研究成果

第 1 到 49 筆結果,共 49 筆。

公開日期標題作者來源出版物WOS全文
12022Revocable certificateless public key encryption with equality testTung-Tso Tsai ; Han-Yu Lin ; Han-Ching Tsai
22022An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area NetworkTsai, Tung-Tso ; Lin, Han-Yu ; Chang, Hsiao-ChiehJOURNAL OF SENSORS1
32022Leakage-resilient certificate-based authenticated key exchange protocolTung-Tso Tsai ; Sen-Shan Huang; Yuh-Min Tseng; Yun-Hsin Chuang; Ying-Hao Hung
42022An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT EnvironmentsLin, Han-Yu ; Tsai, Tung-Tso ; Ting, Pei-Yih ; Chen, Ching-ChungSENSORS2
52022Certificate-based encryption with equality testYu-Hsiang Tseng; Tung-Tso Tsai ; Han-Yu Lin ; Cheng-Ye Wu
62022Secure access control using updateable attribute keysLin, Han-Yu ; Tsai, Tung-Tso ; Wu, Hong-Ru; Ku, Miao-SiMATHEMATICAL BIOSCIENCES AND ENGINEERING0
72022Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation AuthorityTseng, Yuh-Min; Huang, Sen-Shan; Tsai, Tung-Tso ; Chuang, Yun-Hsin; Hung, Ying-HaoINFORMATICA2
82022Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage ModelTsai, Tung-Tso ; Tseng, Yuh-Min; Huang, Sen-Shan; Xie, Jia-Yi; Hung, Ying-HaoIEEE ACCESS0
92022Revocable Certificateless Public Key Encryption with Equality TestTsai, Tung-Tso ; Lin, Han-Yu ; Tsai, Han-ChingINFORMATION TECHNOLOGY AND CONTROL
102021An Efficient Strong Designated Multi-Verifier Signature Scheme with Shared VerificationHan-Yu Lin ; Tung-Tso Tsai ; Pei-Yih Ting ; Hsu-Lun Wu
112021A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation MechanismTsai, Tung-Tso ; Chuang, Yun-Hsin; Tseng, Yuh-Min; Huang, Sen-Shan; Hung, Ying-HaoIEEE ACCESS3
122020Leakage-resilient outsourced revocable certificateless signature with a cloud revocation serverYuh-Min Tseng; Jui-Di Wu; Sen-Shan Huang; Tung-Tso Tsai 
132020Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakageJui-Di Wu; Yuh-Min Tseng; Sen-Shan Huang; Tung-Tso Tsai 
142020Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation AuthorityWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Informatica6
152019Efficient Certificate-Based Signature with Short Key and Signature Sizes from LatticesTseng, Y. M.; Tsai, T. T. ; Wu, J. D.; Huang, S. S.Informatica1
162019Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel AttacksWu, J. D.; Tseng, Y. M.; Huang, S. S.; Tsai, T. T. Ieee Access7
172018Identity-Based Encryption with Cloud Revocation Authority and Its ApplicationsTseng, Y. M.; Tsai, T. T. ; Huang, S. S.; Huang, C. P.Ieee Transactions on Cloud Computing15
182017Efficient Anonymous Multireceiver Certificateless EncryptionHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T. Ieee Systems Journal23
192017SIBSC: Separable Identity-Based Signcryption for Resource-Constrained DevicesTsai, T. T. ; Huang, S. S.; Tseng, Y. M.Informatica5
202016Cryptanalysis and improvement of provable a data possession scheme in public cloud storageTung-Tso Tsai ; Yuh-Min Tseng; Ying-Hao Hung; Sen-Shan Huang
212016List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver ArchitecturesTseng, Y. M.; Huang, S. S.; Tsai, T. T. ; Ke, J. H.Ieee Transactions on Emerging Topics in Computing41
222015Efficient revocable certificateless public key encryption with a delegated revocation authorityTsai, T. T. ; Tseng, Y. M.; Huang, S. S.Security and Communication Networks7
232015Revocable Certificateless Public Key EncryptionTsai, T. T ; Tseng, Y. M.Ieee Systems Journal26
242015Strongly unforgeable revocable certificateless signatureYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Ying-Hao Hung
252015Efficient ID-based encryption with outsourced revocation authorityChung-Peng Huang; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
262015Leakage-Free ID-Based SignatureTseng, Y. M.; Tsai, T. T ; Huang, S. S.Computer Journal8
272015Enhancement on strongly secure group key agreementTseng, Y. M.; Tsai, T. T ; Huang, S. S.Security and Communication Networks3
282015A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile DevicesTseng, Y. M.; Huang, S. S.; Tsai, T. T ; Tseng, L.International Journal of Distributed Sensor Networks7
292015Certificateless Signature with Strong Unforgeability in the Standard ModelHung, Y. H.; Huang, S. S.; Tseng, Y. M.; Tsai, T. T Informatica15
302014Efficient searchable ID-based encryption with a designated serverWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Annals of Telecommunications36
312014Ephemeral-secret-leakage secure ID-based authenticated key exchange protocol for mobile client-serer environmentsLi-Chun Tseng ; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
322014Revocable ID-based mutual authentication and key agreement protocol for multi-server environmentsJia-Hua Ke; Tung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
332014Secure certificateless signature in the standard modelTung-Tso Tsai ; Yuh-Min Tseng; Sen-Shan Huang
342014Efficient anonymous multi-receiver ID-based encryption with constant decryption costYuh-Min Tseng; Tung-Tso Tsai ; Sen-Shan Huang; Hung-Yu Chien
352014RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBETsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica
362014Strongly Secure Revocable ID-based Signature without Random OraclesHung, Y. H.; Tsai, T. T ; Tseng, Y. M.; Huang, S. S.Information Technology and Control12
372014Efficient Strongly Unforgeable ID-Based Signature Without Random OraclesTsai, T. T ; Tseng, Y. M.; Huang, S. S.Informatica8
382014A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious ParticipantsWu, T. Y.; Tsai, T. T ; Tseng, Y. M.Scientific World Journal3
392014Secure Certificateless Signature with Revocation in the Standard ModelTung-Tso Tsai ; Huang, S. S.; Tseng, Y. M.Mathematical Problems in Engineering10
402013Provably secure revocable ID-based signature in the standard modelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Security and Communication Networks26
412013Practical revocable ID-based signature with a public channelTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
422013Efficient Revocable Multi-Receiver ID-Based EncryptionTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Information Technology and Control10
432012A revocable ID-based authenticated group key exchange protocol with resistant to malicious participantsWu, T. Y.; Tseng, Y. M.; Tsai, T. T Computer Networks32
442012A revocable ID-based signcryption schemeTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
452012Revocable ID-based signature scheme with batch verificationsTsu-Yang Wu; Tung-Tso Tsai ; Yuh-Min Tseng
462012Novel revocable hierarchical ID-based encryption with a delegated revocation authorityTung-Tso Tsai ; Yuh-Min Tseng; Tsu-Yang Wu
472012Efficient Revocable ID-Based Encryption with a Public ChannelTseng, Y. M.; Tsai, T. T Computer Journal59
482012A Fully Secure Revocable ID-Based Encryption in the Standard ModelTsai, T. T ; Tseng, Y. M.; Wu, T. Y.Informatica16
492011A convinced commitment scheme for bilinear Diffie-Hellman problemYuh-Min Tseng; Tsu-Yang Wu; Tung-Tso Tsai