Issue Date | Title | Author(s) | Source | WOS | Fulltext/Archive link |
2021 | Safe Sexual Behavior Intentions among College Students: The Construction of an Extended Theory of Planned Behavior | Lin, Chien-Liang; Ye, Yuan; Lin, Peng; Lai, Xiao-Ling; Jin, Yuan-Qing; Wang, Xin; Su, Yu-Sheng | INT J ENV RES PUB HE | 10 | |
2018 | Scenario-Based Microservice Retrieval Using Word2Vec | Shang-Pin Ma ; Yen Chuang; Ci-Wei Lan; Hsi-Min Chen; Chun-Ying Huang; Chia-Yu Li | 2018 IEEE 15th International Conference on e-Business Engineering (ICEBE) | | |
2006 | Scene-adaptive video partitioning by semantic object tracking | Shyi-Chyi Cheng ; Wu, T. L. | Journal of Visual Communication and Image Representation | | |
2004 | Schema Mapping for XML and Relational Data Sharing | Ya-Hui Chang ; Feng-Chieh Chiu; Wang-Chien Lee | | | |
2019 | SEAL2: An SDN-enabled all-Layer2 packet forwarding network architecture for multitenant datacenter networks | Yeh, Chun-Chao ; Qiu, Jun-Wei; Chang, Shi-Jia | INT J COMMUN SYST | 1 | |
2022 | Secure access control using updateable attribute keys | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-Si | MATHEMATICAL BIOSCIENCES AND ENGINEERING | 0 | |
2014 | Secure certificateless signature in the standard model | Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang | | | |
2014 | Secure Certificateless Signature with Revocation in the Standard Model | Tung-Tso Tsai ; Huang, S. S.; Tseng, Y. M. | Mathematical Problems in Engineering | 10 | |
2016 | Secure Certificateless Two-Party Key Agreement with Short Message | Han-Yu Lin | Information Technology and Control | | |
2015 | Secure Content Distribution Using Multi-hop Proxy Re-encryption | Han-Yu Lin | Wireless Personal Communications | | |
2009 | Secure Convertible Authenticated Encryption Scheme Based on RSA | Tzong-Sun Wu; Han-Yu Lin | | | |
2018 | A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems | Lin, Han-Yu | PLOS ONE | 1 | |
2014 | Secure ID-Based Strong Designated Verifier Signature Scheme for E-Commerce | Han-Yu Lin ; Chi-Kuang Yeh | | | |
2015 | Secure Identity-Based Strong Designated Verifier Signature Scheme with Low Computation | Han-Yu Lin ; Yao-Min Hung | | | |
2007 | A Secure Instant-Runoff Voting Scheme Based on Homomorphic Encryption | Pei-Yih Ting ; Xiao-Wei Huang; Mei-chen Hsia | | | |
2010 | A secure threshold Paillier proxy signature scheme | Pei-Yih Ting ; Huang, X. W.; Wu, J. H.; Hseu, C. H. | Journal of Zhejiang University-Science C-Computers & Electronics | | |
2013 | Secure Universal Designated Verifier Signature and its Variant for Privacy Protection | Wu, T. S.; Han-Yu Lin | Information Technology and Control | | |
2006 | A Secure Voting Preference Oriented Approval Voting Scheme | Pei-Yih Ting ; Chih-hsien Lin; Kuan-ting Liu | | | |
2012 | Security Essentials for Biodiversity Genome Database in Cloud Environments | Han-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai | | | |
2016 | Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based System | Han-Yu Lin ; Yao-Min Hung | | | |