公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
1995 | On Speeding Radical-Based On-Line Chinese Character Recognition Through Radical Extraction | S.R. Lay; M.L. Day; N.J. Cheng; S.Y. Hung; B.S. Jeng; Pei-Yih Ting ; C.C. Tseng; C.H. Shih | | | |
2013 | On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message Linkages | Tzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting | | | |
1994 | On the Distortion Measurement of On-Line Signature Verification | Q.-Z. Wu; I.-C. Jou; B.-S. Jeng; N.-J. Cheng; S.-S. Huang; Pei-Yih Ting ; D.-M. Shieh; C.-J. Wen | | | |
1993 | On the Prediction of Prosodics for Mandarin Chinese Text-to-Speech System | W.-H. Lai; Pei-Yih Ting | | | |
2003 | On the Public Verifiability of an M+1-st Price Auction Using Homomorphic Encryption | Pei-Yih Ting ; Yu-Tsung Lee; Ching-Yi Chen | | | |
2017 | On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings | Han-Yu Lin ; Pei-Yih Ting ; Leo-Fan Yang | ICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering | | |
1994 | The On-Line Automatic Signature Verification System | Chi-Jain Wen; Pei-Yih Ting ; Su-Shun Huang; Bor-Yuan Tseng; Bor-Shenn Jeng | Images & Recognition | | |
1996 | On-line Chinese character recognition with effective candidate radical and candidate character selections | Lay, S. R.; Lee, C. H.; Cheng, N. J.; Tseng, C. C.; Jeng, B. S.; Pei-Yih Ting ; Wu, Q. Z.; Day, M. L. | Pattern Recognition | | |
1988 | Performance Improvements on Confusion Sets Recognition Using Segmented Scoring DTW Algorithm | Pei-Yih Ting ; P.-C. Chang; Eng-Fong Huang | | | |
2016 | Photograph watermarking | Lee, M. L.; Pei-Yih Ting ; Wu, T. S. | Multimedia Tools and Applications | | |
1994 | The Post-Processing Stages of a Mandarin Waveform Synthesizer | Pei-Yih Ting ; C.-Y. Tsai; C.-S. Liu | | | |
2015 | A Provable Watermark-based Copyright Protection Scheme | Pei-Yih Ting ; Shao-Da Huang; Tzong-Sun Wu; Han-Yu Lin | | | |
2009 | A Proxy Multi-Signature Scheme with Anonymously Vetoable Delegation | Pei-Yih Ting ; Dream-Ming Huang; Xiao-Wei Huang | | | |
2004 | A Public Verifiable Security-Enhanced Voting Protocol for a Committee Board Meeting | Pei-Yih Ting ; Po-Yueh Hung; Ching-Yi Chen | | | |
1996 | A Radical Extraction Approach for On-Line Chinese Handwriting System | Chao-Hao Lee; Bor-Shenn Jeng; Pei-Yih Ting ; Shyh-Rong Lay; Chien-Cheng Tseng; Fang-Iau Liu | | | |
1995 | A Remote Signature Verification for PC-based Telewriter System | C.-J. Wen; B.-S. Jeng; H.-F. Yau; M.-T. Chen; Pei-Yih Ting ; C.-S. Miou | | | |
2007 | RSA 簽章攻擊與通訊協定實作安全性的探討 | 胡家銘; 丁培毅 ; 邱昭福 | | | |
2008 | An RSA-based (t,n) Threshold Proxy Signature Scheme without any Trusted Combiner | Pei-Yih Ting ; Xiao-Wei Huang | | | |
2007 | A Secure Instant-Runoff Voting Scheme Based on Homomorphic Encryption | Pei-Yih Ting ; Xiao-Wei Huang; Mei-chen Hsia | | | |
2010 | A secure threshold Paillier proxy signature scheme | Pei-Yih Ting ; Huang, X. W.; Wu, J. H.; Hseu, C. H. | Journal of Zhejiang University-Science C-Computers & Electronics | | |