Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
2012 | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | Wu, T. S.; Pei-Yih Ting ; Han-Yu Lin | Transactions on Emerging Telecommunications Technologies | | |
2011 | Audio watermarking scheme with dynamic adjustment in mute period | Wu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S. | Expert Systems with Applications | | |
2012 | Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs | Han-Yu Lin ; Wu, T. S.; Huang, S. K. | Journal of Information Science and Engineering | | |
2008 | Convertible multi-authenticated encryption scheme | Wu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C. | Information Sciences | | |
2011 | A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation | Han-Yu Lin ; Wu, T. S.; Yeh, Y. S. | Journal of Information Science and Engineering | | |
2010 | EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTION | Tsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E. | International Journal of Innovative Computing Information and Control | | |
2015 | Efficient English Auction Scheme without a Secure Channel | Wu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin | International Arab Journal of Information Technology | | |
2010 | Efficient proxy signcryption scheme with provable CCA and CMA security | Han-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S. | Computers & Mathematics with Applications | | |
2009 | Efficient self-certified proxy CAE scheme and its variants | Wu, T. S.; Han-Yu Lin | Journal of Systems and Software | | |
2012 | An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce | Han-Yu Lin ; Wu, T. S.; Huang, S. K. | Journal of Information Science and Engineering | | |
2010 | EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIES | Wu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y. | International Journal of Innovative Computing Information and Control | | |
2011 | Generalized Anonymous Broadcast Encryption Scheme | Pei-Yih Ting ; Chang, S. W.; Wu, T. S. | Journal of Internet Technology | | |
2008 | A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECY | Wu, T. S.; Han-Yu Lin | International Journal of Innovative Computing Information and Control | | |
2020 | Like Cures Like: Pharmacological Activity of Anti-Inflammatory Lipopolysaccharides From Gut Microbiome | Lin, T. L.; Shu, C. C.; Young-Mao Chen ; Lu, J. J.; Wu, T. S.; Lai, W. F.; Tzeng, C. M.; Lai, H. C.; Lu, C. C. | Frontiers in Pharmacology | | |
2013 | Non-Interactive Authenticated Key Agreement over the Mobile Communication Network | Wu, T. S.; Han-Yu Lin | Mobile Networks & Applications | | |
2013 | A novel probabilistic signature based on bilinear square DiffieHellman problem and its extension | Wu, T. S.; Han-Yu Lin | Security and Communication Networks | | |
2012 | PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTS | Hsu, C. L.; Wu, T. S.; Han-Yu Lin | International Journal of Innovative Computing Information and Control | | |
2016 | Photograph watermarking | Lee, M. L.; Pei-Yih Ting ; Wu, T. S. | Multimedia Tools and Applications | | |
2014 | Provably secure proxy convertible authenticated encryption scheme based on RSA | Wu, T. S.; Han-Yu Lin | Information Sciences | | |
2013 | Secure Universal Designated Verifier Signature and its Variant for Privacy Protection | Wu, T. S.; Han-Yu Lin | Information Technology and Control | | |