BibTeX records: Ting-Yi Chang

download as .bib file

@article{DBLP:journals/ijnsec/HuangCH18,
  author    = {Li{-}Chin Huang and
               Ting{-}Yi Chang and
               Min{-}Shiang Hwang},
  title     = {A Conference Key Scheme Based on the Diffie-Hellman Key Exchange},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {6},
  pages     = {1221--1226},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n6/ijns-2018-v20-n6-p1221-1226.pdf},
  timestamp = {Fri, 24 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/HuangCH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/LiuTCL18,
  author    = {Chao{-}Liang Liu and
               Wang{-}Jui Tsai and
               Ting{-}Yi Chang and
               Ta{-}Ming Liu},
  title     = {Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated
               Key Agreement Protocol for Mobile Distributed Computing Environments},
  journal   = {Symmetry},
  volume    = {10},
  number    = {4},
  pages     = {84},
  year      = {2018},
  url       = {https://doi.org/10.3390/sym10040084},
  doi       = {10.3390/sym10040084},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/symmetry/LiuTCL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChangTTPW16,
  author    = {Ting{-}Yi Chang and
               Cheng{-}Jung Tsai and
               Wang{-}Jui Tsai and
               Chun{-}Cheng Peng and
               Han{-}Sing Wu},
  title     = {A changeable personal identification number-based keystroke dynamics
               authentication system on smart phones},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {15},
  pages     = {2674--2685},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1265},
  doi       = {10.1002/sec.1265},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/ChangTTPW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LiuTCPW15,
  author    = {Chao{-}Liang Liu and
               Wang{-}Jui Tsai and
               Ting{-}Yi Chang and
               Chun{-}Cheng Peng and
               Peng{-}Shiang Wong},
  title     = {Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing
               Scheme Without Pixel Expansion},
  journal   = {Comput. J.},
  volume    = {58},
  number    = {7},
  pages     = {1598--1606},
  year      = {2015},
  url       = {https://doi.org/10.1093/comjnl/bxu105},
  doi       = {10.1093/comjnl/bxu105},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/LiuTCPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/HuangCN15,
  author    = {Cheng{-}Kui Huang and
               Ting{-}Yi Chang and
               Badri G. Narayanan},
  title     = {Mining the change of customer behavior in dynamic markets},
  journal   = {Information Technology and Management},
  volume    = {16},
  number    = {2},
  pages     = {117--138},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10799-014-0197-x},
  doi       = {10.1007/s10799-014-0197-x},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itm/HuangCN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuTCTZ15,
  author    = {Chao{-}Liang Liu and
               Cheng{-}Jung Tsai and
               Ting{-}Yi Chang and
               Wang{-}Jui Tsai and
               Po{-}Kai Zhong},
  title     = {Implementing multiple biometric features for a recall-based graphical
               keystroke dynamics authentication system on a smart phone},
  journal   = {J. Network and Computer Applications},
  volume    = {53},
  pages     = {128--139},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.jnca.2015.03.006},
  doi       = {10.1016/j.jnca.2015.03.006},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/LiuTCTZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TasiaCCL14,
  author    = {Cheng{-}Jung Tasia and
               Ting{-}Yi Chang and
               Pei{-}Cheng Cheng and
               Jyun{-}Hao Lin},
  title     = {Two novel biometric features in keystroke dynamics authentication
               systems for touch screen devices},
  journal   = {Security and Communication Networks},
  volume    = {7},
  number    = {4},
  pages     = {750--758},
  year      = {2014},
  url       = {https://doi.org/10.1002/sec.776},
  doi       = {10.1002/sec.776},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/TasiaCCL14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chinacom/TsaiPCCTW14,
  author    = {Cheng{-}Jung Tsai and
               Chun{-}Cheng Peng and
               Mao{-}Lun Chiang and
               Ting{-}Yi Chang and
               Wang{-}Jui Tsai and
               Han{-}Sing Wu},
  title     = {Work in progress: {A} new approach of changeable password for keystroke
               dynamics authentication system on smart phones},
  booktitle = {9th International Conference on Communications and Networking in China,
               Maoming, China, August 14-16, 2014},
  pages     = {353--356},
  year      = {2014},
  crossref  = {DBLP:conf/chinacom/2014},
  url       = {https://doi.org/10.1109/CHINACOM.2014.7054316},
  doi       = {10.1109/CHINACOM.2014.7054316},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chinacom/TsaiPCCTW14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChangK13,
  author    = {Ting{-}Yi Chang and
               Yan{-}Ru Ke},
  title     = {A personalized e-course composition based on a genetic algorithm with
               forcing legality in an adaptive learning system},
  journal   = {J. Network and Computer Applications},
  volume    = {36},
  number    = {1},
  pages     = {533--542},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.jnca.2012.04.002},
  doi       = {10.1016/j.jnca.2012.04.002},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/ChangK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/ChangS12,
  author    = {Ting{-}Yi Chang and
               You{-}Fu Shiu},
  title     = {Simultaneously construct IRT-based parallel tests based on an adapted
               {CLONALG} algorithm},
  journal   = {Appl. Intell.},
  volume    = {36},
  number    = {4},
  pages     = {979--994},
  year      = {2012},
  url       = {https://doi.org/10.1007/s10489-011-0308-x},
  doi       = {10.1007/s10489-011-0308-x},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/apin/ChangS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/Chang12,
  author    = {Ting{-}Yi Chang},
  title     = {Dynamically generate a long-lived private key based on password keystroke
               features and neural network},
  journal   = {Inf. Sci.},
  volume    = {211},
  pages     = {36--47},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.ins.2012.04.009},
  doi       = {10.1016/j.ins.2012.04.009},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/Chang12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ChangTL12,
  author    = {Ting{-}Yi Chang and
               Cheng{-}Jung Tsai and
               Jyun{-}Hao Lin},
  title     = {A graphical-based password keystroke dynamic authentication system
               for touch screen handheld mobile devices},
  journal   = {Journal of Systems and Software},
  volume    = {85},
  number    = {5},
  pages     = {1157--1165},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.jss.2011.12.044},
  doi       = {10.1016/j.jss.2011.12.044},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/ChangTL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/ChangYP10,
  author    = {Ting{-}Yi Chang and
               Yu{-}Ju Yang and
               Chun{-}Cheng Peng},
  title     = {A Personalized Rhythm Click-Based Authentication System},
  journal   = {Inf. Manag. Comput. Security},
  volume    = {18},
  number    = {2},
  pages     = {72--85},
  year      = {2010},
  url       = {https://doi.org/10.1108/09685221011048328},
  doi       = {10.1108/09685221011048328},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/imcs/ChangYP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ChangC09c,
  author    = {Ting{-}Yi Chang and
               Yi{-}Ting Chen},
  title     = {Cooperative learning in E-learning: {A} peer assessment of student-centered
               using consistent fuzzy preference},
  journal   = {Expert Syst. Appl.},
  volume    = {36},
  number    = {4},
  pages     = {8342--8349},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.eswa.2008.10.050},
  doi       = {10.1016/j.eswa.2008.10.050},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/ChangC09c},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chinacom/2014,
  title     = {9th International Conference on Communications and Networking in China,
               Maoming, China, August 14-16, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7043683/proceeding},
  isbn      = {978-1-4799-5970-9},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chinacom/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics