公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2014 | Efficient searchable ID-based encryption with a designated server | Wu, T. Y.; Tsai, T. T ; Tseng, Y. M. | Annals of Telecommunications | 36 | |
2021 | An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared Verification | Han-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu | | | |
2014 | Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles | Tsai, T. T ; Tseng, Y. M.; Huang, S. S. | Informatica | 8 | |
2015 | Enhancement on strongly secure group key agreement | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Security and Communication Networks | 3 | |
2014 | Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environments | Li-Chun Tseng ; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
2012 | A Fully Secure Revocable ID-Based Encryption in the Standard Model | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Informatica | 16 | |
2018 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | Tseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P. | Ieee Transactions on Cloud Computing | 15 | |
2022 | An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments | Lin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-Chung | SENSORS | 2 | |
2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | 8 | |
2022 | Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model | Tsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-Hao | IEEE ACCESS | 0 | |
2022 | Leakage-resilient certificate-based authenticated key exchange protocol | Tung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung | | | |
2020 | Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage | Jui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai | | | |
2019 | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Ieee Access | 7 | |
2021 | A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism | Tsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-Hao | IEEE ACCESS | 3 | |
2020 | Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server | Yuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai | | | |
2022 | Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority | Tseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-Hao | INFORMATICA | 2 | |
2020 | Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Informatica | 6 | |
2016 | List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures | Tseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H. | Ieee Transactions on Emerging Topics in Computing | 41 | |
2015 | A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices | Tseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L. | International Journal of Distributed Sensor Networks | 7 | |
2012 | Novel revocable hierarchical ID-based encryption with a delegated revocation authority | Tung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu | | | |