Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • 首頁
  • 研究成果檢索
  • 研究人員
  • 單位
  • 計畫
  • 分類瀏覽
    • 研究成果檢索
    • 研究人員
    • 單位
    • 計畫
  • 機構典藏
  • SDGs
  • 登入
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
National Taiwan Ocean University,NTOU / College of Electrical Engineering and Computer Science

Lin, HY

Network Lab View Statistics Email Alert RSS Feed

  • Information
  • Indicators
  • Publications 79
  • Project and Funding 12

Publications
  • All
  • Articles
  • Conference Papers
  • Others

Author

  • 65 han-yu lin
  • 21 wu, t. s.
  • 14 lin, han-yu
  • 12 hsu, c. l.
  • 9 tzong-sun wu
  • 7 tsai, tung-tso
  • 4 huang, s. k.
  • 3 pei-yih ting
  • 3 yeh, y. s.
  • 3 yi-shiung yeh
  • . next >

Subject

  • 5 bilinear pairing
  • 4 certificateless
  • 3 authentication
  • 3 encryption
  • 3 equality test
  • 3 fog computing
  • 3 iot
  • 3 proxy re-encryption
  • 3 public key system
  • 2 anonymity
  • . next >

Date issued

  • 13 2020 - 2025
  • 52 2010 - 2019
  • 14 2000 - 2009

By type

  • 58 journal article
  • 21 journal article
  • 21 journal article
  • 21 journal article

Fulltext

  • 79 no fulltext


Results 1-79 of 79 (Search time: 0.001 seconds).

Issue DateTitleAuthor(s)SourcescopusWOSFulltext/Archive link
12012A publicly verifiable PCAE scheme for confidential applications with proxy delegationWu, T. S.; Pei-Yih Ting ; Han-Yu Lin Transactions on Emerging Telecommunications Technologies
22011Audio watermarking scheme with dynamic adjustment in mute periodWu, T. S.; Han-Yu Lin ; Hu, W. C.; Chen, Y. S.Expert Systems with Applications
32012Authenticated Encryption Scheme Based on Paillier System with Verifiable Public KeysTzong-Sun Wu; Yih-Sen Chen; Han-Yu Lin ; Tang-Kai Chang
42023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
52012Certificate-Based Secure Three-Party Signcryption Scheme With Low CostsHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
62014Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement SchemeHan-Yu Lin Wireless Personal Communications
72014Chaotic map-based three-party authenticated key agreementHan-Yu Lin Security and Communication Networks
82014Convertible Authenticated Encryption Scheme with Hierarchical Access ControlHsu, C. L.; Han-Yu Lin Applied Mathematics & Information Sciences
92008Convertible multi-authenticated encryption schemeWu, T. S.; Hsu, C. L.; Tsai, K. Y.; Han-Yu Lin ; Wu, T. C.Information Sciences
102016Design and Construction of Secure Digital Will SystemWu, Tzong-Sun; Chen, Yih-Sen; Lin, Han-Yu INT ARAB J INF TECHN0
112011A DL Based Short Strong Designated Verifier Signature Scheme with Low ComputationHan-Yu Lin ; Wu, T. S.; Yeh, Y. S.Journal of Information Science and Engineering
122018Dynamic ID authentication scheme using chaotic mapHan-Yu Lin Wireless Networks
132008Dynamic Multi-Secret Sharing SchemeHan-Yu Lin ; Yi-Shiung Yeh
142008ECC Based Convertible Authenticated Encryption Scheme Using Self-Certified Public Key SystemsTzong-Sun Wu; Han-Yu Lin 
152002Efficient Authenticated Key Agreement ProtocolTzong-Sun Wu; Shu-Hui Kao; Han-Yu Lin 
162010EFFICIENT CONVERTIBLE MULTI-AUTHENTICATED ENCRYPTION SCHEME WITHOUT MESSAGE REDUNDANCY OR ONE-WAY HASH FUNCTIONTsai, J. L.; Wu, T. S.; Han-Yu Lin ; Lee, J. E.International Journal of Innovative Computing Information and Control
172016Efficient dynamic authentication for mobile satellite communication systems without verification tableHan-Yu Lin International Journal of Satellite Communications and Networking
182015Efficient English Auction Scheme without a Secure ChannelWu, T. C.; Lin, T. Y.; Wu, T. S.; Han-Yu Lin International Arab Journal of Information Technology
192017Efficient mobile dynamic ID authentication and key agreement scheme without trusted serversHan-Yu Lin International Journal of Communication Systems
202010Efficient proxy signcryption scheme with provable CCA and CMA securityHan-Yu Lin ; Wu, T. S.; Huang, S. K.; Yeh, Y. S.Computers & Mathematics with Applications
212022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
222009Efficient self-certified proxy CAE scheme and its variantsWu, T. S.; Han-Yu Lin Journal of Systems and Software
232021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
242012An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic CommerceHan-Yu Lin ; Wu, T. S.; Huang, S. K.Journal of Information Science and Engineering
252010EFFICIENT VERIFIER-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL FOR THREE PARTIESWu, T. S.; Han-Yu Lin ; Hsu, C. L.; Chang, K. Y.International Journal of Innovative Computing Information and Control
262011Fast Remote User Authentication Scheme with Smart Card Based on Quadratic ResidueTzong-Sun Wu; Han-Yu Lin ; Ming-Lun Lee; Won-Yi Chen
272014Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its ExtensionHan-Yu Lin Information Technology and Control
282008A GROUP-ORIENTED PROXY CMAE SCHEME WITH COMPUTATIONAL SECRECYWu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
292013An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication NetworkHsu, C. L.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
302015Improved chaotic maps-based password-authenticated key agreement using smart cardsHan-Yu Lin Communications in Nonlinear Science and Numerical Simulation
312011Improved convertible authenticated encryption scheme with provable securityHan-Yu Lin ; Hsu, C. L.; Huang, S. K.Information Processing Letters
322022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
332021An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in CloudsLin, Han-Yu ; Hung, Yao-MinSENSORS5
342003Improvement of Miyazaki-Takaragi Threshold Digital Signature SchemeTzong-Sun Wu; Chien-Lung Hsu; Han-Yu Lin ; Po-Sheng Huang
352025Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel AttacksTsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chinJOURNAL OF INFORMATION SCIENCE AND ENGINEERING
362015Location-based data encryption for wireless sensor network using dynamic keysHan-Yu Lin Wireless Networks
372021A Multi-User Ciphertext Policy Attribute-Based Encryption Scheme with Keyword Search for Medical Cloud SystemLin, Han-Yu ; Jiang, Yan-RuAPPLIED SCIENCES-BASEL6
382018A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA SecureHan-Yu Lin Ieee Access
392011New identity-based key-insulated convertible multi-authenticated encryption schemeHsu, C. L.; Han-Yu Lin Journal of Network and Computer Applications
402013Non-Interactive Authenticated Key Agreement over the Mobile Communication NetworkWu, T. S.; Han-Yu Lin Mobile Networks & Applications
412008A Novel (t, n) Threshold Convertible Authenticated Encryption SchemeHan-Yu Lin ; Yi-Shiung Yeh
422019A Novel CCA Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH AssumptionsHan-Yu Lin Information Technology and Control
432019A Novel Dual Authenticated Encryption Scheme Suitable for Social Networking ServicesHan-Yu Lin Applied Sciences-Basel
442011A NOVEL IDENTITY-BASED KEY-INSULATED CONVERTIBLE AUTHENTICATED ENCRYPTION SCHEMEHan-Yu Lin ; Hsu, C. L.International Journal of Foundations of Computer Science
452013A novel probabilistic signature based on bilinear square DiffieHellman problem and its extensionWu, T. S.; Han-Yu Lin Security and Communication Networks
462013On the Construction of DL-Based Convertible Authenticated Encryption Scheme with Message LinkagesTzong-Sun Wu; Han-Yu Lin ; Shu-Hsin Tsao; Pei-Yih Ting 
472013On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsHan-Yu Lin Journal of Medical Systems
482012Pairing-based strong designated verifier proxy signature scheme with low costHsu, C. L.; Han-Yu Lin Security and Communication Networks
492019A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared SecretsHan-Yu Lin Symmetry-Basel
502012PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITHOUT TRUSTED THIRD PARTY FOR MULTI-SERVER ENVIRONMENTSHsu, C. L.; Wu, T. S.; Han-Yu Lin International Journal of Innovative Computing Information and Control
512017PCMAE: A Proxy Convertible Multi-AE Scheme and Its VariantHan-Yu Lin Information Technology and Control
522012Provably convertible multi-authenticated encryption scheme for generalized group communicationsLu, C. F.; Hsu, C. L.; Han-Yu Lin Information Sciences
532014Provably Secure Message Recovery Limited Verifier Signature Scheme with Low CostChien-Lung Hsu; Han-Yu Lin 
542014Provably secure proxy convertible authenticated encryption scheme based on RSAWu, T. S.; Han-Yu Lin Information Sciences
552024/10/1Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT EnvironmentsLin, Han-Yu ; Chen, Pei-RuSENSORS
562022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
572022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
582024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
592004Robust Key Authentication Scheme Resistant to Public Key Substitution AttacksTzong-Sun Wu; Han-Yu Lin 
602015RPCAE: a novel revocable proxy convertible authenticated encryption schemeHan-Yu Lin International Journal of Information Security
612022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
622016Secure Certificateless Two-Party Key Agreement with Short MessageHan-Yu Lin Information Technology and Control
632015Secure Content Distribution Using Multi-hop Proxy Re-encryptionHan-Yu Lin Wireless Personal Communications
642009Secure Convertible Authenticated Encryption Scheme Based on RSATzong-Sun Wu; Han-Yu Lin 
652018A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systemsLin, Han-Yu PLOS ONE1
662013Secure Universal Designated Verifier Signature and its Variant for Privacy ProtectionWu, T. S.; Han-Yu Lin Information Technology and Control
672016Selectively Secure Lightweight Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin ; Yao-Min Hung
682009Self-certified multi-proxy signature schemes with message recoveryWu, T. S.; Hsu, C. L.; Han-Yu Lin Journal of Zhejiang University-Science A
692014Shoulder-surfing-proof graphical password authentication schemeWu, T. S.; Lee, M. L.; Han-Yu Lin ; Wang, C. Y.International Journal of Information Security
702009Structural Binary CBC Encryption ModeYeh, Y. S.; Huang, T. Y.; Han-Yu Lin Journal of Information Science and Engineering
712009A Study on Parallel RSA FactorizationYi-Shiung Yeh; Ting-Yu Huang; Han-Yu Lin ; Yu-Hao Chang
722007Threshold Multi-Proxy Multi-Signature Scheme Based on Bilinear PairingsTzong-Sun Wu; Han-Yu Lin ; Ming-Je Shiu
732021Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systemsLin, Han-Yu INT J DISTRIB SENS N0
742014Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key SystemWu, T. S.; Chen, Y. S.; Han-Yu Lin Ksii Transactions on Internet and Information Systems
752017Toward Secure CB-Signcryption for Wireless Ad Hoc NetworksHan-Yu Lin ; Wu, T. S.Ad Hoc & Sensor Wireless Networks
762014Toward Secure Strong Designated Verifier Signature Scheme from Identity-Based SystemHan-Yu Lin International Arab Journal of Information Technology
772019Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud EnvironmentsHan-Yu Lin Ieee Systems Journal
782019Traceable Anonymous Authentication and Key Fxchange Protocol for Privacy-Aware Cloud EnvironmentsLin, Han-Yu IEEE SYSTEMS JOURNAL4
792014Universal Forgery Attack on a Strong Designated Verifier Signature SchemeHsu, C. L.; Han-Yu Lin International Arab Journal of Information Technology

 

申請連結研究人員資料

Check the encrypted string of this email, put the correct string in the box below and click "Go" to validate the email and claim this profile.

Emails: h a n y * @ * * * * * * * * * * * * u . t w

Go


Contact via feedback form

若您要聯絡網站管理員,請點選以下按鈕 
Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback