Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
National Taiwan Ocean University,NTOU / College of Electrical Engineering and Computer Science

Lin, HY

Network Lab View Statistics Email Alert RSS Feed

  • Information
  • Indicators
  • Publications 82
  • Project and Funding 12

Publications
  • All
  • Articles
  • Conference Papers
  • Others

Author

  • 65 han-yu lin
  • 21 wu, t. s.
  • 17 lin, han-yu
  • 12 hsu, c. l.
  • 9 tsai, tung-tso
  • 9 tzong-sun wu
  • 4 huang, s. k.
  • 3 pei-yih ting
  • 3 yeh, y. s.
  • 3 yi-shiung yeh
  • . next >

Subject

  • 1 batch
  • 1 batch production systems
  • 1 bilinear pairings
  • 1 bilinear square diffie-hellman problem
  • 1 certificate-based cryptography
  • 1 chaotic map
  • 1 ciphertext policy
  • 1 clouds
  • 1 computational modeling
  • 1 consumer iot
  • . < previous next >

Date issued

  • 16 2020 - 2026
  • 52 2010 - 2019
  • 14 2000 - 2009

By type

  • 58 journal article
  • 24 journal article
  • 24 journal article
  • 24 journal article

Fulltext

  • 82 no fulltext


Results 1-82 of 82 (Search time: 0.004 seconds).

Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
12012A publicly verifiable PCAE scheme for confidential applications with proxy delegationWu, T. S.; Pei-Yih Ting ; Han-Yu Lin Transactions on Emerging Telecommunications Technologies
22025/5/1Anomaly Detection Through Outsourced Revocable Identity-Based Signcryption With Equality Test for Sensitive Data in Consumer IoT EnvironmentsTsai, Tung-Tso ; Lin, Han-Yu ; Huang, Wei-Ning; Kumar, Sachin; Agarwal, Kadambri; Chen, Chien-MingIEEE TRANSACTIONS ON CONSUMER ELECTRONICS
32011Audio watermarking scheme with dynamic adjustment in mute periodWu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S.Expert Systems with Applications
42012Authenticated Encryption Scheme Based on Paillier System with Verifiable Public KeysTzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang
52023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
62012Certificate-Based Secure Three-Party Signcryption Scheme With Low CostsHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
72025/11/26Certificateless Proxy Re-Encryption Scheme for the Internet of Medical ThingsLin, Han-Yu ; Yeh, Ching-Wei; Chen, Chi-ShiuELECTRONICS
82014Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeHan-Yu Lin Wireless Personal Communications
92014Chaotic map-based three-party authenticated key agreementHan-Yu Lin Security and Communication Networks
102014Convertible Authenticated Encryption Scheme with Hierarchical Access ControlHsu, C. L.; Han-Yu Lin Applied Mathematics & Information Sciences
112008Convertible multi-authenticated encryption schemeWu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C.Information Sciences
122016Design and Construction of Secure Digital Will SystemWu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu INT ARAB J INF TECHN0
132011A DL Based Short Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Wu, T. S.; Yeh, Y. S.Journal of Information Science and Engineering
142018Dynamic ID authentication scheme using chaotic mapHan-Yu Lin Wireless Networks
152008Dynamic Multi-Secret Sharing SchemeHan-Yu Lin ; Yi-Shiung Yeh
162008ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key SystemsTzong-Sun Wu; Han-Yu Lin 
172002Efficient Authenticated Key Agreement ProtocolTzong-Sun Wu; Shu-Hui Kao; Han-Yu Lin 
182010EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTIONTsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E.International Journal of Innovative Computing Information and Control
192016Efficient dynamic authentication for mobile satellite communication systems without verification tableHan-Yu Lin International Journal of Satellite Communications and Networking
202015Efficient English Auction Scheme without a Secure ChannelWu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin International Arab Journal of Information Technology
212017Efficient mobile dynamic ID authentication and key agreement scheme without trusted serversHan-Yu Lin International Journal of Communication Systems
222010Efficient proxy signcryption scheme with provable CCA and CMA securityHan-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S.Computers & Mathematics with Applications
232022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
242009Efficient self-certified proxy CAE scheme and its variantsWu, T. S.; Han-Yu Lin Journal of Systems and Software
252021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
262012An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic CommerceHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
272010EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIESWu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y.International Journal of Innovative Computing Information and Control
282011Fast Remote User Authentication Scheme with Smart Card Based on Quadratic ResidueTzong-Sun Wu; Han-Yu Lin ; Ming-Lun Lee; Won-Yi Chen
292014Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its ExtensionHan-Yu Lin Information Technology and Control
302008A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECYWu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
312013An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication NetworkHsu, C. L.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
322015Improved chaotic maps-based password-authenticated key agreement using smart cardsHan-Yu Lin Communications in Nonlinear Science and Numerical Simulation
332011Improved convertible authenticated encryption scheme with provable securityHan-Yu Lin ; Hsu, C. L.; Huang, S. K.Information Processing Letters
342022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
352021An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in CloudsLin, Han-Yu ; Hung, Yao-MinSENSORS5
362003Improvement of Miyazaki-Takaragi Threshold Digital Signature SchemeTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang
372026/1/1IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-EncryptionLin, Han-Yu ; Tsai, Tung-Tso ; Wang, Yi-ChuanCMC-COMPUTERS MATERIALS & CONTINUA
382025Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel AttacksTsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chinJOURNAL OF INFORMATION SCIENCE AND ENGINEERING
392015Location-based data encryption for wireless sensor network using dynamic keysHan-Yu Lin Wireless Networks
402021A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud SystemLin, Han-Yu ; Jiang, Yan-RuAPPLIED SCIENCES-BASEL6
412018A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA SecureHan-Yu Lin Ieee Access
422011New identity-based key-insulated convertible multi-authenticated encryption schemeHsu, C. L.; Han-Yu Lin Journal of Network and Computer Applications
432013Non-Interactive Authenticated Key Agreement over the Mobile Communication NetworkWu, T. S.; Han-Yu Lin Mobile Networks & Applications
442008A Novel (t, n) Threshold Convertible Authenticated Encryption SchemeHan-Yu Lin ; Yi-Shiung Yeh
452019A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH AssumptionsHan-Yu Lin Information Technology and Control
462019A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking ServicesHan-Yu Lin Applied Sciences-Basel
472011A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEMEHan-Yu Lin ; Hsu, C. L.International Journal of Foundations of Computer Science
482013A novel probabilistic signature based on bilinear square DiffieHellman problem and its extensionWu, T. S.; Han-Yu Lin Security and Communication Networks
492013On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message LinkagesTzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting 
502013On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsHan-Yu Lin Journal of Medical Systems
512012Pairing-based strong designated verifier proxy signature scheme with low costHsu, C. L.; Han-Yu Lin Security and Communication Networks
522019A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared SecretsHan-Yu Lin Symmetry-Basel
532012PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTSHsu, C. L.; Wu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
542017PCMAE: A Proxy Convertible Multi-AE Scheme and Its VariantHan-Yu Lin Information Technology and Control
552012Provably convertible multi-authenticated encryption scheme for generalized group communicationsLu, C. F.; Hsu, C. L.; Han-Yu Lin Information Sciences
562014Provably Secure Message Recovery Limited Verifier Signature Scheme with Low CostChien-Lung Hsu; Han-Yu Lin 
572014Provably secure proxy convertible authenticated encryption scheme based on RSAWu, T. S.; Han-Yu Lin Information Sciences
582024/10/1Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT EnvironmentsLin, Han-Yu ; Chen, Pei-RuSENSORS
592022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
602022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
612024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
622004Robust Key Authentication Scheme Resistant to Public Key Substitution AttacksTzong-Sun Wu; Han-Yu Lin 
632015RPCAE: a novel revocable proxy convertible authenticated encryption schemeHan-Yu Lin International Journal of Information Security
642022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
652016Secure Certificateless Two-Party Key Agreement with Short MessageHan-Yu Lin Information Technology and Control
662015Secure Content Distribution Using Multi-hop Proxy Re-encryptionHan-Yu Lin Wireless Personal Communications
672009Secure Convertible Authenticated Encryption Scheme Based on RSATzong-Sun Wu; Han-Yu Lin 
682018A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systemsLin, Han-Yu PLOS ONE1
692013Secure Universal Designated Verifier Signature and its Variant for Privacy ProtectionWu, T. S.; Han-Yu Lin Information Technology and Control
702016Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin ; Yao-Min Hung
712009Self-certified multi-proxy signature schemes with message recoveryWu, T. S.; Hsu, C. L.; Han-Yu Lin Journal of Zhejiang University-Science A
722014Shoulder-surfing-proof graphical password authentication schemeWu, T. S.; Lee, M. L.; Han-Yu Lin ; Wang, C. Y.International Journal of Information Security
732009Structural Binary CBC Encryption ModeYeh, Y. S.; Huang, T. Y.; Han-Yu Lin Journal of Information Science and Engineering
742009A Study on Parallel RSA FactorizationYi-Shiung Yeh; Ting-Yu Huang; Han-Yu Lin ; Yu-Hao Chang
752007Threshold Multi-Proxy Multi-Signature Scheme Based on Bilinear PairingsTzong-Sun Wu; Han-Yu Lin ; Ming-Je Shiu
762021Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systemsLin, Han-Yu INT J DISTRIB SENS N0
772014Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key SystemWu, T. S.; Chen, Y. S.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
782017Toward Secure CB-Signcryption for Wireless Ad Hoc NetworksHan-Yu Lin ; Wu, T. S.Ad Hoc & Sensor Wireless Networks
792014Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin International Arab Journal of Information Technology
802019Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud EnvironmentsHan-Yu Lin Ieee Systems Journal
812019Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud EnvironmentsLin, Han-Yu IEEE SYSTEMS JOURNAL4
822014Universal Forgery Attack on a Strong Designated Verifier Signature SchemeHsu, C. L.; Han-Yu Lin International Arab Journal of Information Technology

 

Claim Researcher Page

Check the encrypted string of this email, put the correct string in the box below and click "Go" to validate the email and claim this profile.

Emails: h a n y * @ * * * * * * * * * * * * u . t w

Go


Contact via feedback form

If you want contact administrator site clicking the follow button 
Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback