Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • 首頁
  • 研究成果檢索
  • 研究人員
  • 單位
  • 計畫
  • 分類瀏覽
    • 研究成果檢索
    • 研究人員
    • 單位
    • 計畫
  • 機構典藏
  • SDGs
  • 登入
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
National Taiwan Ocean University,NTOU / College of Electrical Engineering and Computer Science

Lin, HY

Network Lab View Statistics Email Alert RSS Feed

  • Information
  • Indicators
  • Publications 132
  • Project and Funding 12

Publications
  • All
  • Articles
  • Conference Papers
  • Others

Author

  • 100 han-yu lin
  • 25 tzong-sun wu
  • 21 wu, t. s.
  • 18 林韓禹
  • 14 lin, han-yu
  • 12 hsu, c. l.
  • 8 pei-yih ting
  • 7 chien-lung hsu
  • 7 tsai, tung-tso
  • 6 吳宗杉
  • . next >

Subject

  • 5 bilinear pairing
  • 5 certificateless
  • 4 digital signature
  • 4 public key system
  • 3 authentication
  • 3 encryption
  • 3 equality test
  • 3 fog computing
  • 3 iot
  • 3 proxy re-encryption
  • . next >

Date issued

  • 17 2020 - 2025
  • 87 2010 - 2019
  • 28 2000 - 2009

By type

  • 9 conference paper
  • . < previous

Fulltext

  • 132 no fulltext


Results 1-132 of 132 (Search time: 0.001 seconds).

Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
12025Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel AttacksTsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chinJOURNAL OF INFORMATION SCIENCE AND ENGINEERING
22024/10/1Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT EnvironmentsLin, Han-Yu ; Chen, Pei-RuSENSORS
32024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
42023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
52022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
62022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
72022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
82022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
92022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
102022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
112021Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systemsLin, Han-Yu INT J DISTRIB SENS N0
122021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
132021A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud SystemLin, Han-Yu ; Jiang, Yan-RuAPPLIED SCIENCES-BASEL6
142021An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in CloudsLin, Han-Yu ; Hung, Yao-MinSENSORS5
152020具可更新存取策略與註銷機制的多授權中心雲端醫療照護系統之研究林韓禹 
162020基於生成對抗網路之身分特徵擷取與生物識別高璿智; 邱垂邦; 丁培毅 ; 林韓禹 
172020工業物聯網資安威脅檢測與防護吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 
182019A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH AssumptionsHan-Yu Lin Information Technology and Control
192019An Attribute-Based Mutual Authentication Scheme with Time-Bounded KeysHan-Yu Lin ; Pei-Yih Ting ; Hong-Ru WuICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering
202019具時效性和屬性選擇的物聯網認證機制及群體會議金鑰分配系統之研究林韓禹 
212019Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud EnvironmentsLin, Han-Yu IEEE SYSTEMS JOURNAL4
222019Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud EnvironmentsHan-Yu Lin Ieee Systems Journal
232019A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared SecretsHan-Yu Lin Symmetry-Basel
242019A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking ServicesHan-Yu Lin Applied Sciences-Basel
252019A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size SignaturesHan-Yu Lin ; Hong-Ru Wu; Pei-Yih Ting ; Po-Ting Lee2019 2nd International Conference on Communication Engineering and Technology (ICCET)
262019去識別化生成對抗網路邱垂邦; 洪穎寧; 丁培毅 ; 林韓禹 
272019工業物聯網資安威脅檢測與防護吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 
282018A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systemsLin, Han-Yu PLOS ONE1
292018On Delegatability of a Certificateless Strong Designated Verifier Signature SchemeHan-Yu Lin ; Chia-Hung Wu; Yan-Ru Jiang
302018An Efficient Universal Designated Verifier Signature Scheme for Non-Transferable Data Sharing in CloudsHan-Yu Lin ; Pei-Yih Ting ; Yan-Ru JiangICIBE' 18: Proceedings of the 4th International Conference on Industrial and Business Engineering
312018適用雲端醫療照護系統下基於使用者屬性的動態密文查詢與分享機制之研究林韓禹 
322018Dynamic ID authentication scheme using chaotic mapHan-Yu Lin Wireless Networks
332018A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA SecureHan-Yu Lin Ieee Access
342018Cryptanalysis and Improvement of an Efficient Certificateless Designated Verifier Signature SchemeHan-Yu Lin ; Leo-Fan Yang; Chia-Hung Wu
352017植基於免憑證公鑰系統之可淨化數位簽章方法林韓禹 ; 丁培毅 ; 吳宗杉; 王冠翔; 陳伊萍
362017基於物聯網服務下的安全醫療資訊存取機制與去識別化驗證技術之研究林韓禹 
372017On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear PairingsHan-Yu Lin ; Pei-Yih Ting ; Leo-Fan YangICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering
382017Efficient User Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart CardsHan-Yu Lin ; Chia-Hung Wu; Leo-Fan Yang
392017A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise AttacksHan-Yu Lin ; Leo-Fan Yang; Yao-Min Hung
402017Efficient mobile dynamic ID authentication and key agreement scheme without trusted serversHan-Yu Lin International Journal of Communication Systems
412017PCMAE: A Proxy Convertible Multi-AE Scheme and Its VariantHan-Yu Lin Information Technology and Control
422017Toward Secure CB-Signcryption for Wireless Ad Hoc NetworksHan-Yu Lin ; Wu, T. S.Ad Hoc & Sensor Wireless Networks
432016車載網路結合行動照護醫療資訊系統之可信賴資料交換與遠端存取控制之研究林韓禹 
442016Design and Construction of Secure Digital Will SystemWu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu INT ARAB J INF TECHN0
452016Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin ; Yao-Min Hung
462016A New Convertible Authenticated Encryption Scheme Based on Bilinear Square Diffie-Hellman ProblemHan-Yu Lin 
472016Secure Certificateless Two-Party Key Agreement with Short MessageHan-Yu Lin Information Technology and Control
482016Efficient dynamic authentication for mobile satellite communication systems without verification tableHan-Yu Lin International Journal of Satellite Communications and Networking
492015Secure Identity-Based Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Yao-Min Hung
502015Location-based data encryption for wireless sensor network using dynamic keysHan-Yu Lin Wireless Networks
512015雲端醫療照護系統的使用者隱私保護機制與資料安全加值模型之研究林韓禹 
522015RPCAE: a novel revocable proxy convertible authenticated encryption schemeHan-Yu Lin International Journal of Information Security
532015Secure Content Distribution Using Multi-hop Proxy Re-encryptionHan-Yu Lin Wireless Personal Communications
542015Efficient English Auction Scheme without a Secure ChannelWu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin International Arab Journal of Information Technology
552015Data Protection for Computer Forensics Using Cryptographic MechanismsTzong-Sun Wu; Han-Yu Lin 
562015Improved chaotic maps-based password-authenticated key agreement using smart cardsHan-Yu Lin Communications in Nonlinear Science and Numerical Simulation
572015A Provable Watermark-based Copyright Protection SchemePei-Yih Ting ; Shao-Da Huang; Tzong-Sun Wu; Han-Yu Lin 
582014Chaotic map-based three-party authenticated key agreementHan-Yu Lin Security and Communication Networks
592014Secure ID-Based Strong Designated Verifier Signature Scheme for E-CommerceHan-Yu Lin ; Chi-Kuang Yeh
602014Chaotic Map Based Three-Party Authenticated Key AgreementHan-Yu Lin 
612014基於雲端身份驗證的數位證據保全與代理人存取控管機制之研究林韓禹 
622014Universal Forgery Attack on a Strong Designated Verifier Signature SchemeHsu, C. L.; Han-Yu Lin International Arab Journal of Information Technology
632014Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeHan-Yu Lin Wireless Personal Communications
642014Provably secure proxy convertible authenticated encryption scheme based on RSAWu, T. S.; Han-Yu Lin Information Sciences
652014ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving ApplicationsHan-Yu Lin 
662014Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin International Arab Journal of Information Technology
672014A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash FunctionChung-Fu Lu; Chien-Lung Hsu; Han-Yu Lin ; Chien-Hui Su
682014Shoulder-surfing-proof graphical password authentication schemeWu, T. S.; Lee, M. L.; Han-Yu Lin ; Wang, C. Y.International Journal of Information Security
692014Convertible Authenticated Encryption Scheme with Hierarchical Access ControlHsu, C. L.; Han-Yu Lin Applied Mathematics & Information Sciences
702014Provably Secure Message Recovery Limited Verifier Signature Scheme with Low CostChien-Lung Hsu; Han-Yu Lin 
712014Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key SystemWu, T. S.; Chen, Y. S.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
722014Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its ExtensionHan-Yu Lin Information Technology and Control
732013Timestamp-Based Proxy Signature Scheme with RevocationHan-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Yih-Sen Chen
742013On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message LinkagesTzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting 
752013Novel Identity-Based Key-Insulated Strong Designated Verifier Signature SchemeHan-Yu Lin ; Chi-Kuang Yeh
762013An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication NetworkHsu, C. L.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
772013基於分散式雲端儲存平台下的主動式用戶端網頁掛碼入侵偵測機制之研究林韓禹 
782013DNA 序列浮水印技術之強化設計林琨祐; 陳建銘; 林韓禹 ; 白敦文
792013Non-Interactive Authenticated Key Agreement over the Mobile Communication NetworkWu, T. S.; Han-Yu Lin Mobile Networks & Applications
802013A Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman Problem and Its ExtensionTzong-Sun Wu; Han-Yu Lin 
812013A novel probabilistic signature based on bilinear square DiffieHellman problem and its extensionWu, T. S.; Han-Yu Lin Security and Communication Networks
822013On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsHan-Yu Lin Journal of Medical Systems
832013New Efficient Identity-Based Key-Insulated Multisignature SchemeHan-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Chi-Kuang Yeh
842013Secure Universal Designated Verifier Signature and its Variant for Privacy ProtectionWu, T. S.; Han-Yu Lin Information Technology and Control
852012Provably convertible multi-authenticated encryption scheme for generalized group communicationsLu, C. F.; Hsu, C. L.; Han-Yu Lin Information Sciences
862012An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic CommerceHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
872012Certificate-Based Secure Three-Party Signcryption Scheme With Low CostsHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
882012Pairing-based strong designated verifier proxy signature scheme with low costHsu, C. L.; Han-Yu Lin Security and Communication Networks
892012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai
902012Construction of a Taiwan biodiversity genetic database in cloud environmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang; Tun-Wen Pai
912012Password-Based Authenticated Key Exchange Protocol with Smart Cards for Multi-Server EnvironmentsChien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin 
922012PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTSHsu, C. L.; Wu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
932012A publicly verifiable PCAE scheme for confidential applications with proxy delegationWu, T. S.; Pei-Yih Ting ; Han-Yu Lin Transactions on Emerging Telecommunications Technologies
942012Security Essentials for Biodiversity Genome Database in Cloud EnvironmentsHan-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai
952012Authenticated Encryption Scheme Based on Paillier System with Verifiable Public KeysTzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang
962011New identity-based key-insulated convertible multi-authenticated encryption schemeHsu, C. L.; Han-Yu Lin Journal of Network and Computer Applications
972011Improved convertible authenticated encryption scheme with provable securityHan-Yu Lin ; Hsu, C. L.; Huang, S. K.Information Processing Letters
982011Audio watermarking scheme with dynamic adjustment in mute periodWu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S.Expert Systems with Applications
992011Fast Remote User Authentication Scheme with Smart Card Based on Quadratic ResidueTzong-Sun Wu; Han-Yu Lin ; Ming-Lun Lee; Won-Yi Chen
1002011A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEMEHan-Yu Lin ; Hsu, C. L.International Journal of Foundations of Computer Science
1012011A DL Based Short Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Wu, T. S.; Yeh, Y. S.Journal of Information Science and Engineering
1022010Efficient proxy signcryption scheme with provable CCA and CMA securityHan-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S.Computers & Mathematics with Applications
1032010EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTIONTsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E.International Journal of Innovative Computing Information and Control
1042010EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIESWu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y.International Journal of Innovative Computing Information and Control
1052009Secure Convertible Authenticated Encryption Scheme Based on RSATzong-Sun Wu; Han-Yu Lin 
1062009基於雙線性配對之身份基底特定驗證者簽章方法吳宗杉; 高俊海; 林韓禹 ; 黃世豪
1072009Efficient self-certified proxy CAE scheme and its variantsWu, T. S.; Han-Yu Lin Journal of Systems and Software
1082009Structural Binary CBC Encryption ModeYeh, Y. S.; Huang, T. Y.; Han-Yu Lin Journal of Information Science and Engineering
1092009A Study on Parallel RSA FactorizationYi-Shiung Yeh; Ting-Yu Huang; Han-Yu Lin ; Yu-Hao Chang
1102009Self-certified multi-proxy signature schemes with message recoveryWu, T. S.; Hsu, C. L.; Han-Yu Lin Journal of Zhejiang University-Science A
1112009Pairings Based Designated Verifier Signature Scheme for Three-Party Communication EnvironmentHan-Yu Lin ; Tzong-Sun Wu
1122008Self-Certified Proxy Convertible Authenticated Encryption SchemeHan-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Yi-Shiung Yeh
1132008Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable RecipientHan-Yu Lin ; Tzong-Sun Wu
1142008A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECYWu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
1152008Analysis of Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor NetworksHan-Yu Lin ; Ting-Yu Huang; Tzong-Sun Wu; Tzong-Chen Wu
1162008Convertible multi-authenticated encryption schemeWu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C.Information Sciences
1172008ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key SystemsTzong-Sun Wu; Han-Yu Lin 
1182008A Novel (t, n) Threshold Convertible Authenticated Encryption SchemeHan-Yu Lin ; Yi-Shiung Yeh
1192008Dynamic Multi-Secret Sharing SchemeHan-Yu Lin ; Yi-Shiung Yeh
1202007ECC Based Self-Certified Convertible Authenticated Encryption Scheme with Computational SecrecyTzong-Sun Wu; Han-Yu Lin ; Chia-Chun Hu; Ming-Lun Lee
1212007Threshold Multi-Proxy Multi-Signature Scheme Based on Bilinear PairingsTzong-Sun Wu; Han-Yu Lin ; Ming-Je Shiu
1222007具代理簽章者隱私保護之代理盲簽章吳宗杉; 郭信男; 陳益森; 林韓禹 
1232007最佳化的WEP加密機制黃定宇; 林韓禹 ; 鄭家明; 葉義雄
1242007Group-Oriented Convertible Authenticated Encryption Scheme with (t, n) Shared VerificationHan-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Tzu-Chiang Lin
1252007Generalized Convertible Authenticated Encryption Schemes for Smart Card ApplicationsTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin 
1262006Improved Threshold Authenticated Encryption Scheme Based on the Factorization ProblemTzong-Sun Wu; Han-Yu Lin ; Won-Yi Chang
1272005Efficient Convertible Authenticated Encryption Schemes for Smart Card Applications in Network EnvironmentsChien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin 
1282004Robust Key Authentication Scheme Resistant to Public Key Substitution AttacksTzong-Sun Wu; Han-Yu Lin 
1292003Improvement of Miyazaki-Takaragi Threshold Digital Signature SchemeTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang
1302003Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access ControlTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Shu-Hui Kao
1312002Efficient Authenticated Key Agreement ProtocolTzong-Sun Wu; Shu-Hui Kao; Han-Yu Lin 
1322002XML知識庫之建置吳宗杉; 黃博聖; 林韓禹 

 

申請連結研究人員資料

Check the encrypted string of this email, put the correct string in the box below and click "Go" to validate the email and claim this profile.

Emails: h a n y * @ * * * * * * * * * * * * u . t w

Go


Contact via feedback form

若您要聯絡網站管理員,請點選以下按鈕 
瀏覽
  • 機構典藏
  • 研究成果檢索
  • 研究人員
  • 單位
  • 計畫
DSpace-CRIS Software Copyright © 2002-  Duraspace   4science - Extension maintained and optimized by NTU Library Logo 4SCIENCE 回饋