![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Chun-Hua Chen
Person information
Other persons with the same name
- Chun-Hua Chen 0002
(aka: Chunhua Chen 0002) — South China University of Technology, School of Software Engineering, Guangzhou, China
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j10]Bennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu
:
Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 242-243 (2013) - [j9]Bennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu
:
Key Substitution Attacks on Multisignature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 244-245 (2013) - 2012
- [j8]Bennian Dou, Chun-Hua Chen, Hong Zhang:
Key Substitution Attacks on the CFS Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 414-416 (2012) - 2010
- [j7]Chenn-Jung Huang, Ming-Chou Liu, Kuo-En Chang, Yao-Ting Sung, Tz-Hau Huang, Chun-Hua Chen, Hung-Yen Shen, Kuo-Liang Huang, Jia-Jian Liao, Kai-Wen Hu, Yun-Cheng Luo, Tun-Yu Chang:
A Learning Assistance Tool for Enhancing ICT Literacy of Elementary School Students. J. Educ. Technol. Soc. 13(3): 126-138 (2010) - [c12]Chun-Hua Chen, Chung-Yuan Lin, Sz-Yan Li, Tsung-Han Tsai:
High level feature: Head and body co-trakcing by Kalman filter. ICIP 2010: 725-728
2000 – 2009
- 2009
- [j6]Chenn-Jung Huang
, Kai-Wen Hu, You-Jia Chen, Chun-Hua Chen, Yun-Cheng Luo:
A QoS-aware VoD resource sharing scheme for heterogeneous networks. Comput. Networks 53(7): 1087-1098 (2009) - [j5]Chenn-Jung Huang
, Hong-Xin Chen, Chun-Hua Chen:
Developing argumentation processing agents for computer-supported collaborative learning. Expert Syst. Appl. 36(2): 2615-2624 (2009) - [c11]Chenn-Jung Huang
, Hung-Yen Shen, Jia-Jian Liao, Kai-Wen Hu, Dian-Xiu Yang, Chun-Hua Chen, Yi-Ta Chuang:
A fuzzy logic-based routing for Delay-Tolerant heterogeneous Networks. GrC 2009: 254-259 - 2008
- [j4]Chenn-Jung Huang
, Yi-Ta Chuang, Chih-Tai Guan, Yun-Cheng Luo, Kai-Wen Hu, Chun-Hua Chen:
A hybrid priority-based video-on-demand resource sharing scheme. Comput. Commun. 31(10): 2231-2241 (2008) - [j3]Chenn-Jung Huang, Chun-Hua Chen, Yun-Cheng Luo, Hong-Xin Chen, Yi-Ta Chuang:
Developing an Intelligent Diagnosis and Assessment E-learning Tool for Introductory Programming. J. Educ. Technol. Soc. 11(4): 139-157 (2008) - [c10]Chenn-Jung Huang, Yun-Cheng Luo, Chun-Hua Chen, Kai-Wen Hu:
A Scalable QoS-Aware VoD Resource Sharing Scheme for Next Generation Networks. ICIC (3) 2008: 337-344 - [c9]Chenn-Jung Huang
, Yun-Cheng Luo, Chun-Hua Chen, Tun-Yu Chang, Kai-Wen Hu, Tsung-Hsien Wu, Kuo-Liang Huang:
A Learning Assistance Tool for Enhancing ICT Application Ability of Elementary and Secondary School Students. ICIC (1) 2008: 661-668 - 2006
- [j2]Chao-Yu Chou, Chun-Hua Chen, Chung-Ho Chen:
Economic design of variable sampling intervals T2 control charts using genetic algorithms. Expert Syst. Appl. 30(2): 233-242 (2006) - [c8]Chun-Hua Chen, Jinn-ke Jan, Chao-Hsing Hsu:
One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature. ICICIC (3) 2006: 300-303 - [c7]Chao-Hsing Hsu, Wen-Jye Shyr, Chun-Hua Chen:
Adaptive Pattern Nulling Design of Linear Array Antenna by Phase-Only Perturbations Using Memetic Algorithms. ICICIC (3) 2006: 308-311 - [c6]Chun-Hua Chen, Gwoboa Horng:
More Robust Private Information. SECRYPT 2006: 297-302 - 2005
- [c5]Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng:
Protecting Customer's Privacy in Querying Valuable Information Combined with E-Payment Scheme. ICITA (2) 2005: 580-583 - [c4]Chun-Hua Chen, Chi-Min Lan, Gwoboa Horng
:
A practical voting system for small-scale election. ITRE 2005: 322-326 - 2004
- [j1]Sun-Yuan Hsieh, Chun-Hua Chen:
Pancyclicity on Möbius cubes with maximal edge faults. Parallel Comput. 30(3): 407-421 (2004) - [c3]Chun-Hua Chen, Gwoboa Horng:
Protecting the Privacy of Users in e-Commerce Environment. CCCT (1) 2004: 63-67 - [c2]Sun-Yuan Hsieh, Chun-Hua Chen:
Pancyclicity on Möbius Cubes with Edge Faults. ISPAN 2004: 168-173 - [c1]Chao-Hsing Hsu, Chun-Hua Chen:
Optimizing Beam Pattern of Adaptively Linear Array Antenna by Phase Perturbations Using Genetic Algorithms. KES 2004: 929-936
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-14 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint