Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
2012 | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | Wu, T. S.; Pei-Yih Ting ; Han-Yu Lin | Transactions on Emerging Telecommunications Technologies | | |
2008 | Analysis of Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks | Han-Yu Lin ; Ting-Yu Huang; Tzong-Sun Wu; Tzong-Chen Wu | | | |
2019 | An Attribute-Based Mutual Authentication Scheme with Time-Bounded Keys | Han-Yu Lin ; Pei-Yih Ting ; Hong-Ru Wu | ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering | | |
2011 | Audio watermarking scheme with dynamic adjustment in mute period | Wu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S. | Expert Systems with Applications | | |
2012 | Authenticated Encryption Scheme Based on Paillier System with Verifiable Public Keys | Tzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang | | | |
2008 | Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable Recipient | Han-Yu Lin ; Tzong-Sun Wu | | | |
2022 | Certificate-based encryption with equality test | Yu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu | | | |
2012 | Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs | Han-Yu Lin ; Wu, T. S.; Huang, S. K. | Journal of Information Science and Engineering | | |
2014 | Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme | Han-Yu Lin | Wireless Personal Communications | | |
2014 | Chaotic Map Based Three-Party Authenticated Key Agreement | Han-Yu Lin | | | |
2014 | Chaotic map-based three-party authenticated key agreement | Han-Yu Lin | Security and Communication Networks | | |
2012 | Construction of a Taiwan biodiversity genetic database in cloud environments | Han-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang; Tun-Wen Pai | | | |
2012 | Construction of a Taiwan biodiversity genetic database in cloud environments | Han-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai | | | |
2014 | Convertible Authenticated Encryption Scheme with Hierarchical Access Control | Hsu, C. L.; Han-Yu Lin | Applied Mathematics & Information Sciences | | |
2008 | Convertible multi-authenticated encryption scheme | Wu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C. | Information Sciences | | |
2018 | Cryptanalysis and Improvement of an Efficient Certificateless Designated Verifier Signature Scheme | Han-Yu Lin ; Leo-Fan Yang; Chia-Hung Wu | | | |
2003 | Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access Control | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Shu-Hui Kao | | | |
2015 | Data Protection for Computer Forensics Using Cryptographic Mechanisms | Tzong-Sun Wu; Han-Yu Lin | | | |
2016 | Design and Construction of Secure Digital Will System | Wu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu | INT ARAB J INF TECHN | 0 | |
2011 | A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation | Han-Yu Lin ; Wu, T. S.; Yeh, Y. S. | Journal of Information Science and Engineering | | |