Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. Research Outputs

Browsing by Author Wu, T. S.


Jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 25  next >
Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
2012A publicly verifiable PCAE scheme for confidential applications with proxy delegationWu, T. S.; Pei-Yih Ting ; Han-Yu Lin Transactions on Emerging Telecommunications Technologies
2011Audio watermarking scheme with dynamic adjustment in mute periodWu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S.Expert Systems with Applications
2012Certificate-Based Secure Three-Party Signcryption Scheme With Low CostsHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
2008Convertible multi-authenticated encryption schemeWu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C.Information Sciences
2011A DL Based Short Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Wu, T. S.; Yeh, Y. S.Journal of Information Science and Engineering
2010EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTIONTsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E.International Journal of Innovative Computing Information and Control
2015Efficient English Auction Scheme without a Secure ChannelWu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin International Arab Journal of Information Technology
2010Efficient proxy signcryption scheme with provable CCA and CMA securityHan-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S.Computers & Mathematics with Applications
2009Efficient self-certified proxy CAE scheme and its variantsWu, T. S.; Han-Yu Lin Journal of Systems and Software
2012An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic CommerceHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
2010EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIESWu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y.International Journal of Innovative Computing Information and Control
2011Generalized Anonymous Broadcast Encryption SchemePei-Yih Ting ; Chang, S. W.; Wu, T. S.Journal of Internet Technology
2008A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECYWu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
2020Like Cures Like: Pharmacological Activity of Anti-Inflammatory Lipopolysaccharides From Gut MicrobiomeLin, T. L.; Shu, C. C.; Young-Mao Chen ; Lu, J. J.; Wu, T. S.; Lai, W. F.; Tzeng, C. M.; Lai, H. C.; Lu, C. C.Frontiers in Pharmacology
2013Non-Interactive Authenticated Key Agreement over the Mobile Communication NetworkWu, T. S.; Han-Yu Lin Mobile Networks & Applications
2013A novel probabilistic signature based on bilinear square DiffieHellman problem and its extensionWu, T. S.; Han-Yu Lin Security and Communication Networks
2012PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTSHsu, C. L.; Wu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
2016Photograph watermarkingLee, M. L.; Pei-Yih Ting ; Wu, T. S.Multimedia Tools and Applications
2014Provably secure proxy convertible authenticated encryption scheme based on RSAWu, T. S.; Han-Yu Lin Information Sciences
2013Secure Universal Designated Verifier Signature and its Variant for Privacy ProtectionWu, T. S.; Han-Yu Lin Information Technology and Control
Showing results 1 to 20 of 25  next >
Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback