Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
2018 | An Efficient Universal Designated Verifier Signature Scheme for Non-Transferable Data Sharing in Clouds | Han-Yu Lin ; Pei-Yih Ting ; Yan-Ru Jiang | ICIBE' 18: Proceedings of the 4th International Conference on Industrial and Business Engineering | | |
2017 | Efficient User Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards | Han-Yu Lin ; Chia-Hung Wu; Leo-Fan Yang | | | |
2010 | EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIES | Wu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y. | International Journal of Innovative Computing Information and Control | | |
2011 | Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue | Tzong-Sun Wu; Han-Yu Lin ; Ming-Lun Lee; Won-Yi Chen | | | |
2007 | Generalized Convertible Authenticated Encryption Schemes for Smart Card Applications | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin | | | |
2007 | Group-Oriented Convertible Authenticated Encryption Scheme with (t, n) Shared Verification | Han-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Tzu-Chiang Lin | | | |
2014 | Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension | Han-Yu Lin | Information Technology and Control | | |
2008 | A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECY | Wu, T. S.; Han-Yu Lin | International Journal of Innovative Computing Information and Control | | |
2019 | A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures | Han-Yu Lin ; Hong-Ru Wu; Pei-Yih Ting ; Po-Ting Lee | 2019 2nd International Conference on Communication Engineering and Technology (ICCET) | | |
2014 | ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving Applications | Han-Yu Lin | | | |
2013 | An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network | Hsu, C. L.; Han-Yu Lin | Ksii Transactions on Internet and Information Systems | | |
2015 | Improved chaotic maps-based password-authenticated key agreement using smart cards | Han-Yu Lin | Communications in Nonlinear Science and Numerical Simulation | | |
2011 | Improved convertible authenticated encryption scheme with provable security | Han-Yu Lin ; Hsu, C. L.; Huang, S. K. | Information Processing Letters | | |
2022 | An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments | Lin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-Chung | SENSORS | 2 | |
2021 | An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds | Lin, Han-Yu ; Hung, Yao-Min | SENSORS | 5 | |
2006 | Improved Threshold Authenticated Encryption Scheme Based on the Factorization Problem | Tzong-Sun Wu; Han-Yu Lin ; Won-Yi Chang | | | |
2003 | Improvement of Miyazaki-Takaragi Threshold Digital Signature Scheme | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang | | | |
2017 | A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks | Han-Yu Lin ; Leo-Fan Yang; Yao-Min Hung | | | |
2015 | Location-based data encryption for wireless sensor network using dynamic keys | Han-Yu Lin | Wireless Networks | | |
2021 | A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System | Lin, Han-Yu ; Jiang, Yan-Ru | APPLIED SCIENCES-BASEL | 6 | |