Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
2007 | Generalized Convertible Authenticated Encryption Schemes for Smart Card Applications | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin | | | |
2007 | Group-Oriented Convertible Authenticated Encryption Scheme with (t, n) Shared Verification | Han-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Tzu-Chiang Lin | | | |
2014 | Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension | Han-Yu Lin | Information Technology and Control | | |
2008 | A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECY | Wu, T. S.; Han-Yu Lin | International Journal of Innovative Computing Information and Control | | |
2019 | A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures | Han-Yu Lin ; Hong-Ru Wu; Pei-Yih Ting ; Po-Ting Lee | 2019 2nd International Conference on Communication Engineering and Technology (ICCET) | | |
2014 | ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving Applications | Han-Yu Lin | | | |
2013 | An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network | Hsu, C. L.; Han-Yu Lin | Ksii Transactions on Internet and Information Systems | | |
2015 | Improved chaotic maps-based password-authenticated key agreement using smart cards | Han-Yu Lin | Communications in Nonlinear Science and Numerical Simulation | | |
2011 | Improved convertible authenticated encryption scheme with provable security | Han-Yu Lin ; Hsu, C. L.; Huang, S. K. | Information Processing Letters | | |
2022 | An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments | Lin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-Chung | SENSORS | 2 | |
2021 | An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds | Lin, Han-Yu ; Hung, Yao-Min | SENSORS | 5 | |
2006 | Improved Threshold Authenticated Encryption Scheme Based on the Factorization Problem | Tzong-Sun Wu; Han-Yu Lin ; Won-Yi Chang | | | |
2003 | Improvement of Miyazaki-Takaragi Threshold Digital Signature Scheme | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang | | | |
2017 | A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks | Han-Yu Lin ; Leo-Fan Yang; Yao-Min Hung | | | |
2015 | Location-based data encryption for wireless sensor network using dynamic keys | Han-Yu Lin | Wireless Networks | | |
2021 | A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System | Lin, Han-Yu ; Jiang, Yan-Ru | APPLIED SCIENCES-BASEL | 6 | |
2018 | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure | Han-Yu Lin | Ieee Access | | |
2016 | A New Convertible Authenticated Encryption Scheme Based on Bilinear Square Diffie-Hellman Problem | Han-Yu Lin | | | |
2013 | New Efficient Identity-Based Key-Insulated Multisignature Scheme | Han-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Chi-Kuang Yeh | | | |
2011 | New identity-based key-insulated convertible multi-authenticated encryption scheme | Hsu, C. L.; Han-Yu Lin | Journal of Network and Computer Applications | | |