| Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
1 | 2024/9/1 | AHMRE-SCST: Lightweight Anonymous Heterogeneous Multirecipient Encryption With Seamlessly Compatible System Transformation for IoT Devices | Tseng, Yuh-Min; Ho, Ting-Chieh; Tsai, Tung-Tso ; Huang, Sen-Shan | IEEE INTERNET OF THINGS JOURNAL | | |
2 | 2024/1/1 | Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings | Tseng, Yuh-Min; Tsai, Tung-Tso ; Huang, Sen-Shan; Ho, Ting-Chieh | IEEE ACCESS | | |
3 | 2024/1/1 | A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-Lun | IEEE ACCESS | | |
4 | 2023/1/1 | CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKS | Tsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-Ye | INFORMATION TECHNOLOGY AND CONTROL | | |
5 | 2022 | Revocable certificateless public key encryption with equality test | Tung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai | | | |
6 | 2022 | An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network | Tsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-Chieh | JOURNAL OF SENSORS | 1 | |
7 | 2022 | Leakage-resilient certificate-based authenticated key exchange protocol | Tung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung | | | |
8 | 2022 | An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments | Lin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-Chung | SENSORS | 2 | |
9 | 2022 | Certificate-based encryption with equality test | Yu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu | | | |
10 | 2022 | Secure access control using updateable attribute keys | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-Si | MATHEMATICAL BIOSCIENCES AND ENGINEERING | 0 | |
11 | 2022 | Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority | Tseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-Hao | INFORMATICA | 2 | |
12 | 2022 | Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model | Tsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-Hao | IEEE ACCESS | 0 | |
13 | 2022 | Revocable Certificateless Public Key Encryption with Equality Test | Tsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-Ching | INFORMATION TECHNOLOGY AND CONTROL | | |
14 | 2021 | An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared Verification | Han-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu | | | |
15 | 2021 | A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism | Tsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-Hao | IEEE ACCESS | 3 | |
16 | 2020 | Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server | Yuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai | | | |
17 | 2020 | Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage | Jui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai | | | |
18 | 2020 | Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Informatica | 6 | |
19 | 2019 | Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices | Tseng, Y. M.; Tsai, T. T. ; Wu, J. D.; Huang, S. S. | Informatica | 1 | |
20 | 2019 | Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks | Wu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. | Ieee Access | 7 | |
21 | 2018 | Identity-Based Encryption with Cloud Revocation Authority and Its Applications | Tseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P. | Ieee Transactions on Cloud Computing | 15 | |
22 | 2017 | Efficient Anonymous Multireceiver Certificateless Encryption | Hung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T. | Ieee Systems Journal | 23 | |
23 | 2017 | SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices | Tsai, T. T. ; Huang, S. S.; Tseng, Y. M. | Informatica | 5 | |
24 | 2016 | Cryptanalysis and improvement of provable a data possession scheme in public cloud storage | Tung-Tso Tsai ; Yuh-Min Tseng; Ying-Hao Hung; Sen-Shan Huang | | | |
25 | 2016 | List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures | Tseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H. | Ieee Transactions on Emerging Topics in Computing | 41 | |
26 | 2015 | Efficient revocable certificateless public key encryption with a delegated revocation authority | Tsai, T. T. ; Tseng, Y. M.; Huang, S. S. | Security and Communication Networks | 7 | |
27 | 2015 | Revocable Certificateless Public Key Encryption | Tsai, T. T ; Tseng, Y. M. | Ieee Systems Journal | 26 | |
28 | 2015 | Strongly unforgeable revocable certificateless signature | Yuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Ying-Hao Hung | | | |
29 | 2015 | Efficient ID-based encryption with outsourced revocation authority | Chung-Peng Huang; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
30 | 2015 | Leakage-Free ID-Based Signature | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Computer Journal | 8 | |
31 | 2015 | Enhancement on strongly secure group key agreement | Tseng, Y. M.; Tsai, T. T ; Huang, S. S. | Security and Communication Networks | 3 | |
32 | 2015 | A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices | Tseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L. | International Journal of Distributed Sensor Networks | 7 | |
33 | 2015 | Certificateless Signature with Strong Unforgeability in the Standard Model | Hung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T | Informatica | 15 | |
34 | 2014 | Efficient searchable ID-based encryption with a designated server | Wu, T. Y.; Tsai, T. T ; Tseng, Y. M. | Annals of Telecommunications | 36 | |
35 | 2014 | Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environments | Li-Chun Tseng ; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
36 | 2014 | Revocable ID-based mutual authentication and key agreement protocol for multi-server environments | Jia-Hua Ke; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
37 | 2014 | Secure certificateless signature in the standard model | Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
38 | 2014 | Efficient anonymous multi-receiver ID-based encryption with constant decryption cost | Yuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Hung-Yu Chien | | | |
39 | 2014 | RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Informatica | | |
40 | 2014 | Strongly Secure Revocable ID-based Signature without Random Oracles | Hung, Y. H.; Tsai, T. T ; Tseng, Y. M.; Huang, S. S. | Information Technology and Control | 12 | |
41 | 2014 | Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles | Tsai, T. T ; Tseng, Y. M.; Huang, S. S. | Informatica | 8 | |
42 | 2014 | A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants | Wu, T. Y.; Tsai, T. T ; Tseng, Y. M. | Scientific World Journal | 3 | |
43 | 2014 | Secure Certificateless Signature with Revocation in the Standard Model | Tung-Tso Tsai ; Huang, S. S.; Tseng, Y. M. | Mathematical Problems in Engineering | 10 | |
44 | 2013 | Provably secure revocable ID-based signature in the standard model | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Security and Communication Networks | 26 | |
45 | 2013 | Practical revocable ID-based signature with a public channel | Tung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu | | | |
46 | 2013 | Efficient Revocable Multi-Receiver ID-Based Encryption | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Information Technology and Control | 10 | |
47 | 2012 | A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants | Wu, T. Y.; Tseng, Y. M.; Tsai, T. T | Computer Networks | 32 | |
48 | 2012 | A revocable ID-based signcryption scheme | Tsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng | | | |
49 | 2012 | Revocable ID-based signature scheme with batch verifications | Tsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng | | | |
50 | 2012 | Novel revocable hierarchical ID-based encryption with a delegated revocation authority | Tung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu | | | |
51 | 2012 | Efficient Revocable ID-Based Encryption with a Public Channel | Tseng, Y. M.; Tsai, T. T | Computer Journal | 59 | |
52 | 2012 | A Fully Secure Revocable ID-Based Encryption in the Standard Model | Tsai, T. T ; Tseng, Y. M.; Wu, T. Y. | Informatica | 16 | |
53 | 2011 | A convinced commitment scheme for bilinear Diffie-Hellman problem | Yuh-Min Tseng; Tsu-Yang Wu; Tung-Tso Tsai | | | |