| Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
1 | 2014 | 雲端密文資料庫之自適應區段索引建置法 | 吳宗杉; 馮可欣; 丁培毅 | | | |
2 | 2014 | 隱藏屬性的密鑰政策屬性加密系統改良 | 丁培毅 ; 林昱彤; 吳宗杉 | | | |
3 | 2013 | 隱藏屬性的密鑰政策屬性加密系統 | 丁培毅 ; 蔡建偉; 魏秉輝; 吳宗杉 | | | |
4 | 2006 | 隱匿偵蒐技術於網路情資蒐集運用之研究 | 丁培毅 ; 黃曉偉; 吳俊輝; 黃俊銘; 陳建銘; 陳建銘; 許雁筑 | | | |
5 | 2004 | 適用於無線隨意行動網路的多金鑰交換協定 | 丁培毅 ; 林志賢; 賴汶亭; 劉冠廷 | | | |
6 | 2008 | 運用雙向傳時技術之分散式標準時間源系統 | 丁培毅 ; 胡家銘; 褚芳達; 徐漢 | | | |
7 | 2019 | 運用深度學習之延續性使用者身份認證機制 | 丁培毅 | | | |
8 | 2006 | 網際服務軟體工程課程編撰執行報告 | 陳英一; 鄭有進; 陳偉凱; 王英宏; 丁培毅 | | | |
9 | 2007 | 經濟部工業局與中華民國資訊軟體協會進行即時通訊與系統安全訓練 | 丁培毅 | | | |
10 | 2015 | 結合VQ與SVD且可抵抗壓縮攻擊之QR-code藏匿法 | 吳宗杉; 李韶茵; 丁培毅 | | | |
11 | 2002 | 立駭科技進行一週之網路安全理論與實務訓練 | 丁培毅 | | | |
12 | 2006 | 相對式時戳服務架構中時戳先後順序之比較機制 | 丁培毅 ; 褚芳達 | | | |
13 | 2007 | 由RSA簽章攻擊探討軟體實作的安全性 | 胡家銘; 丁培毅 ; 邱昭福 | | | |
14 | 2006 | 特定時間密碼學及相關技術之研究 | 黃俊銘; 黃曉偉; 吳俊輝; 詹永茂; 丁培毅 | | | |
15 | 1998 | 港埠電腦模擬船席調派方法之分析-以基隆港貨櫃船席調派為例 | 李育達; 丁培毅 ; 李台生 | | | |
16 | 2012 | 標準模型下基於二次剩餘損耗暗門函式之簽章機制 | 丁培毅 ; 洪任群; 吳宗杉 | | | |
17 | 2011 | 標準模型下基於Φ-hiding假設之EUF-CMA安全簽章 | 丁培毅 ; 管紀豪; 洪任群; 吳宗杉 | | | |
18 | 2017 | 植基於免憑證公鑰系統之可淨化數位簽章方法 | 林韓禹 ; 丁培毅 ; 吳宗杉; 王冠翔; 陳伊萍 | | | |
19 | 2006 | 時戳服務在全球資訊網上的應用實例 | 丁培毅 ; 王峻彥; 倪行建; 洪伯岳 | | | |
20 | 2013 | 支援關鍵字搜尋身分識別加密系統之研究 | 丁培毅 ; 蔡建偉; 林昱彤 | | | |
21 | 2011 | 支援關鍵字搜尋的身分識別廣播加密方法 | 丁培毅 ; 溫玎薈; 張書瑋 | | | |
22 | 2015 | 應用於可驗證委託運算的隱藏密鑰政策電路屬性加密系統 | 吳姝儀; 丁培毅 ; 黃少達; 吳宗杉 | | | |
23 | 2012 | 影像自我參考之藏密法 | 吳宗杉; 吳宗霖; 龍義賢; 丁培毅 ; 李明倫 | | | |
24 | 2007 | 強化時戳服務可信賴性之密碼學機制 | 丁培毅 ; 胡家銘; 邱昭福; 褚芳達 | | | |
25 | 2009 | 廣義的匿名廣播加密系統 | 丁培毅 ; 張書瑋; 溫玎薈 | | | |
26 | 2005 | 帳戶制行動付款系統私密性保護機制 | 邱大佑; 丁培毅 | | | |
27 | 2007 | 安全的 Paillier 代理簽章機制 | 丁培毅 ; 徐嘉煇; 黃曉偉 | | | |
28 | 2009 | 安全性強化的密文可搜尋公開金鑰加密系統 | 丁培毅 ; 吳宗杉; 溫玎薈 | | | |
29 | 2005 | 學習成效追蹤機制之建立 | 張福生; 白敦文; 丁培毅 | | | |
30 | 2013 | 多關鍵字密文搜尋系統 | 丁培毅 ; 吳姝儀; 吳宗杉 | | | |
31 | 2016 | 基於靜態浮水印技術的可證明著作權保護機制 | 劉俊宏; 黃建豪; 丁培毅 | | | |
32 | 2008 | 基於雙線性配對可匿名否決授權的代理多重簽章協定 | 詹永茂; 丁培毅 | | | |
33 | 2020 | 基於生成對抗網路之身分特徵擷取與生物識別 | 高璿智; 邱垂邦; 丁培毅 ; 林韓禹 | | | |
34 | 2015 | 基於浮水印技術且具不可偽造性及不模糊性的著作權保護機制 | 黃少達; 丁培毅 ; 吳宗杉 | | | |
35 | 2016 | 基於動態路徑浮水印技術的著作權保護機制 | 黃建豪; 丁培毅 ; 吳宗杉; 劉俊宏; 黃柏嶽 | | | |
36 | 2015 | 基於二維條碼之藏密法 | 李明倫; 丁培毅 ; 吳宗杉; 龍義賢 | | | |
37 | 2013 | 基於二維條碼之改良式盲浮水印演算法 | 吳宗杉; 龍義賢; 陳益森; 丁培毅 | | | |
38 | 2011 | 可抵抗旋轉攻擊的浮水印方法 | 吳宗杉; 李明倫; 丁培毅 ; 顏君仲; 黃舜俞 | | | |
39 | 2015 | 可抵抗列印掃瞄攻擊且具較佳彩色圖像品質之浮水印方法 | 吳宗杉; 蕭雯; 丁培毅 | | | |
40 | 2007 | 可匿名否決之多重授權代理簽章機制 | 丁培毅 ; 黃俊銘; 黃曉偉 | | | |
41 | 2004 | 可公開驗證的第 M+1 高價競標 | 李育宗; 丁培毅 ; 陳景毅 | | | |
42 | 2005 | 可信賴的分散式標準時間服務架構 | 丁培毅 ; 倪行健; 徐嘉煇; 褚芳達 | | | |
43 | 2019 | 去識別化生成對抗網路 | 邱垂邦; 洪穎寧; 丁培毅 ; 林韓禹 | | | |
44 | 2008 | 分散式可信賴標準時間源之校時準確度提昇研究 | 丁培毅 ; 胡家銘; 褚芳達; 徐漢; 林清江 | | | |
45 | 2007 | 分散式可信賴時間源與標準時間服務之實作 | 邱昭福; 丁培毅 ; 胡家銘; 褚芳達 | | | |
46 | 2004 | 分散式可信賴時間源實作之安全考量 | 丁培毅 ; 倪行健; 褚芳達 | | | |
47 | 2014 | 具鑑別功能之浮水印系統 | 吳宗杉; 李紀緯; 丁培毅 | | | |
48 | 2005 | 具匿名性之行動通訊系統私密性保護機制 | 邱大佑; 丁培毅 | | | |
49 | 2011 | 兩個應用在簽章機制上的雙金鑰技巧的比較 | 譚偉祥; 丁培毅 | | | |
50 | 2002 | 全球資訊網上時戳服務保護智慧財產權的應用 | 丁培毅 ; 王峻彥; 倪行健; 洪伯岳 | | | |
51 | 2016 | 允許範圍查詢的分散式 STL 密文容器與演算法 | 黃柏嶽; 丁培毅 ; 吳宗杉; 邱垂邦 | | | |
52 | 2004 | 不需信任主機的集中式資料儲存系統與其建構方 | 丁培毅 ; 沈炳 | | | |
53 | 2011 | 上線/離線式快速圖像加密機制 | 顏君仲; 吳宗杉; 丁培毅 ; 李明倫 | | | |
54 | 2000 | 一種電子時戳服務機制實作之探討 | 王峻彥; 丁培毅 | | | |
55 | 2012 | 一次性門檻式不可否認代理簽章 | 吳宗杉; 鍾國文; 許靖; 丁培毅 ; 吳宗霖 | | | |
56 | 2009 | 一次性代理簽章方法 | 吳宗杉; 鍾國文; 丁培毅 ; 陳益森 | | | |
57 | 2001 | 一個實驗性的智慧型服務網路伺服架構 | 丁培毅 ; 蘇子安 | | | |
58 | 2011 | 一個基於DJ密文不可分辨性的EUF-CMA安全簽章機制 | 林施賢; 丁培毅 ; 洪任群; 吳宗杉 | | | |
59 | 2015 | 一個可證明所有權歸屬的數位浮水印方法 | 黃少達; 丁培毅 ; 汪欣誼; 吳立立 | | | |
60 | 1996 | Two Probabilistic Methods for Candidate Selection in On-Line Chinese Character Recognition System | C.-C Tseng; S.-L Lay; B.-S Jeng; Pei-Yih Ting ; C.-H. Lee; K.-S. Chou | | | |
61 | 2005 | A Temporal Order Resolution Algorithm in the Multi-Server Time Stamp Service Framework | Pei-Yih Ting | | | |
62 | 1994 | The study on speech processing and character recognition at Telecommunication Laboratories (TL) | Bor-Shenn Jeng; Chi-Shi Liu; Tsann-Shyong Liu; Eng-Fong Hwang; Wern-Jun Wang; Pei-Yih Ting ; Kuang-Yao Chang | | | |
63 | 2012 | A Study of Ionospheric Effects on Next-Generation Two-Way Satellite Time and Frequency Transfer | Fang-dar Chu; Chia-Shu Liao; Wen-Hung Tseng; Yi-Jiun Huang; Huang-Tien Lin; Wei-Chih Hsu; Pei-Yih Ting | | | |
64 | 2012 | A Study of Ionospheric Delay Corrections for Next-Generation Two-Way Satellite Time and Frequency Transfer | Fang-dar Chu; Wen-Hung Tseng; Yi-Jiun Huang; Huang-Tien Lin; Chia-Shu Liao; Wei-Chih Hsu; Pei-Yih Ting | | | |
65 | 1995 | Speed up Radical-Based On-Line Chinese Character Recognition System Using the Stable First and Last Segments | Chien-Cheng Tseng; Shyh-Rong Lay; Miin-Luen Day; Nai-Jen Cheng; Bor-Shenn Jeng; Pei-Yih Ting ; Chao-Hao Lee; Kuo-Sen Chou; Chun-Hsi Chih | | | |
66 | 2006 | A Secure Voting Preference Oriented Approval Voting Scheme | Pei-Yih Ting ; Chih-hsien Lin; Kuan-ting Liu | | | |
67 | 2007 | A Secure Instant-Runoff Voting Scheme Based on Homomorphic Encryption | Pei-Yih Ting ; Xiao-Wei Huang; Mei-chen Hsia | | | |
68 | 2008 | An RSA-based (t,n) Threshold Proxy Signature Scheme without any Trusted Combiner | Pei-Yih Ting ; Xiao-Wei Huang | | | |
69 | 2007 | RSA 簽章攻擊與通訊協定實作安全性的探討 | 胡家銘; 丁培毅 ; 邱昭福 | | | |
70 | 1995 | A Remote Signature Verification for PC-based Telewriter System | C.-J. Wen; B.-S. Jeng; H.-F. Yau; M.-T. Chen; Pei-Yih Ting ; C.-S. Miou | | | |
71 | 1996 | A Radical Extraction Approach for On-Line Chinese Handwriting System | Chao-Hao Lee; Bor-Shenn Jeng; Pei-Yih Ting ; Shyh-Rong Lay; Chien-Cheng Tseng; Fang-Iau Liu | | | |
72 | 2004 | A Public Verifiable Security-Enhanced Voting Protocol for a Committee Board Meeting | Pei-Yih Ting ; Po-Yueh Hung; Ching-Yi Chen | | | |
73 | 2009 | A Proxy Multi-Signature Scheme with Anonymously Vetoable Delegation | Pei-Yih Ting ; Dream-Ming Huang; Xiao-Wei Huang | | | |
74 | 2015 | A Provable Watermark-based Copyright Protection Scheme | Pei-Yih Ting ; Shao-Da Huang; Tzong-Sun Wu; Han-Yu Lin | | | |
75 | 1994 | The Post-Processing Stages of a Mandarin Waveform Synthesizer | Pei-Yih Ting ; C.-Y. Tsai; C.-S. Liu | | | |
76 | 1988 | Performance Improvements on Confusion Sets Recognition Using Segmented Scoring DTW Algorithm | Pei-Yih Ting ; P.-C. Chang; Eng-Fong Huang | | | |
77 | 2017 | On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings | Han-Yu Lin ; Pei-Yih Ting ; Leo-Fan Yang | ICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering | | |
78 | 1994 | On the Distortion Measurement of On-Line Signature Verification | Q.-Z. Wu; I.-C. Jou; B.-S. Jeng; N.-J. Cheng; S.-S. Huang; Pei-Yih Ting ; D.-M. Shieh; C.-J. Wen | | | |
79 | 1995 | On Speeding Radical-Based On-Line Chinese Character Recognition Through Radical Extraction | S.R. Lay; M.L. Day; N.J. Cheng; S.Y. Hung; B.S. Jeng; Pei-Yih Ting ; C.C. Tseng; C.H. Shih | | | |
80 | 1998 | NTP 網路校時協定深入探討 | 徐偉智; 鄭立國; 褚芳達; 丁培毅 | | | |
81 | 1988 | New Speech Recognition Approaches Based Upon Finite State Vector Quantization with Structural Constraints | Pei-Yih Ting ; C.-Y. Tseng; L.-S. Lee | | | |
82 | 1988 | A New Preprocessor for Isolated Word Recognition System | E.-F. Huang; Pei-Yih Ting ; C.-J. Huang | | | |
83 | 1990 | Multi-Target Bearings-Only Track Initiation Using Simulated Annealing | Pei-Yih Ting ; R.A. Iltis | | 0 | |
84 | 1987 | A Mandarin Consonant Recognition System Based Upon Time, Frequency Domain Features and Finite State Vector Quantization Technique | Pei-Yih Ting ; C.-Y. Tseng; L.-S. Lee | | | |
85 | 1995 | An Intelligent Chinese Official Document Processing System | Tun-Wen Pai; Tieh-Ming Wu; Gan-How Chang; Pei-Yih Ting | | | |
86 | 1988 | An Initial Recognition System for Mandarin Speech Using Finite State Vector Quantization | Pei-Yih Ting ; C.-Y. Tseng; L.-S. Lee | | | |
87 | 1996 | Handwritten Chinese Signature Verification Using Tremor Features | Chi-Jain Wen; Bor-Shenn Jeng; Pei-Yih Ting ; Hon-Fai Yau | | | |
88 | 2019 | A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures | Han-Yu Lin ; Hong-Ru Wu; Pei-Yih Ting ; Po-Ting Lee | 2019 2nd International Conference on Communication Engineering and Technology (ICCET) | | |
89 | 2019 | Feature-Disentangling Generative Adversarial Networks and its Application on Domain Adaptation | Y.-N. Hung; C.-P. Chiu; Pei-Yih Ting ; T.-S. Wu | | | |
90 | 1994 | An Experimental On-Line Signature Verification System | Pei-Yih Ting ; Chi-Jain Wen; Bor-Shenn Jeng; Kuei Liu; Hon-Fai Yau; Kun-Chi Cheng | | | |
91 | 2008 | Enhancing the Security Promise of a Digital Time-Stamp | Pei-Yih Ting ; Fang-dar Chu | | | |
92 | 2018 | An Efficient Universal Designated Verifier Signature Scheme for Non-Transferable Data Sharing in Clouds | Han-Yu Lin ; Pei-Yih Ting ; Yan-Ru Jiang | ICIBE' 18: Proceedings of the 4th International Conference on Industrial and Business Engineering | | |
93 | 1988 | Efficient Speech Recognition Approaches Using Timing Structural Constraints on Hidden Markov Model and Vector Quantization | Pei-Yih Ting ; C.-Y. Tseng; L.-S. Lee | | | |
94 | 2006 | Effects of Computerized-based training for Mandarin tones by hearing-impaired students | Chang, H.F.; Pei-Yih Ting | | | |
95 | 2010 | A Digital Standard Time Distribution Architecture with its Applications | Pei-Yih Ting ; Fang-Dar Chu; Chia-Shiu Liao | | | |
96 | 1991 | Data Association in Multi-Target Tracking: A Solution using a Layered Boltzmann Machine | R.A. Iltis; Pei-Yih Ting | | | |
97 | 1996 | Candidate Selection in On-Line Chinese Character Recognition Using Bayes Rule | C.-C. Tseng; S.-L. Lay; B.-S. Jeng; Pei-Yih Ting ; C.-H. Lee; K.-S. Chou | | | |
98 | 2019 | An Attribute-Based Mutual Authentication Scheme with Time-Bounded Keys | Han-Yu Lin ; Pei-Yih Ting ; Hong-Ru Wu | ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering | | |
99 | 1995 | The Applications of Intelligent Input/Output Techniques on Telecommunication Services | I.-C. Chou; B.-S. Jeng; K.-Y. Chang; T.-H. Chiang; K.-C. Dai; Pei-Yih Ting ; C.-S. Liu; R.-H. Ju; D.-L. Lu | | | |
100 | 1992 | An Analog Diffusion Network Architecture for Solving Data Association Problems in Multi-Target Tracking | Pei-Yih Ting ; R.A. Iltis | | | |
101 | 2019 | Access Control Mechanism for Partially Ordered Set Hierarchy | Tzong-Sun Wu; Tseng-Hui Chen; Wang-Chieh Hu; Pei-Yih Ting | | | |