Showing results 42 to 61 of 68
< previous
next >
Date | Title | Author(s) |
9-Dec-2021 | Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
17-Feb-2023 | Lightweight and Efficient Source Authentication Scheme Based on Blockchain Approach in Open Data Environment | 曾一凡; Tseng, Yi-Fan; Huang, Jheng-Jia;Lo, Nai-Wei;Tung, Shao-Wei;Dai, Wen-Yan |
27-Oct-2020 | Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments | 曾一凡; Tseng, Yi-Fan; Huang*, Jheng-Jia; Juang, Wen-Shenq; Fan, Chun-I; Kikuchi, Hiroaki |
27-Oct-2020 | Malware Detection System Based on API Log Data Mining | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Hsiao, Han-Wei; Chou, Chun-Han |
2-Sep-2020 | Multireceiver Predicate Encryption for Online Social Networks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Huang, Jheng-Jia; Chen, Shih-Fen; Kikuchi, Hiroaki |
27-Oct-2020 | Mutually Anonymous Fair Exchange Protocol with Offline Third Party | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Huang, Jheng-Jia; Chu, Huang-Kai |
2-Sep-2020 | On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Sung, Cheng-Wei |
27-Oct-2021 | Practical Inner Product Encryption with Constant Private Key | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin |
2-Sep-2020 | Probably Secure Efficient Anonymous Credential Scheme | 曾一凡; Tseng, Yi-Fan; Wu, Chien-Nan; Fan, Chun-I; Huang, Jheng-Jia; Kikuchi, Hiroaki |
2-Sep-2020 | Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I |
2-Sep-2020 | Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Chih-Wen |
11-Sep-2023 | Public Key Encryption with Hierarchical Authorized Keyword Search | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan;Chien, Chu Chieh;Tso, Raylin;Mambo, Masahiro |
6-Feb-2023 | Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan;Tso, Raylin;Mambo, Masahiro;Chen, Yu-Chi |
27-Oct-2020 | Secure Certificateless Signature Scheme Supporting Batch Verification | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu; Huang, Jheng-Jia |
27-Oct-2020 | Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki |
2-Sep-2020 | Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Su, Hui-Po; Hsu, Ruei-Hau; Kikuchi, Hiroaki |
27-Oct-2020 | Signcryption from NTRU Lattices Without Random Oracles | 曾一凡; Tseng, Yi-Fan; Liu, Zi-Yuan; Tso, Raylin; Mambo, Masahiro |
2-Sep-2020 | Storage-Saving Bi- Dimensional Privacy-Preserving Data Aggregation in Smart Grids | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Yi-Hui; Zhang, Fangguo |
27-Oct-2020 | Storage-Saving Bi-Dimensional Privacy- Preserving Data Aggregation in Smart Grids | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Lin, Yi-Hui; Zhang, Fangguo |
2-Sep-2020 | Strongly Secure Certificateless Signature Scheme Supporting Batch Verification | 曾一凡; Tseng, Yi-Fan; Fan, Chun-I; Ho, Pei-Hsiu |