| Issue Date | Title | Author(s) | Source | scopus | WOS | Fulltext/Archive link |
| 2024/7/1 | Leaf sector covers with applications on circle graphs | Mu, Ta-Yu; Wang, Po -Yuan; Lin, Ching -Chi | THEORETICAL COMPUTER SCIENCE | | | |
| 1998 | The Leafage of a Chordal Graph | 林英仁 | | | | |
| 2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | | 8 | |
| 2024/1/1 | Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings | Tseng, Yuh-Min; Tsai, Tung-Tso ; Huang, Sen-Shan; Ho, Ting-Chieh | IEEE ACCESS | | | |
| 2022 | Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model | Tsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-Hao | IEEE ACCESS | | 0 | |
| 2022 | Leakage-resilient certificate-based authenticated key exchange protocol | Tung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung | | | | |
| 2020 | Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage | Jui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai | | | | |
| 2019 | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Ieee Access | | 7 | |
| 2021 | A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism | Tsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-Hao | IEEE ACCESS | | 3 | |
| 2020 | Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server | Yuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai | | | | |
| 2025 | Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks | Tsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chin | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | | | |
| 2022 | Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority | Tseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-Hao | INFORMATICA | | 2 | |
| 2020 | Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Informatica | | 6 | |
| 2016 | Learning Textual Entailment Classification from a Chinese RITE Dataset Specialized for Linguistic Phenomena | Chi-Ting Liu; Shao-Heng Chen; Chuan-Jie Lin | | | | |
| 2011 | Learning through Network-Based Simulations for Epidemiology Education | Chung-Yuan Huang; Yu-Shiuan Tsai ; Tzai-Hung Wen | | | | |
| 2009 | Learning to Build Network-Oriented Epidemic Simulation Models in Epidemiology Education | Ji-Lung Hsieh; Chung-Yuan Huang; Chuen-Tsai Sun; Yu-Shiuan Tsai ; Gloria Yi-Ming Kao | | | | |
| 2017 | A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks | Han-Yu Lin ; Leo-Fan Yang; Yao-Min Hung | | | | |
| 2005 | Limit distribution of the number of consecutive records | Hua-Huai Chern ; Hwang, H. K. | Random Structures & Algorithms | | | |
| 2008 | Linear feature extraction by integrating pairwise and global discriminatory information via sequential forward floating selection and kernel QR factorization with column pivoting | Chin-Chun Chang ; Tzung-Ying Lin | Pattern Recognition | | 5 | |
| 2014 | Linear-Time Accurate Lattice Algorithms for Tail Conditional Expectation | Bryant Chen; William Wei-Yuan Hsu ; Jan-Ming Ho; Ming-Yang Kao | | | | |