公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | 8 | |
2019 | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Ieee Access | 7 | |
2020 | Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Informatica | 6 | |
2016 | List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures | Tseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H. | Ieee Transactions on Emerging Topics in Computing | 41 | |
2015 | A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices | Tseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L. | International Journal of Distributed Sensor Networks | 7 | |
2014 | Secure Certificateless Signature with Revocation in the Standard Model | Tung-Tso Tsai ; Huang, S. S.; Tseng, Y. M. | Mathematical Problems in Engineering | 10 | |
2017 | SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices | Tsai, T. T. ; Huang, S. S.; Tseng, Y. M. | Informatica | 5 | |
2014 | Strongly Secure Revocable ID-based Signature without Random Oracles | Hung, Y. H.; Tsai, T. T ; Tseng, Y. M.; Huang, S. S. | Information Technology and Control | 12 | |