| Issue Date | Title | Author(s) | Source | scopus | WOS | Fulltext/Archive link |
| 1 | 2025 | Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel Attacks | Tsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chin | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | | | |
| 2 | 2024/10/1 | Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments | Lin, Han-Yu ; Chen, Pei-Ru | SENSORS | | | |
| 3 | 2024/1/1 | A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-Lun | IEEE ACCESS | | | |
| 4 | 2023/1/1 | CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKS | Tsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-Ye | INFORMATION TECHNOLOGY AND CONTROL | | | |
| 5 | 2022 | Revocable certificateless public key encryption with equality test | Tung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai | | | | |
| 6 | 2022 | An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network | Tsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-Chieh | JOURNAL OF SENSORS | | 1 | |
| 7 | 2022 | An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments | Lin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-Chung | SENSORS | | 2 | |
| 8 | 2022 | Certificate-based encryption with equality test | Yu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu | | | | |
| 9 | 2022 | Secure access control using updateable attribute keys | Lin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-Si | MATHEMATICAL BIOSCIENCES AND ENGINEERING | | 0 | |
| 10 | 2022 | Revocable Certificateless Public Key Encryption with Equality Test | Tsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-Ching | INFORMATION TECHNOLOGY AND CONTROL | | | |
| 11 | 2021 | Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systems | Lin, Han-Yu | INT J DISTRIB SENS N | | 0 | |
| 12 | 2021 | An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared Verification | Han-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu | | | | |
| 13 | 2021 | A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud System | Lin, Han-Yu ; Jiang, Yan-Ru | APPLIED SCIENCES-BASEL | | 6 | |
| 14 | 2021 | An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds | Lin, Han-Yu ; Hung, Yao-Min | SENSORS | | 5 | |
| 15 | 2020 | 具可更新存取策略與註銷機制的多授權中心雲端醫療照護系統之研究 | 林韓禹 | | | | |
| 16 | 2020 | 基於生成對抗網路之身分特徵擷取與生物識別 | 高璿智; 邱垂邦; 丁培毅 ; 林韓禹 | | | | |
| 17 | 2020 | 工業物聯網資安威脅檢測與防護 | 吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 | | | | |
| 18 | 2019 | A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions | Han-Yu Lin | Information Technology and Control | | | |
| 19 | 2019 | An Attribute-Based Mutual Authentication Scheme with Time-Bounded Keys | Han-Yu Lin ; Pei-Yih Ting ; Hong-Ru Wu | ICTCE '19: Proceedings of the 3rd International Conference on Telecommunications and Communication Engineering | | | |
| 20 | 2019 | 具時效性和屬性選擇的物聯網認證機制及群體會議金鑰分配系統之研究 | 林韓禹 | | | | |
| 21 | 2019 | Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud Environments | Lin, Han-Yu | IEEE SYSTEMS JOURNAL | | 4 | |
| 22 | 2019 | Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments | Han-Yu Lin | Ieee Systems Journal | | | |
| 23 | 2019 | A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets | Han-Yu Lin | Symmetry-Basel | | | |
| 24 | 2019 | A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking Services | Han-Yu Lin | Applied Sciences-Basel | | | |
| 25 | 2019 | A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures | Han-Yu Lin ; Hong-Ru Wu; Pei-Yih Ting ; Po-Ting Lee | 2019 2nd International Conference on Communication Engineering and Technology (ICCET) | | | |
| 26 | 2019 | 去識別化生成對抗網路 | 邱垂邦; 洪穎寧; 丁培毅 ; 林韓禹 | | | | |
| 27 | 2019 | 工業物聯網資安威脅檢測與防護 | 吳宗杉; 丁培毅 ; 辛華昀 ; 林韓禹 | | | | |
| 28 | 2018 | A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems | Lin, Han-Yu | PLOS ONE | | 1 | |
| 29 | 2018 | On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme | Han-Yu Lin ; Chia-Hung Wu; Yan-Ru Jiang | | | | |
| 30 | 2018 | An Efficient Universal Designated Verifier Signature Scheme for Non-Transferable Data Sharing in Clouds | Han-Yu Lin ; Pei-Yih Ting ; Yan-Ru Jiang | ICIBE' 18: Proceedings of the 4th International Conference on Industrial and Business Engineering | | | |
| 31 | 2018 | 適用雲端醫療照護系統下基於使用者屬性的動態密文查詢與分享機制之研究 | 林韓禹 | | | | |
| 32 | 2018 | Dynamic ID authentication scheme using chaotic map | Han-Yu Lin | Wireless Networks | | | |
| 33 | 2018 | A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure | Han-Yu Lin | Ieee Access | | | |
| 34 | 2018 | Cryptanalysis and Improvement of an Efficient Certificateless Designated Verifier Signature Scheme | Han-Yu Lin ; Leo-Fan Yang; Chia-Hung Wu | | | | |
| 35 | 2017 | 植基於免憑證公鑰系統之可淨化數位簽章方法 | 林韓禹 ; 丁培毅 ; 吳宗杉; 王冠翔; 陳伊萍 | | | | |
| 36 | 2017 | 基於物聯網服務下的安全醫療資訊存取機制與去識別化驗證技術之研究 | 林韓禹 | | | | |
| 37 | 2017 | On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings | Han-Yu Lin ; Pei-Yih Ting ; Leo-Fan Yang | ICTCE '17: Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering | | | |
| 38 | 2017 | Efficient User Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards | Han-Yu Lin ; Chia-Hung Wu; Leo-Fan Yang | | | | |
| 39 | 2017 | A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks | Han-Yu Lin ; Leo-Fan Yang; Yao-Min Hung | | | | |
| 40 | 2017 | Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers | Han-Yu Lin | International Journal of Communication Systems | | | |
| 41 | 2017 | PCMAE: A Proxy Convertible Multi-AE Scheme and Its Variant | Han-Yu Lin | Information Technology and Control | | | |
| 42 | 2017 | Toward Secure CB-Signcryption for Wireless Ad Hoc Networks | Han-Yu Lin ; Wu, T. S. | Ad Hoc & Sensor Wireless Networks | | | |
| 43 | 2016 | 車載網路結合行動照護醫療資訊系統之可信賴資料交換與遠端存取控制之研究 | 林韓禹 | | | | |
| 44 | 2016 | Design and Construction of Secure Digital Will System | Wu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu | INT ARAB J INF TECHN | | 0 | |
| 45 | 2016 | Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based System | Han-Yu Lin ; Yao-Min Hung | | | | |
| 46 | 2016 | A New Convertible Authenticated Encryption Scheme Based on Bilinear Square Diffie-Hellman Problem | Han-Yu Lin | | | | |
| 47 | 2016 | Secure Certificateless Two-Party Key Agreement with Short Message | Han-Yu Lin | Information Technology and Control | | | |
| 48 | 2016 | Efficient dynamic authentication for mobile satellite communication systems without verification table | Han-Yu Lin | International Journal of Satellite Communications and Networking | | | |
| 49 | 2015 | Secure Identity-Based Strong Designated Verifier Signature Scheme with Low Computation | Han-Yu Lin ; Yao-Min Hung | | | | |
| 50 | 2015 | Location-based data encryption for wireless sensor network using dynamic keys | Han-Yu Lin | Wireless Networks | | | |
| 51 | 2015 | 雲端醫療照護系統的使用者隱私保護機制與資料安全加值模型之研究 | 林韓禹 | | | | |
| 52 | 2015 | RPCAE: a novel revocable proxy convertible authenticated encryption scheme | Han-Yu Lin | International Journal of Information Security | | | |
| 53 | 2015 | Secure Content Distribution Using Multi-hop Proxy Re-encryption | Han-Yu Lin | Wireless Personal Communications | | | |
| 54 | 2015 | Efficient English Auction Scheme without a Secure Channel | Wu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin | International Arab Journal of Information Technology | | | |
| 55 | 2015 | Data Protection for Computer Forensics Using Cryptographic Mechanisms | Tzong-Sun Wu; Han-Yu Lin | | | | |
| 56 | 2015 | Improved chaotic maps-based password-authenticated key agreement using smart cards | Han-Yu Lin | Communications in Nonlinear Science and Numerical Simulation | | | |
| 57 | 2015 | A Provable Watermark-based Copyright Protection Scheme | Pei-Yih Ting ; Shao-Da Huang; Tzong-Sun Wu; Han-Yu Lin | | | | |
| 58 | 2014 | Chaotic map-based three-party authenticated key agreement | Han-Yu Lin | Security and Communication Networks | | | |
| 59 | 2014 | Secure ID-Based Strong Designated Verifier Signature Scheme for E-Commerce | Han-Yu Lin ; Chi-Kuang Yeh | | | | |
| 60 | 2014 | Chaotic Map Based Three-Party Authenticated Key Agreement | Han-Yu Lin | | | | |
| 61 | 2014 | 基於雲端身份驗證的數位證據保全與代理人存取控管機制之研究 | 林韓禹 | | | | |
| 62 | 2014 | Universal Forgery Attack on a Strong Designated Verifier Signature Scheme | Hsu, C. L.; Han-Yu Lin | International Arab Journal of Information Technology | | | |
| 63 | 2014 | Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme | Han-Yu Lin | Wireless Personal Communications | | | |
| 64 | 2014 | Provably secure proxy convertible authenticated encryption scheme based on RSA | Wu, T. S.; Han-Yu Lin | Information Sciences | | | |
| 65 | 2014 | ID-Based Non-Interactive Universal Designated Verifier Signature for Privacy-Preserving Applications | Han-Yu Lin | | | | |
| 66 | 2014 | Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based System | Han-Yu Lin | International Arab Journal of Information Technology | | | |
| 67 | 2014 | A Robust Convertible Multi-Authenticated Encryption Scheme with One-Way Hash Function | Chung-Fu Lu; Chien-Lung Hsu; Han-Yu Lin ; Chien-Hui Su | | | | |
| 68 | 2014 | Shoulder-surfing-proof graphical password authentication scheme | Wu, T. S.; Lee, M. L.; Han-Yu Lin ; Wang, C. Y. | International Journal of Information Security | | | |
| 69 | 2014 | Convertible Authenticated Encryption Scheme with Hierarchical Access Control | Hsu, C. L.; Han-Yu Lin | Applied Mathematics & Information Sciences | | | |
| 70 | 2014 | Provably Secure Message Recovery Limited Verifier Signature Scheme with Low Cost | Chien-Lung Hsu; Han-Yu Lin | | | | |
| 71 | 2014 | Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System | Wu, T. S.; Chen, Y. S.; Han-Yu Lin | Ksii Transactions on Internet and Information Systems | | | |
| 72 | 2014 | Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension | Han-Yu Lin | Information Technology and Control | | | |
| 73 | 2013 | Timestamp-Based Proxy Signature Scheme with Revocation | Han-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Yih-Sen Chen | | | | |
| 74 | 2013 | On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message Linkages | Tzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting | | | | |
| 75 | 2013 | Novel Identity-Based Key-Insulated Strong Designated Verifier Signature Scheme | Han-Yu Lin ; Chi-Kuang Yeh | | | | |
| 76 | 2013 | An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network | Hsu, C. L.; Han-Yu Lin | Ksii Transactions on Internet and Information Systems | | | |
| 77 | 2013 | 基於分散式雲端儲存平台下的主動式用戶端網頁掛碼入侵偵測機制之研究 | 林韓禹 | | | | |
| 78 | 2013 | DNA 序列浮水印技術之強化設計 | 林琨祐; 陳建銘; 林韓禹 ; 白敦文 | | | | |
| 79 | 2013 | Non-Interactive Authenticated Key Agreement over the Mobile Communication Network | Wu, T. S.; Han-Yu Lin | Mobile Networks & Applications | | | |
| 80 | 2013 | A Novel Probabilistic Signature Based on Bilinear Square Diffie-Hellman Problem and Its Extension | Tzong-Sun Wu; Han-Yu Lin | | | | |
| 81 | 2013 | A novel probabilistic signature based on bilinear square DiffieHellman problem and its extension | Wu, T. S.; Han-Yu Lin | Security and Communication Networks | | | |
| 82 | 2013 | On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems | Han-Yu Lin | Journal of Medical Systems | | | |
| 83 | 2013 | New Efficient Identity-Based Key-Insulated Multisignature Scheme | Han-Yu Lin ; Tzong-Sun Wu; Ming-Lun Lee; Chi-Kuang Yeh | | | | |
| 84 | 2013 | Secure Universal Designated Verifier Signature and its Variant for Privacy Protection | Wu, T. S.; Han-Yu Lin | Information Technology and Control | | | |
| 85 | 2012 | Provably convertible multi-authenticated encryption scheme for generalized group communications | Lu, C. F.; Hsu, C. L.; Han-Yu Lin | Information Sciences | | | |
| 86 | 2012 | An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce | Han-Yu Lin ; Wu, T. S.; Huang, S. K. | Journal of Information Science and Engineering | | | |
| 87 | 2012 | Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs | Han-Yu Lin ; Wu, T. S.; Huang, S. K. | Journal of Information Science and Engineering | | | |
| 88 | 2012 | Pairing-based strong designated verifier proxy signature scheme with low cost | Hsu, C. L.; Han-Yu Lin | Security and Communication Networks | | | |
| 89 | 2012 | Construction of a Taiwan biodiversity genetic database in cloud environments | Han-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai | | | | |
| 90 | 2012 | Construction of a Taiwan biodiversity genetic database in cloud environments | Han-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang; Tun-Wen Pai | | | | |
| 91 | 2012 | Password-Based Authenticated Key Exchange Protocol with Smart Cards for Multi-Server Environments | Chien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin | | | | |
| 92 | 2012 | PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTS | Hsu, C. L.; Wu, T. S.; Han-Yu Lin | International Journal of Innovative Computing Information and Control | | | |
| 93 | 2012 | A publicly verifiable PCAE scheme for confidential applications with proxy delegation | Wu, T. S.; Pei-Yih Ting ; Han-Yu Lin | Transactions on Emerging Telecommunications Technologies | | | |
| 94 | 2012 | Security Essentials for Biodiversity Genome Database in Cloud Environments | Han-Yu Lin ; Chien-Ming Chen; Yu-Lun Chen; Ya-Hui Chang ; Tun-Wen Pai | | | | |
| 95 | 2012 | Authenticated Encryption Scheme Based on Paillier System with Verifiable Public Keys | Tzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang | | | | |
| 96 | 2011 | New identity-based key-insulated convertible multi-authenticated encryption scheme | Hsu, C. L.; Han-Yu Lin | Journal of Network and Computer Applications | | | |
| 97 | 2011 | Improved convertible authenticated encryption scheme with provable security | Han-Yu Lin ; Hsu, C. L.; Huang, S. K. | Information Processing Letters | | | |
| 98 | 2011 | Audio watermarking scheme with dynamic adjustment in mute period | Wu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S. | Expert Systems with Applications | | | |
| 99 | 2011 | Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue | Tzong-Sun Wu; Han-Yu Lin ; Ming-Lun Lee; Won-Yi Chen | | | | |
| 100 | 2011 | A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEME | Han-Yu Lin ; Hsu, C. L. | International Journal of Foundations of Computer Science | | | |
| 101 | 2011 | A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation | Han-Yu Lin ; Wu, T. S.; Yeh, Y. S. | Journal of Information Science and Engineering | | | |
| 102 | 2010 | Efficient proxy signcryption scheme with provable CCA and CMA security | Han-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S. | Computers & Mathematics with Applications | | | |
| 103 | 2010 | EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTION | Tsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E. | International Journal of Innovative Computing Information and Control | | | |
| 104 | 2010 | EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIES | Wu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y. | International Journal of Innovative Computing Information and Control | | | |
| 105 | 2009 | Secure Convertible Authenticated Encryption Scheme Based on RSA | Tzong-Sun Wu; Han-Yu Lin | | | | |
| 106 | 2009 | 基於雙線性配對之身份基底特定驗證者簽章方法 | 吳宗杉; 高俊海; 林韓禹 ; 黃世豪 | | | | |
| 107 | 2009 | Efficient self-certified proxy CAE scheme and its variants | Wu, T. S.; Han-Yu Lin | Journal of Systems and Software | | | |
| 108 | 2009 | Structural Binary CBC Encryption Mode | Yeh, Y. S.; Huang, T. Y.; Han-Yu Lin | Journal of Information Science and Engineering | | | |
| 109 | 2009 | A Study on Parallel RSA Factorization | Yi-Shiung Yeh; Ting-Yu Huang; Han-Yu Lin ; Yu-Hao Chang | | | | |
| 110 | 2009 | Self-certified multi-proxy signature schemes with message recovery | Wu, T. S.; Hsu, C. L.; Han-Yu Lin | Journal of Zhejiang University-Science A | | | |
| 111 | 2009 | Pairings Based Designated Verifier Signature Scheme for Three-Party Communication Environment | Han-Yu Lin ; Tzong-Sun Wu | | | | |
| 112 | 2008 | Self-Certified Proxy Convertible Authenticated Encryption Scheme | Han-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Yi-Shiung Yeh | | | | |
| 113 | 2008 | Bilinear Pairings Based Convertible Authenticated Encryption Scheme with Provable Recipient | Han-Yu Lin ; Tzong-Sun Wu | | | | |
| 114 | 2008 | A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECY | Wu, T. S.; Han-Yu Lin | International Journal of Innovative Computing Information and Control | | | |
| 115 | 2008 | Analysis of Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks | Han-Yu Lin ; Ting-Yu Huang; Tzong-Sun Wu; Tzong-Chen Wu | | | | |
| 116 | 2008 | Convertible multi-authenticated encryption scheme | Wu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C. | Information Sciences | | | |
| 117 | 2008 | ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key Systems | Tzong-Sun Wu; Han-Yu Lin | | | | |
| 118 | 2008 | A Novel (t, n) Threshold Convertible Authenticated Encryption Scheme | Han-Yu Lin ; Yi-Shiung Yeh | | | | |
| 119 | 2008 | Dynamic Multi-Secret Sharing Scheme | Han-Yu Lin ; Yi-Shiung Yeh | | | | |
| 120 | 2007 | ECC Based Self-Certified Convertible Authenticated Encryption Scheme with Computational Secrecy | Tzong-Sun Wu; Han-Yu Lin ; Chia-Chun Hu; Ming-Lun Lee | | | | |
| 121 | 2007 | Threshold Multi-Proxy Multi-Signature Scheme Based on Bilinear Pairings | Tzong-Sun Wu; Han-Yu Lin ; Ming-Je Shiu | | | | |
| 122 | 2007 | 具代理簽章者隱私保護之代理盲簽章 | 吳宗杉; 郭信男; 陳益森; 林韓禹 | | | | |
| 123 | 2007 | 最佳化的WEP加密機制 | 黃定宇; 林韓禹 ; 鄭家明; 葉義雄 | | | | |
| 124 | 2007 | Group-Oriented Convertible Authenticated Encryption Scheme with (t, n) Shared Verification | Han-Yu Lin ; Tzong-Sun Wu; Ting-Yu Huang; Tzu-Chiang Lin | | | | |
| 125 | 2007 | Generalized Convertible Authenticated Encryption Schemes for Smart Card Applications | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin | | | | |
| 126 | 2006 | Improved Threshold Authenticated Encryption Scheme Based on the Factorization Problem | Tzong-Sun Wu; Han-Yu Lin ; Won-Yi Chang | | | | |
| 127 | 2005 | Efficient Convertible Authenticated Encryption Schemes for Smart Card Applications in Network Environments | Chien-Lung Hsu; Tzong-Sun Wu; Han-Yu Lin | | | | |
| 128 | 2004 | Robust Key Authentication Scheme Resistant to Public Key Substitution Attacks | Tzong-Sun Wu; Han-Yu Lin | | | | |
| 129 | 2003 | Improvement of Miyazaki-Takaragi Threshold Digital Signature Scheme | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang | | | | |
| 130 | 2003 | Cryptanalysis on Wu-Chang Cryptographic Key Assignment Scheme for Hierarchical Access Control | Tzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Shu-Hui Kao | | | | |
| 131 | 2002 | Efficient Authenticated Key Agreement Protocol | Tzong-Sun Wu; Shu-Hui Kao; Han-Yu Lin | | | | |
| 132 | 2002 | XML知識庫之建置 | 吳宗杉; 黃博聖; 林韓禹 | | | | |