Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. Research Outputs

Browsing by Author YangMing Marine Transport Corp.


Jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 132  next >
Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
2012A publicly verifiable PCAE scheme for confidential applications with proxy delegationWu, T. S.; Pei-Yih Ting ; Han-Yu Lin Transactions on Emerging Telecommunications Technologies
2008Analysis of Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor NetworksHan-Yu Lin ; Ting-Yu Huang; Tzong-Sun Wu; Tzong-Chen Wu
2019An Attribute-Based Mutual Authentication Scheme with Time-Bounded KeysHan-Yu Lin ; Pei-Yih Ting ; Hong-Ru WuICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering
2011Audio watermarking scheme with dynamic adjustment in mute periodWu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S.Expert Systems with Applications
2012Authenticated Encryption Scheme Based on Paillier System with Verifiable Public KeysTzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang
2008Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable RecipientHan-Yu Lin ; Tzong-Sun Wu
2023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
2022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
2012Certificate-Based Secure Three-Party Signcryption Scheme With Low CostsHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
2014Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeHan-Yu Lin Wireless Personal Communications
2014Chaotic Map Based Three-Party Authenticated Key AgreementHan-Yu Lin 
2014Chaotic map-based three-party authenticated key agreementHan-Yu Lin Security and Communication Networks
2012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang; Tun-Wen Pai
2012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai
2014Convertible Authenticated Encryption Scheme with Hierarchical Access ControlHsu, C. L.; Han-Yu Lin Applied Mathematics & Information Sciences
2008Convertible multi-authenticated encryption schemeWu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C.Information Sciences
2018Cryptanalysis and Improvement of an Efficient Certificateless Designated Verifier Signature SchemeHan-Yu Lin ; Leo-Fan Yang; Chia-Hung Wu
2003Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access ControlTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Shu-Hui Kao
2015Data Protection for Computer Forensics Using Cryptographic MechanismsTzong-Sun Wu; Han-Yu Lin 
2016Design and Construction of Secure Digital Will SystemWu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu INT ARAB J INF TECHN0
Showing results 1 to 20 of 132  next >
Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback