研究成果

第 1 到 131 筆結果,共 131 筆。

公開日期標題作者來源出版物WOS全文
12024/10/1Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT EnvironmentsLin, Han-Yu ; Chen, Pei-RuSENSORS
22024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
32023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
42022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
52022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
62022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
72022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
82022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
92022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
102021Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systemsLin, Han-Yu INT J DISTRIB SENS N0
112021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
122021A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud SystemLin, Han-Yu ; Jiang, Yan-RuAPPLIED SCIENCES-BASEL6
132021An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in CloudsLin, Han-Yu ; Hung, Yao-MinSENSORS5
142020具可更新存取策略與註銷機制的多授權中心雲端醫療照護系統之研究林韓禹 
152020基於生成對抗網路之身分特徵擷取與生物識別高璿智; 邱垂邦; 丁培毅 ; 林韓禹 
162020工業物聯網資安威脅檢測與防護吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 
172019A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH AssumptionsHan-Yu Lin Information Technology and Control
182019An Attribute-Based Mutual Authentication Scheme with Time-Bounded KeysHan-Yu Lin ; Pei-Yih Ting ; Hong-Ru WuICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering
192019具時效性和屬性選擇的物聯網認證機制及群體會議金鑰分配系統之研究林韓禹 
202019Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud EnvironmentsLin, Han-Yu IEEE SYSTEMS JOURNAL4
212019Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud EnvironmentsHan-Yu Lin Ieee Systems Journal
222019A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared SecretsHan-Yu Lin Symmetry-Basel
232019A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking ServicesHan-Yu Lin Applied Sciences-Basel
242019A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size SignaturesHan-Yu Lin ; Hong-Ru Wu; Pei-Yih Ting ; Po-Ting Lee2019 2nd International Conference on Communication Engineering and Technology (ICCET)
252019去識別化生成對抗網路邱垂邦; 洪穎寧; 丁培毅 ; 林韓禹 
262019工業物聯網資安威脅檢測與防護吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 
272018A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systemsLin, Han-Yu PLOS ONE1
282018On Delegatability of a Certificateless Strong Designated Verifier Signature SchemeHan-Yu Lin ; Chia-Hung Wu; Yan-Ru Jiang
292018An Efficient Universal Designated Verifier Signature Scheme for Non-Transferable Data Sharing in CloudsHan-Yu Lin ; Pei-Yih Ting ; Yan-Ru JiangICIBE' 18: Proceedings of the 4th International Conference on Industrial and Business Engineering
302018適用雲端醫療照護系統下基於使用者屬性的動態密文查詢與分享機制之研究林韓禹 
312018Dynamic ID authentication scheme using chaotic mapHan-Yu Lin Wireless Networks
322018A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA SecureHan-Yu Lin Ieee Access
332018Cryptanalysis and Improvement of an Efficient Certificateless Designated Verifier Signature SchemeHan-Yu Lin ; Leo-Fan Yang; Chia-Hung Wu
342017植基於免憑證公鑰系統之可淨化數位簽章方法林韓禹 ; 丁培毅 ; 吳宗杉; 王冠翔; 陳伊萍
352017基於物聯網服務下的安全醫療資訊存取機制與去識別化驗證技術之研究林韓禹 
362017On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear PairingsHan-Yu Lin ; Pei-Yih Ting ; Leo-Fan YangICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering
372017Efficient User Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart CardsHan-Yu Lin ; Chia-Hung Wu; Leo-Fan Yang
382017A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise AttacksHan-Yu Lin ; Leo-Fan Yang; Yao-Min Hung
392017Efficient mobile dynamic ID authentication and key agreement scheme without trusted serversHan-Yu Lin International Journal of Communication Systems
402017PCMAE: A Proxy Convertible Multi-AE Scheme and Its VariantHan-Yu Lin Information Technology and Control
412017Toward Secure CB-Signcryption for Wireless Ad Hoc NetworksHan-Yu Lin ; Wu, T. S.Ad Hoc & Sensor Wireless Networks
422016車載網路結合行動照護醫療資訊系統之可信賴資料交換與遠端存取控制之研究林韓禹 
432016Design and Construction of Secure Digital Will SystemWu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu INT ARAB J INF TECHN0
442016Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin ; Yao-Min Hung
452016A New Convertible Authenticated Encryption Scheme Based on Bilinear Square Diffie-Hellman ProblemHan-Yu Lin 
462016Secure Certificateless Two-Party Key Agreement with Short MessageHan-Yu Lin Information Technology and Control
472016Efficient dynamic authentication for mobile satellite communication systems without verification tableHan-Yu Lin International Journal of Satellite Communications and Networking
482015Secure Identity-Based Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Yao-Min Hung
492015Location-based data encryption for wireless sensor network using dynamic keysHan-Yu Lin Wireless Networks
502015雲端醫療照護系統的使用者隱私保護機制與資料安全加值模型之研究林韓禹 
512015RPCAE: a novel revocable proxy convertible authenticated encryption schemeHan-Yu Lin International Journal of Information Security
522015Secure Content Distribution Using Multi-hop Proxy Re-encryptionHan-Yu Lin Wireless Personal Communications
532015Efficient English Auction Scheme without a Secure ChannelWu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin International Arab Journal of Information Technology
542015Data Protection for Computer Forensics Using Cryptographic MechanismsTzong-Sun Wu; Han-Yu Lin 
552015Improved chaotic maps-based password-authenticated key agreement using smart cardsHan-Yu Lin Communications in Nonlinear Science and Numerical Simulation
562015A Provable Watermark-based Copyright Protection SchemePei-Yih Ting ; Shao-Da Huang; Tzong-Sun Wu; Han-Yu Lin 
572014Chaotic map-based three-party authenticated key agreementHan-Yu Lin Security and Communication Networks
582014Secure ID-Based Strong Designated Verifier Signature Scheme for E-CommerceHan-Yu Lin ; Chi-Kuang Yeh
592014Chaotic Map Based Three-Party Authenticated Key AgreementHan-Yu Lin 
602014基於雲端身份驗證的數位證據保全與代理人存取控管機制之研究林韓禹 
612014Universal Forgery Attack on a Strong Designated Verifier Signature SchemeHsu, C. L.; Han-Yu Lin International Arab Journal of Information Technology
622014Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeHan-Yu Lin Wireless Personal Communications
632014Provably secure proxy convertible authenticated encryption scheme based on RSAWu, T. S.; Han-Yu Lin Information Sciences
642014ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving ApplicationsHan-Yu Lin 
652014Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin International Arab Journal of Information Technology
662014A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash FunctionChung-Fu Lu; Chien-Lung Hsu; Han-Yu Lin ; Chien-Hui Su
672014Shoulder-surfing-proof graphical password authentication schemeWu, T. S.; Lee, M. L.; Han-Yu Lin ; Wang, C. Y.International Journal of Information Security
682014Convertible Authenticated Encryption Scheme with Hierarchical Access ControlHsu, C. L.; Han-Yu Lin Applied Mathematics & Information Sciences
692014Provably Secure Message Recovery Limited Verifier Signature Scheme with Low CostChien-Lung Hsu; Han-Yu Lin 
702014Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key SystemWu, T. S.; Chen, Y. S.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
712014Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its ExtensionHan-Yu Lin Information Technology and Control
722013Timestamp-Based Proxy Signature Scheme with RevocationHan-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Yih-Sen Chen
732013On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message LinkagesTzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting 
742013Novel Identity-Based Key-Insulated Strong Designated Verifier Signature SchemeHan-Yu Lin ; Chi-Kuang Yeh
752013An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication NetworkHsu, C. L.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
762013基於分散式雲端儲存平台下的主動式用戶端網頁掛碼入侵偵測機制之研究林韓禹 
772013DNA 序列浮水印技術之強化設計林琨祐; 陳建銘; 林韓禹 ; 白敦文
782013Non-Interactive Authenticated Key Agreement over the Mobile Communication NetworkWu, T. S.; Han-Yu Lin Mobile Networks & Applications
792013A Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman Problem and Its ExtensionTzong-Sun Wu; Han-Yu Lin 
802013A novel probabilistic signature based on bilinear square DiffieHellman problem and its extensionWu, T. S.; Han-Yu Lin Security and Communication Networks
812013On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsHan-Yu Lin Journal of Medical Systems
822013New Efficient Identity-Based Key-Insulated Multisignature SchemeHan-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Chi-Kuang Yeh
832013Secure Universal Designated Verifier Signature and its Variant for Privacy ProtectionWu, T. S.; Han-Yu Lin Information Technology and Control
842012Provably convertible multi-authenticated encryption scheme for generalized group communicationsLu, C. F.; Hsu, C. L.; Han-Yu Lin Information Sciences
852012An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic CommerceHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
862012Certificate-Based Secure Three-Party Signcryption Scheme With Low CostsHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
872012Pairing-based strong designated verifier proxy signature scheme with low costHsu, C. L.; Han-Yu Lin Security and Communication Networks
882012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai
892012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang; Tun-Wen Pai
902012Password-Based Authenticated Key Exchange Protocol with Smart Cards for Multi-Server EnvironmentsChien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin 
912012PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTSHsu, C. L.; Wu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
922012A publicly verifiable PCAE scheme for confidential applications with proxy delegationWu, T. S.; Pei-Yih Ting ; Han-Yu Lin Transactions on Emerging Telecommunications Technologies
932012Security Essentials for Biodiversity Genome Database in Cloud EnvironmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai
942012Authenticated Encryption Scheme Based on Paillier System with Verifiable Public KeysTzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang
952011New identity-based key-insulated convertible multi-authenticated encryption schemeHsu, C. L.; Han-Yu Lin Journal of Network and Computer Applications
962011Improved convertible authenticated encryption scheme with provable securityHan-Yu Lin ; Hsu, C. L.; Huang, S. K.Information Processing Letters
972011Audio watermarking scheme with dynamic adjustment in mute periodWu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S.Expert Systems with Applications
982011Fast Remote User Authentication Scheme with Smart Card Based on Quadratic ResidueTzong-Sun Wu; Han-Yu Lin ; Ming-Lun Lee; Won-Yi Chen
992011A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEMEHan-Yu Lin ; Hsu, C. L.International Journal of Foundations of Computer Science
1002011A DL Based Short Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Wu, T. S.; Yeh, Y. S.Journal of Information Science and Engineering
1012010Efficient proxy signcryption scheme with provable CCA and CMA securityHan-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S.Computers & Mathematics with Applications
1022010EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTIONTsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E.International Journal of Innovative Computing Information and Control
1032010EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIESWu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y.International Journal of Innovative Computing Information and Control
1042009Secure Convertible Authenticated Encryption Scheme Based on RSATzong-Sun Wu; Han-Yu Lin 
1052009基於雙線性配對之身份基底特定驗證者簽章方法吳宗杉; 高俊海; 林韓禹 ; 黃世豪
1062009Efficient self-certified proxy CAE scheme and its variantsWu, T. S.; Han-Yu Lin Journal of Systems and Software
1072009Structural Binary CBC Encryption ModeYeh, Y. S.; Huang, T. Y.; Han-Yu Lin Journal of Information Science and Engineering
1082009A Study on Parallel RSA FactorizationYi-Shiung Yeh; Ting-Yu Huang; Han-Yu Lin ; Yu-Hao Chang
1092009Self-certified multi-proxy signature schemes with message recoveryWu, T. S.; Hsu, C. L.; Han-Yu Lin Journal of Zhejiang University-Science A
1102009Pairings Based Designated Verifier Signature Scheme for Three-Party Communication EnvironmentHan-Yu Lin ; Tzong-Sun Wu
1112008Self-Certified Proxy Convertible Authenticated Encryption SchemeHan-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Yi-Shiung Yeh
1122008Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable RecipientHan-Yu Lin ; Tzong-Sun Wu
1132008A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECYWu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
1142008Analysis of Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor NetworksHan-Yu Lin ; Ting-Yu Huang; Tzong-Sun Wu; Tzong-Chen Wu
1152008Convertible multi-authenticated encryption schemeWu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C.Information Sciences
1162008ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key SystemsTzong-Sun Wu; Han-Yu Lin 
1172008A Novel (t, n) Threshold Convertible Authenticated Encryption SchemeHan-Yu Lin ; Yi-Shiung Yeh
1182008Dynamic Multi-Secret Sharing SchemeHan-Yu Lin ; Yi-Shiung Yeh
1192007ECC Based Self-Certified Convertible Authenticated Encryption Scheme with Computational SecrecyTzong-Sun Wu; Han-Yu Lin ; Chia-Chun Hu; Ming-Lun Lee
1202007Threshold Multi-Proxy Multi-Signature Scheme Based on Bilinear PairingsTzong-Sun Wu; Han-Yu Lin ; Ming-Je Shiu
1212007具代理簽章者隱私保護之代理盲簽章吳宗杉; 郭信男; 陳益森; 林韓禹 
1222007最佳化的WEP加密機制黃定宇; 林韓禹 ; 鄭家明; 葉義雄
1232007Group-Oriented Convertible Authenticated Encryption Scheme with (t, n) Shared VerificationHan-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Tzu-Chiang Lin
1242007Generalized Convertible Authenticated Encryption Schemes for Smart Card ApplicationsTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin 
1252006Improved Threshold Authenticated Encryption Scheme Based on the Factorization ProblemTzong-Sun Wu; Han-Yu Lin ; Won-Yi Chang
1262005Efficient Convertible Authenticated Encryption Schemes for Smart Card Applications in Network EnvironmentsChien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin 
1272004Robust Key Authentication Scheme Resistant to Public Key Substitution AttacksTzong-Sun Wu; Han-Yu Lin 
1282003Improvement of Miyazaki-Takaragi Threshold Digital Signature SchemeTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang
1292003Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access ControlTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Shu-Hui Kao
1302002Efficient Authenticated Key Agreement ProtocolTzong-Sun Wu; Shu-Hui Kao; Han-Yu Lin 
1312002XML知識庫之建置吳宗杉; 黃博聖; 林韓禹