公開日期 | 標題 | 作者 | 來源出版物 | WOS | 全文 |
2015 | Certificateless Signature with Strong Unforgeability in the Standard Model | Hung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T | Informatica | 15 | |
2017 | Efficient Anonymous Multireceiver Certificateless Encryption | Hung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T. | Ieee Systems Journal | 23 | |
2019 | Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices | Tseng, Y. M.; Tsai, T. T. ; Wu, J. D.; Huang, S. S. | Informatica | 1 | |
2015 | Efficient revocable certificateless public key encryption with a delegated revocation authority | Tsai, T. T. ; Tseng, Y. M.; Huang, S. S. | Security and Communication Networks | 7 | |
2012 | Efficient Revocable ID-Based Encryption with a Public Channel | Tseng, Y. M.; Tsai, T. T | Computer Journal | 59 | |
2013 | Efficient Revocable Multi-Receiver ID-Based Encryption | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Information Technology and Control | 10 | |
2014 | Efficient searchable ID-based encryption with a designated server | Wu, T. Y.; Tsai, T. T ; Tseng, Y. M. | Annals of Telecommunications | 36 | |
2014 | Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles | Tsai, T. T ; Tseng, Y. M.; Huang, S. S. | Informatica | 8 | |
2015 | Enhancement on strongly secure group key agreement | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Security and Communication Networks | 3 | |
2012 | A Fully Secure Revocable ID-Based Encryption in the Standard Model | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Informatica | 16 | |
2018 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | Tseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P. | Ieee Transactions on Cloud Computing | 15 | |
2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | 8 | |
2019 | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Ieee Access | 7 | |
2020 | Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Informatica | 6 | |
2016 | List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures | Tseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H. | Ieee Transactions on Emerging Topics in Computing | 41 | |
2015 | A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices | Tseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L. | International Journal of Distributed Sensor Networks | 7 | |
2014 | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants | Wu, T. Y.; Tsai, T. T ; Tseng, Y. M. | Scientific World Journal | 3 | |
2013 | Provably secure revocable ID-based signature in the standard model | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Security and Communication Networks | 26 | |
2015 | Revocable Certificateless Public Key Encryption | Tsai, T. T ; Tseng, Y. M. | Ieee Systems Journal | 26 | |
2012 | A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants | Wu, T. Y.; Tseng, Y. M.; Tsai, T. T | Computer Networks | 32 | |