Showing results 17 to 36 of 71
< previous
next >
Date | Title | Author(s) |
11-Sep-2023 | Blockchain-based Confidential Payment System with Controllable Regulation | 曾一凡; Tseng, Yi-Fan; Liao, Yu-Chen;Tso, Raylin;Liu, Zi-Yuan |
11-Sep-2023 | Blockchain-based Self-sovereign Identity System with Attribute-based Issuance | 曾一凡; Tseng, Yi-Fan; Lee, Yi-Hsiu;Liu, Zi-Yuan;Tso, Raylin |
9-Dec-2021 | CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Feng, Cheng-Chun |
17-Feb-2023 | Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes | 曾一凡; Tseng, Yi-Fan |
2-Sep-2020 | Cryptanalysis and Improvement on Wang et al.`s Attribute-Based Searchable Encryption Scheme | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wu, Si-Jing; Kuo, Hsin-Nan; Huang, Jheng-Jia |
17-Feb-2023 | Cryptanalysis on Lin and Wu’s Undeniable (t, n)-Threshold Signature Scheme with Cheater Identification | 曾一凡; Tseng, Yi-Fan |
27-Oct-2020 | Cryptanalysis on the Anonymity of Li et al.’s Ciphertext-Policy Attribute-Based Encryption Scheme | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
9-Dec-2021 | Cryptanalysis on Two Pairing-Free Ciphertext-Policy Attribute-Based Encryption Schemes | 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia |
17-Feb-2023 | Cryptanalysis to Ming et al.’s Revocable Multi-Authority Attribute-Based Encryption | 曾一凡; Tseng, Yi-Fan |
17-Feb-2023 | Cryptanalysis to Sowjanya et al.’s Attribute-Based Encryptions from Elliptic Curve Cryptography | 曾一凡; Tseng, Yi-Fan |
6-Feb-2023 | Decentralized Inner-Product Encryption with Constant-Size Ciphertext | 曾一凡; Tseng, Yi-Fan; Gao, Shih-Jie |
23-Dec-2021 | Designated-ciphertext searchable encryption | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin; Mambo, Masahiro |
9-Dec-2021 | Dynamic Blockchain Storage Scheme Based on Sidechains | 曾一凡; Tseng, Yi-Fan |
27-Oct-2020 | Efficient Key-Aggregate Proxy Reencryption for Secure Data Sharing in Clouds | 曾一凡; Tseng, Yi-Fan; Chen, Wei-Hao; Fan, Chun-I |
9-Dec-2021 | Efficient Platform for Traceable Collaborative Workflow Based on Bi-Trapdoor Hash Function | 曾一凡; Tseng, Yi-Fan |
9-Dec-2021 | Efficient Subset Predicate Encryption for Internet of Things | 曾一凡; Tseng, Yi-Fan |
2-Sep-2020 | Enabled/Disabled Predicate Encryption in Clouds | 曾一凡; Tseng, Yi-Fan; Huang, Shi-Yuan; Fan, Chun-I |
6-Feb-2023 | Fast keyword search over encrypted data with short ciphertext in clouds | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I;Liu, Zi-Cheng |
5-Mar-2020 | FGAC-NDN: Fine-Grained Access Control for Named Data Networks | 曾一凡; Tseng , Yi-Fan; Fan , Chun-I; Wu, Chin-Yu |
27-Oct-2020 | Flexible Authentication Protocol with Key Reconstruction in WBAN Environments | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Wang, Jian-Sheng; Huang, Jheng-Jia; Juang, Wen-Shenq; Kikuchi, Hiroaki |