Showing results 47 to 66 of 71
< previous
next >
Date | Title | Author(s) |
27-Oct-2020 | Malware Detection System Based on API Log Data Mining | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Hsiao, Han-Wei; Chou, Chun-Han |
2-Sep-2020 | Multireceiver Predicate Encryption for Online Social Networks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Huang, Jheng-Jia; Chen, Shih-Fen; Kikuchi, Hiroaki |
27-Oct-2020 | Mutually Anonymous Fair Exchange Protocol with Offline Third Party | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Huang, Jheng-Jia; Chu, Huang-Kai |
2-Sep-2020 | On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Sung, Cheng-Wei |
27-Oct-2021 | Practical Inner Product Encryption with Constant Private Key | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin |
2-Sep-2020 | Probably Secure Efficient Anonymous Credential Scheme | 曾一凡; Tseng, Yi-Fan; Wu, Chien-Nan; Fan, Chun-I; Huang, Jheng-Jia; Kikuchi, Hiroaki |
2-Sep-2020 | Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
2-Sep-2020 | Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Chih-Wen |
11-Sep-2023 | Public Key Encryption with Hierarchical Authorized Keyword Search | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan;Chien, Chu Chieh;Tso, Raylin;Mambo, Masahiro |
6-Feb-2023 | Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan;Tso, Raylin;Mambo, Masahiro;Chen, Yu-Chi |
27-Oct-2020 | Secure Certificateless Signature Scheme Supporting Batch Verification | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu; Huang, Jheng-Jia |
27-Oct-2020 | Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki |
2-Sep-2020 | Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki |
27-Oct-2020 | Signcryption from NTRU Lattices Without Random Oracles | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin; Mambo, Masahiro |
2-Sep-2020 | Storage-Saving Bi- Dimensional Privacy-Preserving Data Aggregation in Smart Grids | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Yi-Hui; Zhang, Fangguo |
27-Oct-2020 | Storage-Saving Bi-Dimensional Privacy- Preserving Data Aggregation in Smart Grids | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Yi-Hui; Zhang, Fangguo |
2-Sep-2020 | Strongly Secure Certificateless Signature Scheme Supporting Batch Verification | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu |
2-Sep-2020 | Top-Level Secure Certificateless Signature Scheme in the Standard Model | 曾一凡; Tseng, Yi-Fan; Chen, Ching-Wen; Fan, Chun-I |
27-Oct-2020 | Transformation Between Attribute-Based Encryption and Key-Aggregate Cryptosystem | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Cheng-Yuan, E; Huang, Jheng-Jia |
27-Oct-2020 | Verifiable Privacy- Preserving Payment Mechanism for Smart Grids | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Huang, Jheng-Jia; Chen, Yen-Hao; Kuo, Hsin-Nan |