研究成果

第 1 到 53 筆結果,共 53 筆。

公開日期標題作者來源出版物WOS全文
12024/9/1AHMRE-SCST: Lightweight Anonymous Heterogeneous Multirecipient Encryption With Seamlessly Compatible System Transformation for IoT DevicesTseng, Yuh-Min; Ho, Ting-Chieh; Tsai, Tung-Tso ; Huang, Sen-ShanIEEE INTERNET OF THINGS JOURNAL
22024/1/1Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System SettingsTseng, Yuh-Min; Tsai, Tung-Tso ; Huang, Sen-Shan; Ho, Ting-ChiehIEEE ACCESS
32024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
42023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
52022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
62022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
72022Leakage-resilient certificate-based authenticated key exchange protocolTung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung
82022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
92022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
102022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
112022Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityTseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-HaoINFORMATICA2
122022Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage ModelTsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-HaoIEEE ACCESS0
132022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
142021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
152021A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation MechanismTsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-HaoIEEE ACCESS3
162020Leakage-resilient outsourced revocable certificateless signature with a cloud revocation serverYuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai 
172020Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakageJui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai 
182020Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Informatica6
192019Efficient Certificate-Based Signature with Short Key and Signature Sizes from LatticesTseng, Y. M.; Tsai, T. T. ; Wu, J. D.; Huang, S. S.Informatica1
202019Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel AttacksWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Ieee Access7
212018Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsTseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P.Ieee Transactions on Cloud Computing15
222017Efficient Anonymous Multireceiver Certificateless EncryptionHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T. Ieee Systems Journal23
232017SIBSC: Separable Identity-Based Signcryption for Resource-Constrained DevicesTsai, T. T. ; Huang, S. S.; Tseng, Y. M.Informatica5
242016Cryptanalysis and improvement of provable a data possession scheme in public cloud storageTung-Tso Tsai ; Yuh-Min Tseng; Ying-Hao Hung; Sen-Shan Huang
252016List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver ArchitecturesTseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H.Ieee Transactions on Emerging Topics in Computing41
262015Efficient revocable certificateless public key encryption with a delegated revocation authorityTsai, T. T. ; Tseng, Y. M.; Huang, S. S.Security and Communication Networks7
272015Revocable Certificateless Public Key EncryptionTsai, T. T ; Tseng, Y. M.Ieee Systems Journal26
282015Strongly unforgeable revocable certificateless signatureYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Ying-Hao Hung
292015Efficient ID-based encryption with outsourced revocation authorityChung-Peng Huang; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
302015Leakage-Free ID-Based SignatureTseng, Y. M.; Tsai, T. T ; Huang, S. S.Computer Journal8
312015Enhancement on strongly secure group key agreementTseng, Y. M.; Tsai, T. T ; Huang, S. S.Security and Communication Networks3
322015A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile DevicesTseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L.International Journal of Distributed Sensor Networks7
332015Certificateless Signature with Strong Unforgeability in the Standard ModelHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T Informatica15
342014Efficient searchable ID-based encryption with a designated serverWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Annals of Telecommunications36
352014Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environmentsLi-Chun Tseng ; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
362014Revocable ID-based mutual authentication and key agreement protocol for multi-server environmentsJia-Hua Ke; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
372014Secure certificateless signature in the standard modelTung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
382014Efficient anonymous multi-receiver ID-based encryption with constant decryption costYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Hung-Yu Chien
392014RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBETsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica
402014Strongly Secure Revocable ID-based Signature without Random OraclesHung, Y. H.; Tsai, T. T ; Tseng, Y. M.; Huang, S. S.Information Technology and Control12
412014Efficient Strongly Unforgeable ID-Based Signature Without Random OraclesTsai, T. T ; Tseng, Y. M.; Huang, S. S.Informatica8
422014A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious ParticipantsWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Scientific World Journal3
432014Secure Certificateless Signature with Revocation in the Standard ModelTung-Tso Tsai ; Huang, S. S.; Tseng, Y. M.Mathematical Problems in Engineering10
442013Provably secure revocable ID-based signature in the standard modelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Security and Communication Networks26
452013Practical revocable ID-based signature with a public channelTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
462013Efficient Revocable Multi-Receiver ID-Based EncryptionTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Information Technology and Control10
472012A revocable ID-based authenticated group key exchange protocol with resistant to malicious participantsWu, T. Y.; Tseng, Y. M.; Tsai, T. T Computer Networks32
482012A revocable ID-based signcryption schemeTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
492012Revocable ID-based signature scheme with batch verificationsTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
502012Novel revocable hierarchical ID-based encryption with a delegated revocation authorityTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
512012Efficient Revocable ID-Based Encryption with a Public ChannelTseng, Y. M.; Tsai, T. T Computer Journal59
522012A Fully Secure Revocable ID-Based Encryption in the Standard ModelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica16
532011A convinced commitment scheme for bilinear Diffie-Hellman problemYuh-Min Tseng; Tsu-Yang Wu; Tung-Tso Tsai