研究成果

第 1 到 135 筆結果,共 135 筆。

公開日期標題作者來源出版物scopusWOS全文
12026/1/1IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-EncryptionLin, Han-Yu ; Tsai, Tung-Tso ; Wang, Yi-ChuanCMC-COMPUTERS MATERIALS & CONTINUA
22025/5/1Anomaly Detection Through Outsourced Revocable Identity-Based Signcryption With Equality Test for Sensitive Data in Consumer IoT EnvironmentsTsai, Tung-Tso ; Lin, Han-Yu ; Huang, Wei-Ning; Kumar, Sachin; Agarwal, Kadambri; Chen, Chien-MingIEEE TRANSACTIONS ON CONSUMER ELECTRONICS
32025/11/26Certificateless Proxy Re-Encryption Scheme for the Internet of Medical ThingsLin, Han-Yu ; Yeh, Ching-Wei; Chen, Chi-ShiuELECTRONICS
42025Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel AttacksTsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chinJOURNAL OF INFORMATION SCIENCE AND ENGINEERING
52024/10/1Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT EnvironmentsLin, Han-Yu ; Chen, Pei-RuSENSORS
62024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
72023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
82022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
92022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
102022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
112022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
122022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
132022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
142021Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systemsLin, Han-Yu INT J DISTRIB SENS N0
152021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
162021A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud SystemLin, Han-Yu ; Jiang, Yan-RuAPPLIED SCIENCES-BASEL6
172021An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in CloudsLin, Han-Yu ; Hung, Yao-MinSENSORS5
182020具可更新存取策略與註銷機制的多授權中心雲端醫療照護系統之研究林韓禹 
192020基於生成對抗網路之身分特徵擷取與生物識別高璿智; 邱垂邦; 丁培毅 ; 林韓禹 
202020工業物聯網資安威脅檢測與防護吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 
212019A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH AssumptionsHan-Yu Lin Information Technology and Control
222019An Attribute-Based Mutual Authentication Scheme with Time-Bounded KeysHan-Yu Lin ; Pei-Yih Ting ; Hong-Ru WuICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering
232019具時效性和屬性選擇的物聯網認證機制及群體會議金鑰分配系統之研究林韓禹 
242019Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud EnvironmentsLin, Han-Yu IEEE SYSTEMS JOURNAL4
252019Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud EnvironmentsHan-Yu Lin Ieee Systems Journal
262019A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared SecretsHan-Yu Lin Symmetry-Basel
272019A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking ServicesHan-Yu Lin Applied Sciences-Basel
282019A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size SignaturesHan-Yu Lin ; Hong-Ru Wu; Pei-Yih Ting ; Po-Ting Lee2019 2nd International Conference on Communication Engineering and Technology (ICCET)
292019去識別化生成對抗網路邱垂邦; 洪穎寧; 丁培毅 ; 林韓禹 
302019工業物聯網資安威脅檢測與防護吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 
312018A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systemsLin, Han-Yu PLOS ONE1
322018On Delegatability of a Certificateless Strong Designated Verifier Signature SchemeHan-Yu Lin ; Chia-Hung Wu; Yan-Ru Jiang
332018An Efficient Universal Designated Verifier Signature Scheme for Non-Transferable Data Sharing in CloudsHan-Yu Lin ; Pei-Yih Ting ; Yan-Ru JiangICIBE' 18: Proceedings of the 4th International Conference on Industrial and Business Engineering
342018適用雲端醫療照護系統下基於使用者屬性的動態密文查詢與分享機制之研究林韓禹 
352018Dynamic ID authentication scheme using chaotic mapHan-Yu Lin Wireless Networks
362018A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA SecureHan-Yu Lin Ieee Access
372018Cryptanalysis and Improvement of an Efficient Certificateless Designated Verifier Signature SchemeHan-Yu Lin ; Leo-Fan Yang; Chia-Hung Wu
382017植基於免憑證公鑰系統之可淨化數位簽章方法林韓禹 ; 丁培毅 ; 吳宗杉; 王冠翔; 陳伊萍
392017基於物聯網服務下的安全醫療資訊存取機制與去識別化驗證技術之研究林韓禹 
402017On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear PairingsHan-Yu Lin ; Pei-Yih Ting ; Leo-Fan YangICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering
412017Efficient User Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart CardsHan-Yu Lin ; Chia-Hung Wu; Leo-Fan Yang
422017A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise AttacksHan-Yu Lin ; Leo-Fan Yang; Yao-Min Hung
432017Efficient mobile dynamic ID authentication and key agreement scheme without trusted serversHan-Yu Lin International Journal of Communication Systems
442017PCMAE: A Proxy Convertible Multi-AE Scheme and Its VariantHan-Yu Lin Information Technology and Control
452017Toward Secure CB-Signcryption for Wireless Ad Hoc NetworksHan-Yu Lin ; Wu, T. S.Ad Hoc & Sensor Wireless Networks
462016車載網路結合行動照護醫療資訊系統之可信賴資料交換與遠端存取控制之研究林韓禹 
472016Design and Construction of Secure Digital Will SystemWu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu INT ARAB J INF TECHN0
482016Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin ; Yao-Min Hung
492016A New Convertible Authenticated Encryption Scheme Based on Bilinear Square Diffie-Hellman ProblemHan-Yu Lin 
502016Secure Certificateless Two-Party Key Agreement with Short MessageHan-Yu Lin Information Technology and Control
512016Efficient dynamic authentication for mobile satellite communication systems without verification tableHan-Yu Lin International Journal of Satellite Communications and Networking
522015Secure Identity-Based Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Yao-Min Hung
532015Location-based data encryption for wireless sensor network using dynamic keysHan-Yu Lin Wireless Networks
542015雲端醫療照護系統的使用者隱私保護機制與資料安全加值模型之研究林韓禹 
552015RPCAE: a novel revocable proxy convertible authenticated encryption schemeHan-Yu Lin International Journal of Information Security
562015Secure Content Distribution Using Multi-hop Proxy Re-encryptionHan-Yu Lin Wireless Personal Communications
572015Efficient English Auction Scheme without a Secure ChannelWu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin International Arab Journal of Information Technology
582015Data Protection for Computer Forensics Using Cryptographic MechanismsTzong-Sun Wu; Han-Yu Lin 
592015Improved chaotic maps-based password-authenticated key agreement using smart cardsHan-Yu Lin Communications in Nonlinear Science and Numerical Simulation
602015A Provable Watermark-based Copyright Protection SchemePei-Yih Ting ; Shao-Da Huang; Tzong-Sun Wu; Han-Yu Lin 
612014Chaotic map-based three-party authenticated key agreementHan-Yu Lin Security and Communication Networks
622014Secure ID-Based Strong Designated Verifier Signature Scheme for E-CommerceHan-Yu Lin ; Chi-Kuang Yeh
632014Chaotic Map Based Three-Party Authenticated Key AgreementHan-Yu Lin 
642014基於雲端身份驗證的數位證據保全與代理人存取控管機制之研究林韓禹 
652014Universal Forgery Attack on a Strong Designated Verifier Signature SchemeHsu, C. L.; Han-Yu Lin International Arab Journal of Information Technology
662014Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeHan-Yu Lin Wireless Personal Communications
672014Provably secure proxy convertible authenticated encryption scheme based on RSAWu, T. S.; Han-Yu Lin Information Sciences
682014ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving ApplicationsHan-Yu Lin 
692014Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin International Arab Journal of Information Technology
702014A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash FunctionChung-Fu Lu; Chien-Lung Hsu; Han-Yu Lin ; Chien-Hui Su
712014Shoulder-surfing-proof graphical password authentication schemeWu, T. S.; Lee, M. L.; Han-Yu Lin ; Wang, C. Y.International Journal of Information Security
722014Convertible Authenticated Encryption Scheme with Hierarchical Access ControlHsu, C. L.; Han-Yu Lin Applied Mathematics & Information Sciences
732014Provably Secure Message Recovery Limited Verifier Signature Scheme with Low CostChien-Lung Hsu; Han-Yu Lin 
742014Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key SystemWu, T. S.; Chen, Y. S.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
752014Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its ExtensionHan-Yu Lin Information Technology and Control
762013Timestamp-Based Proxy Signature Scheme with RevocationHan-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Yih-Sen Chen
772013On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message LinkagesTzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting 
782013Novel Identity-Based Key-Insulated Strong Designated Verifier Signature SchemeHan-Yu Lin ; Chi-Kuang Yeh
792013An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication NetworkHsu, C. L.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
802013基於分散式雲端儲存平台下的主動式用戶端網頁掛碼入侵偵測機制之研究林韓禹 
812013DNA 序列浮水印技術之強化設計林琨祐; 陳建銘; 林韓禹 ; 白敦文
822013Non-Interactive Authenticated Key Agreement over the Mobile Communication NetworkWu, T. S.; Han-Yu Lin Mobile Networks & Applications
832013A Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman Problem and Its ExtensionTzong-Sun Wu; Han-Yu Lin 
842013A novel probabilistic signature based on bilinear square DiffieHellman problem and its extensionWu, T. S.; Han-Yu Lin Security and Communication Networks
852013On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsHan-Yu Lin Journal of Medical Systems
862013New Efficient Identity-Based Key-Insulated Multisignature SchemeHan-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Chi-Kuang Yeh
872013Secure Universal Designated Verifier Signature and its Variant for Privacy ProtectionWu, T. S.; Han-Yu Lin Information Technology and Control
882012Provably convertible multi-authenticated encryption scheme for generalized group communicationsLu, C. F.; Hsu, C. L.; Han-Yu Lin Information Sciences
892012An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic CommerceHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
902012Certificate-Based Secure Three-Party Signcryption Scheme With Low CostsHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
912012Pairing-based strong designated verifier proxy signature scheme with low costHsu, C. L.; Han-Yu Lin Security and Communication Networks
922012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai
932012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang; Tun-Wen Pai
942012Password-Based Authenticated Key Exchange Protocol with Smart Cards for Multi-Server EnvironmentsChien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin 
952012PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTSHsu, C. L.; Wu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
962012A publicly verifiable PCAE scheme for confidential applications with proxy delegationWu, T. S.; Pei-Yih Ting ; Han-Yu Lin Transactions on Emerging Telecommunications Technologies
972012Security Essentials for Biodiversity Genome Database in Cloud EnvironmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai
982012Authenticated Encryption Scheme Based on Paillier System with Verifiable Public KeysTzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang
992011New identity-based key-insulated convertible multi-authenticated encryption schemeHsu, C. L.; Han-Yu Lin Journal of Network and Computer Applications
1002011Improved convertible authenticated encryption scheme with provable securityHan-Yu Lin ; Hsu, C. L.; Huang, S. K.Information Processing Letters
1012011Audio watermarking scheme with dynamic adjustment in mute periodWu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S.Expert Systems with Applications
1022011Fast Remote User Authentication Scheme with Smart Card Based on Quadratic ResidueTzong-Sun Wu; Han-Yu Lin ; Ming-Lun Lee; Won-Yi Chen
1032011A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEMEHan-Yu Lin ; Hsu, C. L.International Journal of Foundations of Computer Science
1042011A DL Based Short Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Wu, T. S.; Yeh, Y. S.Journal of Information Science and Engineering
1052010Efficient proxy signcryption scheme with provable CCA and CMA securityHan-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S.Computers & Mathematics with Applications
1062010EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTIONTsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E.International Journal of Innovative Computing Information and Control
1072010EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIESWu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y.International Journal of Innovative Computing Information and Control
1082009Secure Convertible Authenticated Encryption Scheme Based on RSATzong-Sun Wu; Han-Yu Lin 
1092009基於雙線性配對之身份基底特定驗證者簽章方法吳宗杉; 高俊海; 林韓禹 ; 黃世豪
1102009Efficient self-certified proxy CAE scheme and its variantsWu, T. S.; Han-Yu Lin Journal of Systems and Software
1112009Structural Binary CBC Encryption ModeYeh, Y. S.; Huang, T. Y.; Han-Yu Lin Journal of Information Science and Engineering
1122009A Study on Parallel RSA FactorizationYi-Shiung Yeh; Ting-Yu Huang; Han-Yu Lin ; Yu-Hao Chang
1132009Self-certified multi-proxy signature schemes with message recoveryWu, T. S.; Hsu, C. L.; Han-Yu Lin Journal of Zhejiang University-Science A
1142009Pairings Based Designated Verifier Signature Scheme for Three-Party Communication EnvironmentHan-Yu Lin ; Tzong-Sun Wu
1152008Self-Certified Proxy Convertible Authenticated Encryption SchemeHan-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Yi-Shiung Yeh
1162008Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable RecipientHan-Yu Lin ; Tzong-Sun Wu
1172008A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECYWu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
1182008Analysis of Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor NetworksHan-Yu Lin ; Ting-Yu Huang; Tzong-Sun Wu; Tzong-Chen Wu
1192008Convertible multi-authenticated encryption schemeWu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C.Information Sciences
1202008ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key SystemsTzong-Sun Wu; Han-Yu Lin 
1212008A Novel (t, n) Threshold Convertible Authenticated Encryption SchemeHan-Yu Lin ; Yi-Shiung Yeh
1222008Dynamic Multi-Secret Sharing SchemeHan-Yu Lin ; Yi-Shiung Yeh
1232007ECC Based Self-Certified Convertible Authenticated Encryption Scheme with Computational SecrecyTzong-Sun Wu; Han-Yu Lin ; Chia-Chun Hu; Ming-Lun Lee
1242007Threshold Multi-Proxy Multi-Signature Scheme Based on Bilinear PairingsTzong-Sun Wu; Han-Yu Lin ; Ming-Je Shiu
1252007具代理簽章者隱私保護之代理盲簽章吳宗杉; 郭信男; 陳益森; 林韓禹 
1262007最佳化的WEP加密機制黃定宇; 林韓禹 ; 鄭家明; 葉義雄
1272007Group-Oriented Convertible Authenticated Encryption Scheme with (t, n) Shared VerificationHan-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Tzu-Chiang Lin
1282007Generalized Convertible Authenticated Encryption Schemes for Smart Card ApplicationsTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin 
1292006Improved Threshold Authenticated Encryption Scheme Based on the Factorization ProblemTzong-Sun Wu; Han-Yu Lin ; Won-Yi Chang
1302005Efficient Convertible Authenticated Encryption Schemes for Smart Card Applications in Network EnvironmentsChien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin 
1312004Robust Key Authentication Scheme Resistant to Public Key Substitution AttacksTzong-Sun Wu; Han-Yu Lin 
1322003Improvement of Miyazaki-Takaragi Threshold Digital Signature SchemeTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang
1332003Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access ControlTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Shu-Hui Kao
1342002Efficient Authenticated Key Agreement ProtocolTzong-Sun Wu; Shu-Hui Kao; Han-Yu Lin 
1352002XML知識庫之建置吳宗杉; 黃博聖; 林韓禹