Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
2024/10/1 | Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments | Lin, Han-Yu ; Chen, Pei-Ru | SENSORS | | |
2022 | Revocable certificateless public key encryption with equality test | Tung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai | | | |
2022 | Revocable Certificateless Public Key Encryption with Equality Test | Tsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-Ching | INFORMATION TECHNOLOGY AND CONTROL | | |
2024/1/1 | A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-Lun | IEEE ACCESS | | |
2014 | A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash Function | Chung-Fu Lu; Chien-Lung Hsu; Han-Yu Lin ; Chien-Hui Su | | | |
2004 | Robust Key Authentication Scheme Resistant to Public Key Substitution Attacks | Tzong-Sun Wu; Han-Yu Lin | | | |
2015 | RPCAE: a novel revocable proxy convertible authenticated encryption scheme | Han-Yu Lin | International Journal of Information Security | | |
2022 | Secure access control using updateable attribute keys | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-Si | MATHEMATICAL BIOSCIENCES AND ENGINEERING | 0 | |
2016 | Secure Certificateless Two-Party Key Agreement with Short Message | Han-Yu Lin | Information Technology and Control | | |
2015 | Secure Content Distribution Using Multi-hop Proxy Re-encryption | Han-Yu Lin | Wireless Personal Communications | | |
2009 | Secure Convertible Authenticated Encryption Scheme Based on RSA | Tzong-Sun Wu; Han-Yu Lin | | | |
2018 | A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems | Lin, Han-Yu | PLOS ONE | 1 | |
2014 | Secure ID-Based Strong Designated Verifier Signature Scheme for E-Commerce | Han-Yu Lin ; Chi-Kuang Yeh | | | |
2015 | Secure Identity-Based Strong Designated Verifier Signature Scheme with Low Computation | Han-Yu Lin ; Yao-Min Hung | | | |
2013 | Secure Universal Designated Verifier Signature and its Variant for Privacy Protection | Wu, T. S.; Han-Yu Lin | Information Technology and Control | | |
2012 | Security Essentials for Biodiversity Genome Database in Cloud Environments | Han-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai | | | |
2016 | Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based System | Han-Yu Lin ; Yao-Min Hung | | | |
2009 | Self-certified multi-proxy signature schemes with message recovery | Wu, T. S.; Hsu, C. L.; Han-Yu Lin | Journal of Zhejiang University-Science A | | |
2008 | Self-Certified Proxy Convertible Authenticated Encryption Scheme | Han-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Yi-Shiung Yeh | | | |
2014 | Shoulder-surfing-proof graphical password authentication scheme | Wu, T. S.; Lee, M. L.; Han-Yu Lin ; Wang, C. Y. | International Journal of Information Security | | |