出版年月 |
著作類別 |
著作名稱 |
作者 |
收錄出處 |
2023-12 |
期刊論文
|
CBEET: constructing certificate-based encryption with equality test in the CB-PKS |
Tung-Tso Tsai, Han-Yu Lin and Cheng-Ye Wu |
Information Technology and Control
|
2023-06 |
期刊論文
|
Leakage-resilient certificateless signcryption scheme under a continual leakage model |
Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
IEEE Access
|
2023-03 |
期刊論文
|
Fully continuous leakage-resilient certificate-based signcryption scheme for mobile communications |
Yuh-Min Tseng,Tung-Tso Tsai and Sen-Shan Huang |
Informatica
|
2023-03 |
期刊論文
|
Identity-based proxy re-encryption scheme using fog computing and anonymous key generation |
Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting and Yan-Rong Fan |
Sensors
|
2023-03 |
期刊論文
|
Leakage-resilient anonymous multi-receiver certificate-based key encapsulation scheme |
Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
IEEE Access
|
2022-12 |
期刊論文
|
Revocable certificateless public key encryption with equality test |
Tung-Tso Tsai, Han-Yu Lin and Han-Ching Tsai |
Information Technology and Control
|
2022-09 |
期刊論文
|
Leakage-resilient anonymous multi-recipient signcryption under a continual leakage model |
Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang, Jia-Yi Xie and Ying-Hao Hung |
IEEE Access
|
2022-08 |
期刊論文
|
An efficient revocable identity-based encryption with equality test scheme for the wireless body area network |
Tung-Tso Tsai, Han-Yu Lin and Hsiao-Chieh Chang
|
Journal of Sensors
|
2022-08 |
期刊論文
|
Leakage-resilient certificate-based authenticated key exchange protocol |
Tung-Tso Tsai, Sen-Shan Huang, Yuh-Min Tseng, Yun-Hsin Chuang and Ying-Hao Hung |
IEEE Open Journal of the Computer Society
|
2022-08 |
期刊論文
|
Secure access control using updateable attribute keys |
Han-Yu Lin, Tung-Tso Tsai, Hong-Ru Wu and Miao-Si Ku |
Mathematical Biosciences and Engineering
|
2022-06 |
研討會論文
|
Certificate-based encryption with equality test |
Yu-Hsiang Tseng, Tung-Tso Tsai, Han-Yu Lin and Cheng-Ye Wu |
|
2022-05 |
期刊論文
|
An improved ID-based data storage scheme for fog-enabled IoT environments |
Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting and Ching-Chung Chen |
Sensors
|
2022-01 |
期刊論文
|
Leakage-resilient revocable certificateless encryption with an outsourced revocation authority |
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Yun-Hsin Chuang and Ying-Hao Hung |
Informatica
|
2021-09 |
期刊論文
|
A leakage-resilient ID-based authenticated key exchange protocol with a revocation mechanism |
Tung-Tso Tsai, Yun-Hsin Chuang, Yuh-Min Tseng, Sen-Shan Huang and Ying-Hao Hung |
IEEE Access
|
2021-06 |
研討會論文
|
An efficient strong designated multi-verifier signature scheme with shared verification |
Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting and Hsu-Lun Wu |
|
2020-12 |
期刊論文
|
Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server |
Yuh-Min Tseng, Jui-Di Wu, Sen-Shan Huang and Tung-Tso Tsai |
Information Technology and Control
|
2020-07 |
期刊論文
|
Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage |
Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang and Tung-Tso Tsai |
IEEE Open Journal of the Computer Society
|
2019-09 |
期刊論文
|
Efficient certificate-based signature with short key and signature sizes from lattices |
Yuh-Min Tseng, Tung-Tso Tsai, Jui-Di Wu and Sen-Shan Huang |
Informatica
|
2019-01 |
期刊論文
|
Leakage-resilient certificate-based signature resistant to side-channel attacks |
Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang and Tung-Tso Tsai |
IEEE Access
|
2018-10 |
期刊論文
|
Identity-based encryption with cloud revocation authority and its applications |
Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang and Chung-Peng Huang |
IEEE Transactions on Cloud Computing
|
2017-12 |
期刊論文
|
Efficient anonymous multireceiver certificateless encryption |
Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng and Tung-Tso Tsai |
IEEE Systems Journal
|
2017-01 |
期刊論文
|
SIBSC: separable identity-based signcryption for resource-constrained devices |
Tung-Tso Tsai, Sen-Shan Huang and Yuh-Min Tseng |
Informatica
|
2016-05 |
研討會論文
|
Cryptanalysis and improvement of provable a data possession scheme in public cloud storage |
Tung-Tso Tsai, Yuh-Min Tseng, Ying-Hao Hung and Sen-Shan Huang |
|
2016-01 |
期刊論文
|
List-free ID-based mutual authentication and key agreement protocol for multi-server architectures |
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai and Jia-Hua Ke |
IEEE Transactions on Emerging Topics in Computing
|
2015-11 |
期刊論文
|
Efficient revocable certificateless public key encryption with a delegated revocation authority |
Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
Security and Communication Networks
|
2015-09 |
期刊論文
|
Revocable certificateless public key encryption |
Tung-Tso Tsai and Yuh-Min Tseng |
IEEE Systems Journal
|
2015-07 |
研討會論文
|
Strongly unforgeable revocable certificateless signature |
Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang and Ying-Hao Hung |
|
2015-05 |
期刊論文
|
A novel ID-based authentication and key exchange protocol resistant to ephemeral secret leakage attacks for mobile devices |
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai and Li Tseng |
International Journal of Distributed Sensor Networks
|
2015-05 |
研討會論文
|
Efficient ID-based encryption with outsourced revocation authority |
Chung-Peng Huang, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
|
2015-01 |
期刊論文
|
Certificateless signature with strong unforgeability in the standard model |
Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng and Tung-Tso Tsai |
Informatica
|
2014-11 |
期刊論文
|
Secure certificateless signature with revocation in the standard model |
Tung-Tso Tsai, Sen-Shan Huang and Yuh-Min Tseng |
Mathematical Problems in Engineering
|
2014-09 |
期刊論文
|
Strongly secure revocable ID-based signature without random oracles |
Ying-Hao Hung, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
Information Technology and Control
|
2014-06 |
期刊論文
|
A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants |
Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng |
Scientific World Journal
|
2014-05 |
研討會論文
|
Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environments |
Li Tseng, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
|
2014-05 |
研討會論文
|
Revocable ID-based mutual authentication and key agreement protocol for multi-server environments |
Jia-Hua Ke, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
|
2014-05 |
研討會論文
|
Secure certificateless signature in the standard model |
Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
|
2014-04 |
研討會論文
|
Efficient anonymous multi-receiver ID-based encryption with constant decryption cost |
Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang and Hung-Yu Chien |
|
2014-02 |
期刊論文
|
Enhancement on strongly secure group key agreement |
Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang |
Security and Communication Networks
|
2013-10 |
期刊論文
|
Efficient searchable ID-based encryption with a designated server |
Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng |
Annals of telecommunications
|
2013-10 |
期刊論文
|
Efficient strongly unforgeable ID-based signature without random oracles |
Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang |
Informatica
|
2013-10 |
期刊論文
|
Provably secure revocable ID-based signature in the standard model |
Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu |
Security and Communication Networks
|
2013-06 |
研討會論文
|
Practical revocable ID-based signature with a public channel |
Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu |
|
2013-01 |
期刊論文
|
Efficient revocable multi-receiver ID-based encryption |
Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu |
Information Technology and Control
|
2013-01 |
期刊論文
|
Leakage-free ID-based signature |
Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang |
The Computer Journal
|
2012-12 |
期刊論文
|
RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE |
Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu |
Informatica
|
2012-09 |
期刊論文
|
A fully secure revocable ID-based encryption in the standard model |
Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu |
Informatica
|
2012-08 |
期刊論文
|
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants |
Tsu-Yang Wu, Yuh-Min Tseng and Tung-Tso Tsai |
Computer Networks
|
2012-07 |
期刊論文
|
A revocable ID-based signcryption scheme |
Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng |
Journal of Information Hiding and Multimedia Signal Processing
|
2012-07 |
研討會論文
|
Revocable ID-based signature scheme with batch verifications |
Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng |
|
2012-05 |
研討會論文
|
Novel revocable hierarchical ID-based encryption with a delegated revocation authority |
Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu |
|
2012-04 |
期刊論文
|
Efficient revocable ID-based encryption with a public channel |
Yuh-Min Tseng and Tung-Tso Tsai |
The Computer Journal
|
2011-06 |
研討會論文
|
A convinced commitment scheme for bilinear Diffie-Hellman problem |
Yuh-Min Tseng, Tsu-Yang Wu and Tung-Tso Tsai |
|