公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2014 | Efficient anonymous multi-receiver ID-based encryption with constant decryption cost | Yuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Hung-Yu Chien | | | |
2017 | Efficient Anonymous Multireceiver Certificateless Encryption | Hung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T. | Ieee Systems Journal | 23 | |
2019 | Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices | Tseng, Y. M.; Tsai, T. T. ; Wu, J. D.; Huang, S. S. | Informatica | 1 | |
2015 | Efficient ID-based encryption with outsourced revocation authority | Chung-Peng Huang; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
2015 | Efficient revocable certificateless public key encryption with a delegated revocation authority | Tsai, T. T. ; Tseng, Y. M.; Huang, S. S. | Security and Communication Networks | 7 | |
2012 | Efficient Revocable ID-Based Encryption with a Public Channel | Tseng, Y. M.; Tsai, T. T | Computer Journal | 59 | |
2022 | An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network | Tsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-Chieh | JOURNAL OF SENSORS | 1 | |
2013 | Efficient Revocable Multi-Receiver ID-Based Encryption | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Information Technology and Control | 10 | |
2014 | Efficient searchable ID-based encryption with a designated server | Wu, T. Y.; Tsai, T. T ; Tseng, Y. M. | Annals of Telecommunications | 36 | |
2021 | An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared Verification | Han-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu | | | |
2014 | Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles | Tsai, T. T ; Tseng, Y. M.; Huang, S. S. | Informatica | 8 | |
2015 | Enhancement on strongly secure group key agreement | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Security and Communication Networks | 3 | |
2014 | Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environments | Li-Chun Tseng ; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
2012 | A Fully Secure Revocable ID-Based Encryption in the Standard Model | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Informatica | 16 | |
2018 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | Tseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P. | Ieee Transactions on Cloud Computing | 15 | |
2022 | An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments | Lin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-Chung | SENSORS | 2 | |
2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | 8 | |
2022 | Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model | Tsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-Hao | IEEE ACCESS | 0 | |
2022 | Leakage-resilient certificate-based authenticated key exchange protocol | Tung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung | | | |
2020 | Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage | Jui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai | | | |