Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
National Taiwan Ocean University,NTOU / College of Electrical Engineering and Computer Science

Tsai, TT

Network Lab View Statistics Email Alert RSS Feed

  • Information
  • Indicators
  • Publications 58
  • Project and Funding 2

Publications
  • All
  • Articles
  • Conference Papers

Author

  • 24 tseng, y. m.
  • 19 tung-tso tsai
  • 16 tsai, tung-tso
  • 15 huang, s. s.
  • 15 tsai, t. t
  • 15 yuh-min tseng
  • 10 sen-shan huang
  • 9 lin, han-yu
  • 8 tsai, t. t.
  • 7 wu, t. y.
  • . next >

Subject

  • 1 batch production systems
  • 1 certificate-based cryptography
  • 1 certificateless encryption
  • 1 cloud computing
  • 1 clouds
  • 1 compatible system transformation
  • 1 computational modeling
  • 1 constrained devices
  • 1 consumer iot
  • 1 data integrity
  • . < previous next >

Date issued

  • 23 2020 - 2026
  • 35 2010 - 2019

By type

  • 42 journal article
  • 42 journal article
  • 42 journal article
  • 12 conference paper
  • 12 conference paper
  • 12 conference paper
  • 4 journal article

Fulltext

  • 58 no fulltext


Results 1-58 of 58 (Search time: 0.002 seconds).

Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
12026/1/1IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-EncryptionLin, Han-Yu ; Tsai, Tung-Tso ; Wang, Yi-ChuanCMC-COMPUTERS MATERIALS & CONTINUA
22025/5/1Anomaly Detection Through Outsourced Revocable Identity-Based Signcryption With Equality Test for Sensitive Data in Consumer IoT EnvironmentsTsai, Tung-Tso ; Lin, Han-Yu ; Huang, Wei-Ning; Kumar, Sachin; Agarwal, Kadambri; Chen, Chien-MingIEEE TRANSACTIONS ON CONSUMER ELECTRONICS
32025/10/1Leakage-resilient certificateless public key encryption with equality test resistant to side-channel attacks"Tsai, Tung-Tso ; Yang, Jung-HaoCOMPUTER NETWORKS
42025/1/1Leakage-Resilient Public Key Signcryption with Equality Test and Its ApplicationTsai, Tung-Tso INFORMATICA
52025Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel AttacksTsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chinJOURNAL OF INFORMATION SCIENCE AND ENGINEERING
62024/9/1AHMRE-SCST: Lightweight Anonymous Heterogeneous Multirecipient Encryption With Seamlessly Compatible System Transformation for IoT DevicesTseng, Yuh-Min; Ho, Ting-Chieh; Tsai, Tung-Tso ; Huang, Sen-ShanIEEE INTERNET OF THINGS JOURNAL
72024/1/1Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System SettingsTseng, Yuh-Min; Tsai, Tung-Tso ; Huang, Sen-Shan; Ho, Ting-ChiehIEEE ACCESS
82024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
92023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
102022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
112022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
122022Leakage-resilient certificate-based authenticated key exchange protocolTung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung
132022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
142022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
152022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
162022Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityTseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-HaoINFORMATICA2
172022Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage ModelTsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-HaoIEEE ACCESS0
182022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
192021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
202021A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation MechanismTsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-HaoIEEE ACCESS3
212020Leakage-resilient outsourced revocable certificateless signature with a cloud revocation serverYuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai 
222020Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakageJui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai 
232020Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Informatica6
242019Efficient Certificate-Based Signature with Short Key and Signature Sizes from LatticesTseng, Y. M.; Tsai, T. T. ; Wu, J. D.; Huang, S. S.Informatica1
252019Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel AttacksWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Ieee Access7
262018Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsTseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P.Ieee Transactions on Cloud Computing15
272017Efficient Anonymous Multireceiver Certificateless EncryptionHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T. Ieee Systems Journal23
282017SIBSC: Separable Identity-Based Signcryption for Resource-Constrained DevicesTsai, T. T. ; Huang, S. S.; Tseng, Y. M.Informatica5
292016Cryptanalysis and improvement of provable a data possession scheme in public cloud storageTung-Tso Tsai ; Yuh-Min Tseng; Ying-Hao Hung; Sen-Shan Huang
302016List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver ArchitecturesTseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H.Ieee Transactions on Emerging Topics in Computing41
312015Efficient revocable certificateless public key encryption with a delegated revocation authorityTsai, T. T. ; Tseng, Y. M.; Huang, S. S.Security and Communication Networks7
322015Revocable Certificateless Public Key EncryptionTsai, T. T ; Tseng, Y. M.Ieee Systems Journal26
332015Strongly unforgeable revocable certificateless signatureYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Ying-Hao Hung
342015Efficient ID-based encryption with outsourced revocation authorityChung-Peng Huang; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
352015Leakage-Free ID-Based SignatureTseng, Y. M.; Tsai, T. T ; Huang, S. S.Computer Journal8
362015Enhancement on strongly secure group key agreementTseng, Y. M.; Tsai, T. T ; Huang, S. S.Security and Communication Networks3
372015A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile DevicesTseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L.International Journal of Distributed Sensor Networks7
382015Certificateless Signature with Strong Unforgeability in the Standard ModelHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T Informatica15
392014Efficient searchable ID-based encryption with a designated serverWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Annals of Telecommunications36
402014Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environmentsLi-Chun Tseng ; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
412014Revocable ID-based mutual authentication and key agreement protocol for multi-server environmentsJia-Hua Ke; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
422014Secure certificateless signature in the standard modelTung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
432014Efficient anonymous multi-receiver ID-based encryption with constant decryption costYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Hung-Yu Chien
442014RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBETsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica
452014Strongly Secure Revocable ID-based Signature without Random OraclesHung, Y. H.; Tsai, T. T ; Tseng, Y. M.; Huang, S. S.Information Technology and Control12
462014Efficient Strongly Unforgeable ID-Based Signature Without Random OraclesTsai, T. T ; Tseng, Y. M.; Huang, S. S.Informatica8
472014A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious ParticipantsWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Scientific World Journal3
482014Secure Certificateless Signature with Revocation in the Standard ModelTung-Tso Tsai ; Huang, S. S.; Tseng, Y. M.Mathematical Problems in Engineering10
492013Provably secure revocable ID-based signature in the standard modelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Security and Communication Networks26
502013Practical revocable ID-based signature with a public channelTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
512013Efficient Revocable Multi-Receiver ID-Based EncryptionTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Information Technology and Control10
522012A revocable ID-based authenticated group key exchange protocol with resistant to malicious participantsWu, T. Y.; Tseng, Y. M.; Tsai, T. T Computer Networks32
532012A revocable ID-based signcryption schemeTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
542012Revocable ID-based signature scheme with batch verificationsTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
552012Novel revocable hierarchical ID-based encryption with a delegated revocation authorityTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
562012Efficient Revocable ID-Based Encryption with a Public ChannelTseng, Y. M.; Tsai, T. T Computer Journal59
572012A Fully Secure Revocable ID-Based Encryption in the Standard ModelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica16
582011A convinced commitment scheme for bilinear Diffie-Hellman problemYuh-Min Tseng; Tsu-Yang Wu; Tung-Tso Tsai 

 

Claim Researcher Page

Check the encrypted string of this email, put the correct string in the box below and click "Go" to validate the email and claim this profile.

Emails: t t t s * * @ * * * * * * * * * * * * u . t w

Go


Contact via feedback form

If you want contact administrator site clicking the follow button 
Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback