Pseudorandom bit generators in stream-cipher cryptography K Zeng, CH Yang, TRN Rao Computer, 1991 | 200 | 1991 |
On the linear consistency test (LCT) in cryptanalysis with applications K Zeng, CH Yang, TRN Rao Advances in Cryptology—CRYPTO’89 Proceedings 9, 164-174, 1990 | 117 | 1990 |
System hardening and security monitoring for IoT devices to mitigate IoT security vulnerabilities and threats SK Choi, CH Yang, J Kwak KSII Transactions on Internet and Information Systems (TIIS) 12 (2), 906-918, 2018 | 70 | 2018 |
An improved linear syndrome algorithm in cryptanalysis with applications K Zeng, CH Yang, TRN Rao Conference on the Theory and Application of Cryptography, Crypto'90, 34-47, 1990 | 68 | 1990 |
Design and implementation of live sd acquisition tool in android smart phone SW Chen, CH Yang, CT Liu 2011 Fifth International Conference on Genetic and Evolutionary Computing …, 2011 | 45 | 2011 |
Fast implementation of AES cryptographic algorithms in smart cards CF Lu, YS Kao, HL Chiang, CH Yang IEEE 37th Annual 2003 International Carnahan Conference onSecurity …, 2003 | 40 | 2003 |
Design and implementation of forensic system in Android smart phone X Lee, C Yang, S Chen, J Wu The 5th Joint Workshop on Information Security, 1-11, 2009 | 28 | 2009 |
Aryabhata remainder theorem: relevance to public-key crypto-algorithms TRN Rao, CH Yang Circuits, Systems and Signal Processing 25, 1-15, 2006 | 28 | 2006 |
Design and implementation of a live-analysis digital forensic system PH Yen, CH Yang, TN Ahn Proceedings of the 2009 international Conference on Hybrid information …, 2009 | 26 | 2009 |
Designing a taxonomy of web attacks JY Lai, JS Wu, SJ Chen, CH Wu, CH Yang 2008 International Conference on Convergence and Hybrid Information …, 2008 | 26 | 2008 |
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot PS Huang, CH Yang, TN Ahn Proceedings of the 2009 International Conference on Hybrid Information …, 2009 | 22 | 2009 |
Fast deployment of computer forensics with USBs CH Yang, PH Yen 2010 International Conference on Broadband, Wireless Computing …, 2010 | 21 | 2010 |
Design and implementation of honeypot systems based on open-source software CH Yeh, CH Yang 2008 IEEE International Conference on Intelligence and Security Informatics …, 2008 | 20 | 2008 |
Design and implementation of mobile forensic tool for android smart phone through cloud computing Y Lai, C Yang, C Lin, TN Ahn Convergence and Hybrid Information Technology: 5th International Conference …, 2011 | 19 | 2011 |
A modular-multiplication algorithm using lookahead determination H Morita, CH Yang IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 1993 | 19 | 1993 |
Design and implementation of a secure instant messaging service based on elliptic-curve cryptography CH Yang, TY Kuo, T Ahn, CP Lee Journal of Computers 18 (4), 31-38, 2008 | 17 | 2008 |
Cryptanalysis of the Hwang-Rao secret error-correcting code schemes K Zeng, CH Yang, TRN Rao Information and Communications Security: Third International Conference …, 2001 | 17 | 2001 |
Implement web attack detection engine with snort by using modsecurity core rules CH Yang, CH Shen Fourth the E-Learning and Information Technology Symposium (EITS 09), 2009 | 16 | 2009 |
On the design of campus-wide multi-purpose smart card systems CH Yang Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on …, 1999 | 16 | 1999 |
Fast deployment of botnet detection with traffic monitoring CH Yang, KL Ting 2009 Fifth International Conference on Intelligent Information Hiding and …, 2009 | 15 | 2009 |