default search action
Pei-Yih Ting
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j15]Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting, Yan-Rong Fan:
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation. Sensors 23(5): 2706 (2023) - [c9]Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting, Po-Cheng Chan:
CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments. BDSIC 2023: 9-15 - 2022
- [j14]Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting, Ching-Chung Chen:
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments. Sensors 22(11): 4223 (2022)
2010 – 2019
- 2018
- [j13]Pei-Yih Ting, Jia-Lun Tsai, Tzong-Sun Wu:
Signcryption Method Suitable for Low-Power IoT Devices in a Wireless Sensor Network. IEEE Syst. J. 12(3): 2385-2394 (2018) - 2017
- [c8]Han-Yu Lin, Pei-Yih Ting, Leo-Fan Yang:
On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings. ICTCE 2017: 61-65 - 2016
- [j12]Ming-Lun Lee, Pei-Yih Ting, Tzong-Sun Wu:
Photograph watermarking. Multim. Tools Appl. 75(23): 16173-16189 (2016) - 2015
- [c7]Pei-Yih Ting, Shao-Da Huang, Tzong-Sun Wu, Han-Yu Lin:
A Provable Watermark-Based Copyright Protection Scheme. AsiaJCIS 2015: 124-129 - 2012
- [j11]Tzong-Sun Wu, Han-Yu Lin, Pei-Yih Ting:
A publicly verifiable PCAE scheme for confidential applications with proxy delegation. Trans. Emerg. Telecommun. Technol. 23(2): 172-185 (2012) - 2011
- [j10]Pei-Yih Ting, Fang-Dar Chu, Chia-Shu Liao, Huang-Tien Lin:
A Digital Standard Time Dissemination Architecture for Trustworthy Time Stamping. IEEE Trans. Instrum. Meas. 60(7): 2584-2589 (2011) - 2010
- [j9]Pei-Yih Ting, Xiao-Wei Huang, Jun-hui Wu, Chia-huei Hseu:
A secure threshold Paillier proxy signature scheme. J. Zhejiang Univ. Sci. C 11(3): 206-213 (2010)
2000 – 2009
- 2008
- [j8]Pei-Yih Ting, Xiao-Wei Huang:
Distributed Paillier Plaintext Equivalence Test. Int. J. Netw. Secur. 6(3): 258-264 (2008) - [c6]Pei-Yih Ting, Fang-Dar Chu:
Enhancing the Security Promise of a Digital Time-Stamp. AINA 2008: 342-347 - [c5]Pei-Yih Ting, Xiao-Wei Huang:
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. ISC 2008: 277-284 - 2005
- [c4]Pei-Yih Ting:
A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service Framework. AINA 2005: 445-448 - 2004
- [i1]Pei-Yih Ting, Po-Yueh Hung:
A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates. IACR Cryptol. ePrint Arch. 2004: 355 (2004)
1990 – 1999
- 1996
- [j7]Shyh-Rong Lay, Chao-Hao Lee, Nai-Jen Cheng, Chien-Cheng Tseng, Bor-Shenn Jeng, Pei-Yih Ting, Quen-Zong Wu, Miin-Luen Day:
On-line chinese character recognition with effective candidate radical and candidate character selections. Pattern Recognit. 29(10): 1647-1659 (1996) - [j6]Chih-Heng Lin, Chien-Hsing Wu, Pei-Yih Ting, Hsin-Min Wang:
Frameworks for recognition of Mandarin syllables with tones using sub-syllabic units. Speech Commun. 18(2): 175-190 (1996) - 1995
- [c3]Tun-Wen Pai, Tieh-Ming Wu, Gan-How Chang, Pei-Yih Ting:
An intelligent Chinese official document processing system. ICDAR 1995: 974-977 - 1994
- [j5]Pei-Yih Ting, Ronald A. Iltis:
Diffusion network architectures for implementation of Gibbs samplers with applications to assignment problems. IEEE Trans. Neural Networks 5(4): 622-638 (1994) - 1993
- [j4]Ronald A. Iltis, Pei-Yih Ting:
Computing association probabilities using parallel Boltzmann machines. IEEE Trans. Neural Networks 4(2): 221-233 (1993) - [c2]Chih-Heng Lin, Lin-Shan Lee, Pei-Yih Ting:
A new framework for recognition of Mandarin syllables with tones using sub-syllabic units. ICASSP (2) 1993: 227-230 - 1991
- [j3]Pei-Yih Ting, Ronald A. Iltis:
Multitarget motion analysis in a DSN. IEEE Trans. Syst. Man Cybern. 21(5): 1125-1139 (1991) - 1990
- [j2]Pei-Yih Ting, Chiu-yu Tseng, Lin-Shan Lee:
An Efficient speech Recognition System for the initials of Mandarin syllables. Int. J. Pattern Recognit. Artif. Intell. 4(4): 687-704 (1990) - [j1]Lin-Shan Lee, Chiu-yu Tseng, Keh-Jiann Chen, James Huang, Chia-Hwa Hwang, Pei-Yih Ting, Long Ji Lin, C. C. Chen:
A Mandarin Dictation Machine Based Upon a Hierarchical Recognition Approach and Chinese Natural Language Analysis. IEEE Trans. Pattern Anal. Mach. Intell. 12(7): 695-704 (1990)
1980 – 1989
- 1988
- [c1]Pei-Yih Ting, Chiu-yu Tseng, Lin-Shan Lee:
New speech recognition approaches based upon finite state vector quantization with structural constraints. ICASSP 1988: 187-190
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint