Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chang, Ee-Chien
add a person with the name Chang, Ee-Chien
 

Other publications of authors with the same name

A Note on Improved Deterministic Time Simulation of Nondeterministic Space for Small Space., and . Inf. Process. Lett., 55 (3): 155-157 (1995)Enhancing host security using external environment sensors., , , , and . Int. J. Inf. Sec., 10 (5): 285-299 (2011)Geometric Properties of Watermarking Schemes., and . ICIP, page 714-717. (2000)ID Repetition in Kad., , , , and . Peer-to-Peer Computing, page 111-120. IEEE, (2009)Progressive transmission and rendering of foveated volume data., , , and . GRAPP, page 67-75. INSTICC - Institute for Systems and Technologies of Information, Control and Communication, (2006)M2R: Enabling Stronger Privacy in MapReduce Computation., , , , and . USENIX Security Symposium, page 447-462. USENIX Association, (2015)Chain of Trust: Can Trusted Hardware Help Scaling Blockchains?, , , and . CoRR, (2018)Robust Extraction of Secret Bits from Minutiae., and . ICB, volume 4642 of Lecture Notes in Computer Science, page 750-759. Springer, (2007)PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules., , , , and . CCS, page 1657-1670. ACM, (2019)Towards a general framework for secure MapReduce computation on hybrid clouds., , and . SoCC, page 36:1-36:2. ACM, (2013)