公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2015 | A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices | Tseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L. | International Journal of Distributed Sensor Networks | 7 | |
2014 | Secure Certificateless Signature with Revocation in the Standard Model | Tung-Tso Tsai ; Huang, S. S.; Tseng, Y. M. | Mathematical Problems in Engineering | 10 | |
2017 | SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices | Tsai, T. T. ; Huang, S. S.; Tseng, Y. M. | Informatica | 5 | |
2014 | Strongly Secure Revocable ID-based Signature without Random Oracles | Hung, Y. H.; Tsai, T. T ; Tseng, Y. M.; Huang, S. S. | Information Technology and Control | 12 | |