:::

研究人才詳細資料


出版年月 著作類別 著作名稱 作者 收錄出處
2023-12 期刊論文 CBEET: constructing certificate-based encryption with equality test in the CB-PKS Tung-Tso Tsai, Han-Yu Lin and Cheng-Ye Wu Information Technology and Control
2023-06 期刊論文 Leakage-resilient certificateless signcryption scheme under a continual leakage model Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang IEEE Access
2023-03 期刊論文 Fully continuous leakage-resilient certificate-based signcryption scheme for mobile communications Yuh-Min Tseng,Tung-Tso Tsai and Sen-Shan Huang Informatica
2023-03 期刊論文 Identity-based proxy re-encryption scheme using fog computing and anonymous key generation Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting and Yan-Rong Fan Sensors
2023-03 期刊論文 Leakage-resilient anonymous multi-receiver certificate-based key encapsulation scheme Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang IEEE Access
2022-12 期刊論文 Revocable certificateless public key encryption with equality test Tung-Tso Tsai, Han-Yu Lin and Han-Ching Tsai Information Technology and Control
2022-09 期刊論文 Leakage-resilient anonymous multi-recipient signcryption under a continual leakage model Tung-Tso Tsai, Yuh-Min Tseng, Sen-Shan Huang, Jia-Yi Xie and Ying-Hao Hung IEEE Access
2022-08 期刊論文 An efficient revocable identity-based encryption with equality test scheme for the wireless body area network Tung-Tso Tsai, Han-Yu Lin and Hsiao-Chieh Chang Journal of Sensors
2022-08 期刊論文 Leakage-resilient certificate-based authenticated key exchange protocol Tung-Tso Tsai, Sen-Shan Huang, Yuh-Min Tseng, Yun-Hsin Chuang and Ying-Hao Hung IEEE Open Journal of the Computer Society
2022-08 期刊論文 Secure access control using updateable attribute keys Han-Yu Lin, Tung-Tso Tsai, Hong-Ru Wu and Miao-Si Ku Mathematical Biosciences and Engineering
2022-06 研討會論文 Certificate-based encryption with equality test Yu-Hsiang Tseng, Tung-Tso Tsai, Han-Yu Lin and Cheng-Ye Wu
2022-05 期刊論文 An improved ID-based data storage scheme for fog-enabled IoT environments Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting and Ching-Chung Chen Sensors
2022-01 期刊論文 Leakage-resilient revocable certificateless encryption with an outsourced revocation authority Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Yun-Hsin Chuang and Ying-Hao Hung Informatica
2021-09 期刊論文 A leakage-resilient ID-based authenticated key exchange protocol with a revocation mechanism Tung-Tso Tsai, Yun-Hsin Chuang, Yuh-Min Tseng, Sen-Shan Huang and Ying-Hao Hung IEEE Access
2021-06 研討會論文 An efficient strong designated multi-verifier signature scheme with shared verification Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting and Hsu-Lun Wu
2020-12 期刊論文 Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server Yuh-Min Tseng, Jui-Di Wu, Sen-Shan Huang and Tung-Tso Tsai Information Technology and Control
2020-07 期刊論文 Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang and Tung-Tso Tsai IEEE Open Journal of the Computer Society
2019-09 期刊論文 Efficient certificate-based signature with short key and signature sizes from lattices Yuh-Min Tseng, Tung-Tso Tsai, Jui-Di Wu and Sen-Shan Huang Informatica
2019-01 期刊論文 Leakage-resilient certificate-based signature resistant to side-channel attacks Jui-Di Wu, Yuh-Min Tseng, Sen-Shan Huang and Tung-Tso Tsai IEEE Access
2018-10 期刊論文 Identity-based encryption with cloud revocation authority and its applications Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang and Chung-Peng Huang IEEE Transactions on Cloud Computing
2017-12 期刊論文 Efficient anonymous multireceiver certificateless encryption Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng and Tung-Tso Tsai IEEE Systems Journal
2017-01 期刊論文 SIBSC: separable identity-based signcryption for resource-constrained devices Tung-Tso Tsai, Sen-Shan Huang and Yuh-Min Tseng Informatica
2016-05 研討會論文 Cryptanalysis and improvement of provable a data possession scheme in public cloud storage Tung-Tso Tsai, Yuh-Min Tseng, Ying-Hao Hung and Sen-Shan Huang
2016-01 期刊論文 List-free ID-based mutual authentication and key agreement protocol for multi-server architectures Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai and Jia-Hua Ke IEEE Transactions on Emerging Topics in Computing
2015-11 期刊論文 Efficient revocable certificateless public key encryption with a delegated revocation authority Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang Security and Communication Networks
2015-09 期刊論文 Revocable certificateless public key encryption Tung-Tso Tsai and Yuh-Min Tseng IEEE Systems Journal
2015-07 研討會論文 Strongly unforgeable revocable certificateless signature Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang and Ying-Hao Hung
2015-05 期刊論文 A novel ID-based authentication and key exchange protocol resistant to ephemeral secret leakage attacks for mobile devices Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai and Li Tseng International Journal of Distributed Sensor Networks
2015-05 研討會論文 Efficient ID-based encryption with outsourced revocation authority Chung-Peng Huang, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang
2015-01 期刊論文 Certificateless signature with strong unforgeability in the standard model Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng and Tung-Tso Tsai Informatica
2014-11 期刊論文 Secure certificateless signature with revocation in the standard model Tung-Tso Tsai, Sen-Shan Huang and Yuh-Min Tseng Mathematical Problems in Engineering
2014-09 期刊論文 Strongly secure revocable ID-based signature without random oracles Ying-Hao Hung, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang Information Technology and Control
2014-06 期刊論文 A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng Scientific World Journal
2014-05 研討會論文 Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environments Li Tseng, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang
2014-05 研討會論文 Revocable ID-based mutual authentication and key agreement protocol for multi-server environments Jia-Hua Ke, Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang
2014-05 研討會論文 Secure certificateless signature in the standard model Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang
2014-04 研討會論文 Efficient anonymous multi-receiver ID-based encryption with constant decryption cost Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang and Hung-Yu Chien
2014-02 期刊論文 Enhancement on strongly secure group key agreement Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang Security and Communication Networks
2013-10 期刊論文 Efficient searchable ID-based encryption with a designated server Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng Annals of telecommunications
2013-10 期刊論文 Efficient strongly unforgeable ID-based signature without random oracles Tung-Tso Tsai, Yuh-Min Tseng and Sen-Shan Huang Informatica
2013-10 期刊論文 Provably secure revocable ID-based signature in the standard model Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu Security and Communication Networks
2013-06 研討會論文 Practical revocable ID-based signature with a public channel Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu
2013-01 期刊論文 Efficient revocable multi-receiver ID-based encryption Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu Information Technology and Control
2013-01 期刊論文 Leakage-free ID-based signature Yuh-Min Tseng, Tung-Tso Tsai and Sen-Shan Huang The Computer Journal
2012-12 期刊論文 RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu Informatica
2012-09 期刊論文 A fully secure revocable ID-based encryption in the standard model Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu Informatica
2012-08 期刊論文 A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants Tsu-Yang Wu, Yuh-Min Tseng and Tung-Tso Tsai Computer Networks
2012-07 期刊論文 A revocable ID-based signcryption scheme Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng Journal of Information Hiding and Multimedia Signal Processing
2012-07 研討會論文 Revocable ID-based signature scheme with batch verifications Tsu-Yang Wu, Tung-Tso Tsai and Yuh-Min Tseng
2012-05 研討會論文 Novel revocable hierarchical ID-based encryption with a delegated revocation authority Tung-Tso Tsai, Yuh-Min Tseng and Tsu-Yang Wu
2012-04 期刊論文 Efficient revocable ID-based encryption with a public channel Yuh-Min Tseng and Tung-Tso Tsai The Computer Journal
2011-06 研討會論文 A convinced commitment scheme for bilinear Diffie-Hellman problem Yuh-Min Tseng, Tsu-Yang Wu and Tung-Tso Tsai