BibTeX records: Tzu-Chun Lin

download as .bib file

@article{DBLP:journals/ijnsec/LinYH19,
  author    = {Tzu{-}Chun Lin and
               Ting{-}Yi Yeh and
               Min{-}Shiang Hwang},
  title     = {Cryptanalysis of an ID-based Deniable Threshold Ring Authentication},
  journal   = {I. J. Network Security},
  volume    = {21},
  number    = {2},
  pages     = {298--302},
  year      = {2019},
  url       = {http://ijns.femto.com.tw/contents/ijns-v21-n2/ijns-2019-v21-n2-p298-302.pdf},
  timestamp = {Thu, 31 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LinYH19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Lin18,
  author    = {Tzu{-}Chun Lin},
  title     = {A Study of Non-Abelian Public Key},
  journal   = {I. J. Network Security},
  volume    = {20},
  number    = {2},
  pages     = {278--290},
  year      = {2018},
  url       = {http://ijns.femto.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p278-290.pdf},
  timestamp = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/Lin18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RuanL16a,
  author    = {Yefeng Ruan and
               Tzu{-}Chun Lin},
  title     = {An Integrated Recommender Algorithm for Rating Prediction},
  journal   = {CoRR},
  volume    = {abs/1608.02021},
  year      = {2016},
  url       = {http://arxiv.org/abs/1608.02021},
  archivePrefix = {arXiv},
  eprint    = {1608.02021},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RuanL16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recsys/LinN15,
  author    = {Tzu{-}Chun Lin and
               Xia Ning},
  title     = {Multi-Perspective Modeling for Click Event Prediction},
  booktitle = {Proceedings of the 2015 International {ACM} Recommender Systems Challenge,
               RecSys Challenge 2015, Vienna, Austria, September 16-20, 2015},
  pages     = {11:1--11:4},
  year      = {2015},
  crossref  = {DBLP:conf/recsys/2015challenge},
  url       = {https://doi.org/10.1145/2813448.2813520},
  doi       = {10.1145/2813448.2813520},
  timestamp = {Tue, 06 Nov 2018 11:07:03 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/recsys/LinN15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcmi/ChanJSMLLA11,
  author    = {Andrew L. Chan and
               Maya M. Juarez and
               David K. Shelton and
               Taylor MacDonald and
               Chin{-}Shang Li and
               Tzu{-}Chun Lin and
               Timothy E. Albertson},
  title     = {Novel computed tomographic chest metrics to detect pulmonary hypertension},
  journal   = {{BMC} Medical Imaging},
  volume    = {11},
  pages     = {7},
  year      = {2011},
  url       = {https://doi.org/10.1186/1471-2342-11-7},
  doi       = {10.1186/1471-2342-11-7},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/bmcmi/ChanJSMLLA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuLL11,
  author    = {Chi{-}Yu Liu and
               Cheng{-}Chi Lee and
               Tzu{-}Chun Lin},
  title     = {Cryptanalysis of an Efficient Deniable Authentication Protocol Based
               on Generalized ElGamal Signature Scheme},
  journal   = {I. J. Network Security},
  volume    = {12},
  number    = {1},
  pages     = {58--60},
  year      = {2011},
  url       = {http://ijns.femto.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p58-60.pdf},
  timestamp = {Sun, 13 Feb 2011 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/LiuLL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/TzengLL11,
  author    = {Shiang{-}Feng Tzeng and
               Cheng{-}Chi Lee and
               Tzu{-}Chun Lin},
  title     = {A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy},
  journal   = {I. J. Network Security},
  volume    = {12},
  number    = {3},
  pages     = {178--180},
  year      = {2011},
  url       = {http://ijns.femto.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p178-180.pdf},
  timestamp = {Sun, 13 Feb 2011 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/TzengLL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/Lin09,
  author    = {Tzu{-}Chun Lin},
  title     = {Algorithms on Elliptic Curves over Fields of Characteristic Two with
               Non-adjacent Forms},
  journal   = {I. J. Network Security},
  volume    = {9},
  number    = {2},
  pages     = {117--120},
  year      = {2009},
  url       = {http://ijns.femto.com.tw/contents/ijns-v9-n2/ijns-2009-v9-n2-p117-120.pdf},
  timestamp = {Sun, 08 Nov 2009 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijnsec/Lin09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/recsys/2015challenge,
  editor    = {David Ben{-}Shimon and
               Michael Friedmann and
               Lior Rokach and
               Bracha Shapira},
  title     = {Proceedings of the 2015 International {ACM} Recommender Systems Challenge,
               RecSys Challenge 2015, Vienna, Austria, September 16-20, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2813448},
  doi       = {10.1145/2813448},
  isbn      = {978-1-4503-3665-9},
  timestamp = {Tue, 06 Nov 2018 11:07:03 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/recsys/2015challenge},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics