KuoCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itc/ChenKW12,
  author       = {Bae{-}Ling Chen and
                  Wen{-}Chung Kuo and
                  Lih{-}Chyau Wuu},
  title        = {A Secure Password-Based Remote User Authentication Scheme without
                  Smart Cards},
  journal      = {Inf. Technol. Control.},
  volume       = {41},
  number       = {1},
  pages        = {53--59},
  year         = {2012},
  url          = {https://doi.org/10.5755/j01.itc.41.1.975},
  doi          = {10.5755/J01.ITC.41.1.975},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itc/ChenKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WuuHC12,
  author       = {Lih{-}Chyau Wuu and
                  Chi{-}Hsiang Hung and
                  Chia{-}Ming Chang},
  title        = {Quorum-based Key Management Scheme in Wireless Sensor Networks},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {6},
  number       = {9},
  pages        = {2442--2454},
  year         = {2012},
  url          = {https://doi.org/10.3837/tiis.2012.09.027},
  doi          = {10.3837/TIIS.2012.09.027},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/WuuHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuimc/WuuHC12,
  author       = {Lih{-}Chyau Wuu and
                  Chi{-}Hsiang Hung and
                  Chia{-}Ming Chang},
  editor       = {Suk{-}Han Lee and
                  Lajos Hanzo and
                  Roslan Ismail and
                  Dongsoo S. Kim and
                  Min Young Chung and
                  Sang{-}Won Lee},
  title        = {Quorum-based key management scheme in wireless sensor networks},
  booktitle    = {The 6th International Conference on Ubiquitous Information Management
                  and Communication, {ICUIMC} '12, Kuala Lumpur, Malaysia, February
                  20-22, 2012},
  pages        = {15:1--15:6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2184751.2184770},
  doi          = {10.1145/2184751.2184770},
  timestamp    = {Thu, 23 May 2019 16:33:14 +0200},
  biburl       = {https://dblp.org/rec/conf/icuimc/WuuHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WuuHY11,
  author       = {Lih{-}Chyau Wuu and
                  Chi{-}Hsiang Hung and
                  Jyun{-}Yan Yang},
  title        = {{IP} Traceback Based on Chinese Remainder Theorem},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {27},
  number       = {6},
  pages        = {1985--1999},
  year         = {2011},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2011/201111\_12.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WuuHY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgec/ChenKW11,
  author       = {Bae{-}Ling Chen and
                  Wen{-}Chung Kuo and
                  Lih{-}Chyau Wuu},
  editor       = {Junzo Watada and
                  Pau{-}Choo Chung and
                  Jim{-}Min Lin and
                  Chin{-}Shiuh Shieh and
                  Jeng{-}Shyang Pan},
  title        = {Security on the Design of {RFID} Access Control Protocol Using the
                  Strategy of Indefinite-Index and Challenge-Response},
  booktitle    = {Fifth International Conference on Genetic and Evolutionary Computing,
                  {ICGEC} 2011, Kinmen, Taiwan / Xiamen, China, August 29 - September
                  1, 2011},
  pages        = {9--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICGEC.2011.10},
  doi          = {10.1109/ICGEC.2011.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgec/ChenKW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/WuuLK10,
  author       = {Lih{-}Chyau Wuu and
                  Wen{-}Bin Li and
                  Wen{-}Chung Kuo},
  title        = {Detour Routing Protocol for Geographic Sensor Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Broadband and
                  Wireless Computing, Communication and Applications, {BWCCA} 2010,
                  November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan
                  (In conjunction with the 3PGCIC-2010 International Conference)},
  pages        = {505--510},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/BWCCA.2010.122},
  doi          = {10.1109/BWCCA.2010.122},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bwcca/WuuLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KuoCLW10,
  author       = {Wen{-}Chung Kuo and
                  Jiin{-}Chiou Cheng and
                  Yen{-}Hung Lin and
                  Lih{-}Chyau Wuu},
  editor       = {Tai{-}Hoon Kim and
                  Young{-}Hoon Lee and
                  Byeong Ho Kang and
                  Dominik Slezak},
  title        = {High Flexible Sanitizing Signature Scheme Based on Bilinear Maps},
  booktitle    = {Future Generation Information Technology - Second International Conference,
                  {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6485},
  pages        = {402--412},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17569-5\_40},
  doi          = {10.1007/978-3-642-17569-5\_40},
  timestamp    = {Mon, 04 Nov 2019 12:36:13 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/KuoCLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iih-msp/KuoKW10,
  author       = {Wen{-}Chung Kuo and
                  Shao{-}Hung Kuo and
                  Lih{-}Chyau Wuu},
  editor       = {Isao Echizen and
                  Jeng{-}Shyang Pan and
                  Dieter W. Fellner and
                  Alexander Nouak and
                  Arjan Kuijper and
                  Lakhmi C. Jain},
  title        = {High Embedding Reversible Data Hiding Scheme for {JPEG}},
  booktitle    = {Sixth International Conference on Intelligent Information Hiding and
                  Multimedia Signal Processing {(IIH-MSP} 2010), Darmstadt, Germany,
                  15-17 October, 2010, Proceedings},
  pages        = {74--77},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IIHMSP.2010.26},
  doi          = {10.1109/IIHMSP.2010.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iih-msp/KuoKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/KuoLW10,
  author       = {Wen{-}Chung Kuo and
                  Po{-}Yu Lai and
                  Lih{-}Chyau Wuu},
  title        = {Adaptive reversible data hiding based on histogram},
  booktitle    = {10th International Conference on Intelligent Systems Design and Applications,
                  {ISDA} 2010, November 29 - December 1, 2010, Cairo, Egypt},
  pages        = {1376--1381},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISDA.2010.5687102},
  doi          = {10.1109/ISDA.2010.5687102},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/isda/KuoLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KuoCLW10,
  author       = {Wen{-}Chung Kuo and
                  Jiin{-}Chiou Cheng and
                  Yen{-}Hung Lin and
                  Lih{-}Chyau Wuu},
  editor       = {Christopher C. Yang and
                  Daniel Zeng and
                  Ke Wang and
                  Antonio Sanfilippo and
                  Herbert H. Tsang and
                  Min{-}Yuh Day and
                  Uwe Gl{\"{a}}sser and
                  Patricia L. Brantingham and
                  Hsinchun Chen},
  title        = {Digitally signed document flexible sanitizing scheme based on bilinear
                  maps},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2010, Vancouver, BC, Canada, May 23-26, 2010, Proceedings},
  pages        = {172},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISI.2010.5484747},
  doi          = {10.1109/ISI.2010.5484747},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KuoCLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WuuCHK09,
  author       = {Lih{-}Chyau Wuu and
                  Yen{-}Ju Chen and
                  Chi{-}Hsiang Hung and
                  Wen{-}Chung Kuo},
  title        = {Zero-Collision {RFID} Tags Identification Based on {CDMA}},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {513--516},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.216},
  doi          = {10.1109/IAS.2009.216},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WuuCHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/his/KuoWSK09,
  author       = {Wen{-}Chung Kuo and
                  Lih{-}Chyau Wuu and
                  Chia{-}Nian Shyi and
                  Shao{-}Hung Kuo},
  editor       = {Ge Yu and
                  Mario K{\"{o}}ppen and
                  Shyi{-}Ming Chen and
                  Xiamu Niu},
  title        = {A Data Hiding Scheme with High Embedding Capacity Based on General
                  Improving Exploiting Modification Direction Method},
  booktitle    = {9th International Conference on Hybrid Intelligent Systems {(HIS}
                  2009), August 12-14, 2009, Shenyang, China},
  pages        = {69--72},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HIS.2009.226},
  doi          = {10.1109/HIS.2009.226},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/his/KuoWSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/WangCW08,
  author       = {Wen{-}Fong Wang and
                  Yi{-}Shian Chen and
                  Lih{-}Chyau Wuu},
  editor       = {Yan Ma and
                  Deokjai Choi and
                  Shingo Ata},
  title        = {An Adaptive Control Scheme of Reserved Bandwidth for {RPR} in Steering
                  Mode},
  booktitle    = {Challenges for Next Generation Network Operations and Service Management,
                  11th Asia-Pacific Network Operations and Management Symposium, {APNOMS}
                  2008, Beijing, China, October 22-24, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5297},
  pages        = {507--510},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88623-5\_63},
  doi          = {10.1007/978-3-540-88623-5\_63},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/apnoms/WangCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WuuLC07,
  author       = {Lih{-}Chyau Wuu and
                  Tzong{-}Jye Liu and
                  Kuo{-}Ming Chen},
  title        = {A longest prefix first search tree for {IP} lookup},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {12},
  pages        = {3354--3367},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.01.023},
  doi          = {10.1016/J.COMNET.2007.01.023},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WuuLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WuuHC07,
  author       = {Lih{-}Chyau Wuu and
                  Chi{-}Hsiang Hung and
                  Sout{-}Fong Chen},
  title        = {Building intrusion pattern miner for Snort network intrusion detection
                  system},
  journal      = {J. Syst. Softw.},
  volume       = {80},
  number       = {10},
  pages        = {1699--1715},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jss.2006.12.546},
  doi          = {10.1016/J.JSS.2006.12.546},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/WuuHC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciit/WuuLY07,
  author       = {Lih{-}Chyau Wuu and
                  Tzong{-}Jye Liu and
                  Jyun{-}Yan Yang},
  editor       = {Reda Alhajj},
  title        = {{IP} traceback based on chinese remainder theorem},
  booktitle    = {Proceedings of the Sixth {IASTED} International Conference on Communications,
                  Internet, and Information Technology, July 2-4, 2007, Banff, Alberta,
                  Canada},
  pages        = {222--227},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2007},
  timestamp    = {Tue, 26 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ciit/WuuLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoscale/HuangLCDW07,
  author       = {Hsiang{-}Lun Huang and
                  Tzong{-}Jye Liu and
                  Kuong{-}Ho Chen and
                  Chyi{-}Ren Dow and
                  Lih{-}Chyau Wuu},
  editor       = {Jianzhong Li and
                  Wang{-}Chien Lee and
                  Fabrizio Silvestri},
  title        = {A polymorphic shellcode detection mechanism in the network},
  booktitle    = {Proceedings of the 2nf International Conference on Scalable Information
                  Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {304},
  pages        = {64},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.4108/infoscale.2007.225},
  doi          = {10.4108/INFOSCALE.2007.225},
  timestamp    = {Wed, 28 Nov 2018 12:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/infoscale/HuangLCDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WuuLW06,
  author       = {Lih{-}Chyau Wuu and
                  Chih{-}Ming Lin and
                  Wen{-}Fong Wang},
  title        = {Anonymous and Transferable Coins in Pay-Fair Ecommerce},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {89-D},
  number       = {12},
  pages        = {2950--2956},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietisy/e89-d.12.2950},
  doi          = {10.1093/IETISY/E89-D.12.2950},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WuuLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/LiuW06,
  author       = {Tzong{-}Jye Liu and
                  Lih{-}Chyau Wuu},
  title        = {Randomized three-state alternator for uniform rings},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {66},
  number       = {10},
  pages        = {1347--1351},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.jpdc.2006.05.009},
  doi          = {10.1016/J.JPDC.2006.05.009},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/LiuW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WuuCL05,
  author       = {Lih{-}Chyau Wuu and
                  Kuo{-}Ming Chen and
                  Tzong{-}Jye Liu},
  title        = {A longest prefix first search tree for {IP} lookup},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2005, Seoul, Korea, 16-20 May 2005},
  pages        = {989--993},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICC.2005.1494497},
  doi          = {10.1109/ICC.2005.1494497},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WuuCL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WangWH03,
  author       = {Ting{-}Yuan Wang and
                  Lih{-}Chyau Wuu and
                  Shing{-}Tsaan Huang},
  title        = {A Scalable Core Migration Protocol for Dynamic Multicast Tree},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {19},
  number       = {3},
  pages        = {479--501},
  year         = {2003},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2003/200305\_06.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WangWH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/WangWH02,
  author       = {Ting{-}Yuan Wang and
                  Lih{-}Chyau Wuu and
                  Shing{-}Tsaan Huang},
  title        = {A Scalable Core Migration Protocol for Dynamic Multicast Tree},
  booktitle    = {9th International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2002, Taiwan, ROC, December 17-20, 2002},
  pages        = {48},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICPADS.2002.1183377},
  doi          = {10.1109/ICPADS.2002.1183377},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/WangWH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WuuLS01,
  author       = {Lih{-}Chyau Wuu and
                  Longsong Lin and
                  Shing{-}Chyi Shiao},
  title        = {Constructing Delay-Bounded Multicast Trees in Computer Networks},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {17},
  number       = {3},
  pages        = {507--524},
  year         = {2001},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2001/200105\_09.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WuuLS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icn/WuuC01,
  author       = {Lih{-}Chyau Wuu and
                  Hui{-}Chun Chen},
  editor       = {Pascal Lorenz},
  title        = {A Scalable Framework for Secure Group Communication},
  booktitle    = {Networking - {ICN} 2001, First International Conference, Colmar, France,
                  July 9-13, 2001 Proceedings, Part 2},
  series       = {Lecture Notes in Computer Science},
  volume       = {2094},
  pages        = {225--238},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47734-9\_23},
  doi          = {10.1007/3-540-47734-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/icn/WuuC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/LinLW00,
  author       = {Longsong Lin and
                  Ming{-}Shou Liu and
                  Lih{-}Chyau Wuu},
  title        = {Resource reservation and packet scheduling for prioritized delay-bounded
                  multicast},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networks 2000:
                  Networking Trends and Challenges in the New Millennium, {ICON} 2000,
                  Singapore, September 5-8, 2000},
  pages        = {341--345},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICON.2000.875811},
  doi          = {10.1109/ICON.2000.875811},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/LinLW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/WuuLLH00,
  author       = {Lih{-}Chyau Wuu and
                  Ming{-}Shou Liu and
                  Longsong Lin and
                  Yao{-}Te Huang},
  editor       = {Hamid R. Arabnia},
  title        = {Decentralized Reconfiguration of Multicast Trees on Faulty Networks},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 2000, June 24-29,
                  2000, Las Vegas, Nevada, {USA}},
  publisher    = {{CSREA} Press},
  year         = {2000},
  timestamp    = {Mon, 08 Dec 2003 16:35:08 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/WuuLLH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/broadband/LinLWT99,
  author       = {Longsong Lin and
                  Ming{-}Shou Liu and
                  Lih{-}Chyau Wuu and
                  Chun{-}Yeh Tsai},
  editor       = {Danny H. K. Tsang and
                  Paul J. K{\"{u}}hn},
  title        = {A QoS-Based Resource Reservation Protocol for Priority-Differentiated
                  Delay-Bounded Multicast},
  booktitle    = {Broadband Communications: Convergence of Network Technologies, {IFIP}
                  {TC6} {WG6.2} Fifth International Conference on Broadband Communications
                  {(BC} '99), November 10-12, 1999, Hong Kong},
  series       = {{IFIP} Conference Proceedings},
  volume       = {159},
  pages        = {549--560},
  publisher    = {Kluwer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-0-387-35579-5\_46},
  doi          = {10.1007/978-0-387-35579-5\_46},
  timestamp    = {Fri, 18 Nov 2022 15:40:45 +0100},
  biburl       = {https://dblp.org/rec/conf/broadband/LinLWT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LinWTHL99,
  author       = {Longsong Lin and
                  Lih{-}Chyau Wuu and
                  Chun{-}Yeh Tsai and
                  Yao{-}Te Huang and
                  Ruel{-}Yau Liu},
  title        = {A {CORBA} framework for QoS-guaranteed multicast service in wireless
                  {ATM} networks},
  booktitle    = {1999 {IEEE} International Conference on Communications: Global Convergence
                  Through Communications, {ICC} 1999, Vancouver, BC, Canada, June 18-22,
                  1999},
  pages        = {630--635},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICC.1999.768014},
  doi          = {10.1109/ICC.1999.768014},
  timestamp    = {Mon, 23 Nov 2020 08:36:56 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/LinWTHL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/LiuWLT99,
  author       = {Ming{-}Shou Liu and
                  Lih{-}Chyau Wuu and
                  Longsong Lin and
                  Chun{-}Yeh Tsai},
  title        = {A fair queueing algorithm for multiple-streams delay-bounded services},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networks 1999,
                  {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October
                  1, 1999},
  pages        = {234--241},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICON.1999.796183},
  doi          = {10.1109/ICON.1999.796183},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/LiuWLT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/HuangW97,
  author       = {Shing{-}Tsaan Huang and
                  Lih{-}Chyau Wuu},
  title        = {Self-Stabilizing Token Circulation in Uniform Networks},
  journal      = {Distributed Comput.},
  volume       = {10},
  number       = {4},
  pages        = {181--187},
  year         = {1997},
  url          = {https://doi.org/10.1007/s004460050035},
  doi          = {10.1007/S004460050035},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/HuangW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WuuH95,
  author       = {Lih{-}Chyau Wuu and
                  Shing{-}Tsaan Huang},
  title        = {Distributed Self-Stabilizing Systems},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {11},
  number       = {2},
  pages        = {307--319},
  year         = {1995},
  url          = {http://www.iis.sinica.edu.tw/page/jise/1995/199506\_08.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WuuH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/WuuH94,
  author       = {Lih{-}Chyau Wuu and
                  Shing{-}Tsaan Huang},
  title        = {Identity Assignment in Uniform Synchronous Rings},
  journal      = {Inf. Process. Lett.},
  volume       = {49},
  number       = {5},
  pages        = {257--262},
  year         = {1994},
  url          = {https://doi.org/10.1016/0020-0190(94)90064-7},
  doi          = {10.1016/0020-0190(94)90064-7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/WuuH94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/HuangWT94,
  author       = {Shing{-}Tsaan Huang and
                  Lih{-}Chyau Wuu and
                  Ming{-}Shin Tsai},
  title        = {Distributed Execution Model for Self-Stabilizing Systems},
  booktitle    = {Proceedings of the 14th International Conference on Distributed Computing
                  Systems, Poznan, Poland, June 21-24, 1994},
  pages        = {432--439},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/ICDCS.1994.302448},
  doi          = {10.1109/ICDCS.1994.302448},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/HuangWT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics