研究成果

第 1 到 54 筆結果,共 54 筆。

公開日期標題作者來源出版物scopusWOS全文
12025Leakage-Resilient Public Key Encryption with Equality Test Resistant to Side-channel AttacksTsai, Tung-tso ; Lin, Han-yu ; Chen, Yu-chi; Chen, Yuan-chinJOURNAL OF INFORMATION SCIENCE AND ENGINEERING
22024/9/1AHMRE-SCST: Lightweight Anonymous Heterogeneous Multirecipient Encryption With Seamlessly Compatible System Transformation for IoT DevicesTseng, Yuh-Min; Ho, Ting-Chieh; Tsai, Tung-Tso ; Huang, Sen-ShanIEEE INTERNET OF THINGS JOURNAL
32024/1/1Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System SettingsTseng, Yuh-Min; Tsai, Tung-Tso ; Huang, Sen-Shan; Ho, Ting-ChiehIEEE ACCESS
42024/1/1A Revocable Certificateless Sanitizable Signature Scheme With Batch VerificationLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hsu-LunIEEE ACCESS
52023/1/1CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKSTsai, Tung-Tso ; Lin, Han-Yu ; Wu, Cheng-YeINFORMATION TECHNOLOGY AND CONTROL
62022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
72022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
82022Leakage-resilient certificate-based authenticated key exchange protocolTung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung
92022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
102022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
112022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
122022Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityTseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-HaoINFORMATICA2
132022Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage ModelTsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-HaoIEEE ACCESS0
142022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
152021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
162021A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation MechanismTsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-HaoIEEE ACCESS3
172020Leakage-resilient outsourced revocable certificateless signature with a cloud revocation serverYuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai 
182020Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakageJui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai 
192020Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Informatica6
202019Efficient Certificate-Based Signature with Short Key and Signature Sizes from LatticesTseng, Y. M.; Tsai, T. T. ; Wu, J. D.; Huang, S. S.Informatica1
212019Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel AttacksWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Ieee Access7
222018Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsTseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P.Ieee Transactions on Cloud Computing15
232017Efficient Anonymous Multireceiver Certificateless EncryptionHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T. Ieee Systems Journal23
242017SIBSC: Separable Identity-Based Signcryption for Resource-Constrained DevicesTsai, T. T. ; Huang, S. S.; Tseng, Y. M.Informatica5
252016Cryptanalysis and improvement of provable a data possession scheme in public cloud storageTung-Tso Tsai ; Yuh-Min Tseng; Ying-Hao Hung; Sen-Shan Huang
262016List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver ArchitecturesTseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H.Ieee Transactions on Emerging Topics in Computing41
272015Efficient revocable certificateless public key encryption with a delegated revocation authorityTsai, T. T. ; Tseng, Y. M.; Huang, S. S.Security and Communication Networks7
282015Revocable Certificateless Public Key EncryptionTsai, T. T ; Tseng, Y. M.Ieee Systems Journal26
292015Strongly unforgeable revocable certificateless signatureYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Ying-Hao Hung
302015Efficient ID-based encryption with outsourced revocation authorityChung-Peng Huang; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
312015Leakage-Free ID-Based SignatureTseng, Y. M.; Tsai, T. T ; Huang, S. S.Computer Journal8
322015Enhancement on strongly secure group key agreementTseng, Y. M.; Tsai, T. T ; Huang, S. S.Security and Communication Networks3
332015A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile DevicesTseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L.International Journal of Distributed Sensor Networks7
342015Certificateless Signature with Strong Unforgeability in the Standard ModelHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T Informatica15
352014Efficient searchable ID-based encryption with a designated serverWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Annals of Telecommunications36
362014Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environmentsLi-Chun Tseng ; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
372014Revocable ID-based mutual authentication and key agreement protocol for multi-server environmentsJia-Hua Ke; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
382014Secure certificateless signature in the standard modelTung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
392014Efficient anonymous multi-receiver ID-based encryption with constant decryption costYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Hung-Yu Chien
402014RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBETsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica
412014Strongly Secure Revocable ID-based Signature without Random OraclesHung, Y. H.; Tsai, T. T ; Tseng, Y. M.; Huang, S. S.Information Technology and Control12
422014Efficient Strongly Unforgeable ID-Based Signature Without Random OraclesTsai, T. T ; Tseng, Y. M.; Huang, S. S.Informatica8
432014A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious ParticipantsWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Scientific World Journal3
442014Secure Certificateless Signature with Revocation in the Standard ModelTung-Tso Tsai ; Huang, S. S.; Tseng, Y. M.Mathematical Problems in Engineering10
452013Provably secure revocable ID-based signature in the standard modelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Security and Communication Networks26
462013Practical revocable ID-based signature with a public channelTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
472013Efficient Revocable Multi-Receiver ID-Based EncryptionTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Information Technology and Control10
482012A revocable ID-based authenticated group key exchange protocol with resistant to malicious participantsWu, T. Y.; Tseng, Y. M.; Tsai, T. T Computer Networks32
492012A revocable ID-based signcryption schemeTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
502012Revocable ID-based signature scheme with batch verificationsTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
512012Novel revocable hierarchical ID-based encryption with a delegated revocation authorityTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
522012Efficient Revocable ID-Based Encryption with a Public ChannelTseng, Y. M.; Tsai, T. T Computer Journal59
532012A Fully Secure Revocable ID-Based Encryption in the Standard ModelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica16
542011A convinced commitment scheme for bilinear Diffie-Hellman problemYuh-Min Tseng; Tsu-Yang Wu; Tung-Tso Tsai