dblp.uni-trier.dewww.uni-trier.de

Ya-Fen Chang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
22EEJen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu: Visual secret sharing for multiple secrets. Pattern Recognition 41(12): 3572-3581 (2008)
2007
21EEYa-Fen Chang, Chin-Chen Chang: Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundam. Inform. 76(1-2): 13-23 (2007)
20EEYa-Fen Chang, Chin-Chen Chang, Pei-Yu Lin: A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007)
2006
19EEYa-Fen Chang, Chin-Chen Chang: Enhanced Anonymous Auction Protocols with Freewheeling Bids. AINA (1) 2006: 353-358
18EEYa-Fen Chang, Chin-Chen Chang, Yu-Wei Su: A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. AINA (2) 2006: 741-745
17 Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai: Comments on Distributed Sign-and-Encryption Schemes. IMECS 2006: 178-180
16EEYa-Fen Chang, Chin-Chen Chang: Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. JCIS 2006
15EEYa-Fen Chang, Jung-San Lee, Chin-Chen Chang: A secure and efficient authentication scheme for mobile users. IJMC 4(5): 581-594 (2006)
2005
14EEYa-Fen Chang, Chin-Chen Chang: Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. CW 2005: 340-344
13EEChin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu: An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. CW 2005: 93-100
12EEYa-Fen Chang, Chin-Chen Chang: An Improvement on Strong-Password Authentication Protocols. ICESS 2005: 629-637
11EEYa-Fen Chang, Chin-Chen Chang, Hui-Feng Huang: Digital signature with message recovery using self-certified public keys without trustworthy system authority. Applied Mathematics and Computation 161(1): 211-227 (2005)
10EEYa-Fen Chang, Chin-Chen Chang: Authentication schemes with no verification table. Applied Mathematics and Computation 167(2): 820-832 (2005)
9EEChin-Chen Chang, Jung-San Lee, Ya-Fen Chang: Efficient authentication protocols of GSM. Computer Communications 28(8): 921-928 (2005)
8EEYa-Fen Chang, Chin-Chen Chang: Schemes for Digital Gift Certificates with Low Computation Complexity. Informatica, Lith. Acad. Sci. 16(4): 503-518 (2005)
7EEYa-Fen Chang, Chin-Chen Chang: An efficient authentication protocol for mobile satellite communication systems. Operating Systems Review 39(1): 70-84 (2005)
2004
6EEChin-Chen Chang, Ya-Fen Chang: Yet Another Attack on a QR-based Password Authentication System. AINA (2) 2004: 170-173
5 Chin-Chen Chang, Ya-Fen Chang: The Security Flaw of an Untraceable Signature Scheme. ICEB 2004: 1379-1381
4EEYa-Fen Chang, Chin-Chen Chang, Chia-Lin Kao: An improvement on a deniable authentication protocol. Operating Systems Review 38(3): 65-74 (2004)
3EEYa-Fen Chang, Chin-Chen Chang: A secure and efficient strong-password authentication protocol. Operating Systems Review 38(3): 79-90 (2004)
2EEYa-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo: A secure one-time password authentication scheme using smart cards without limiting login times. Operating Systems Review 38(4): 80-90 (2004)
2003
1EEChin-Chen Chang, Ya-Fen Chang: Efficient anonymous auction protocols with freewheeling bids. Computers & Security 22(8): 728-734 (2003)

Coauthor Index

1Chin-Chen Chang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21]
2Yen-Ping Chu [22]
3Jen-Bang Feng [22]
4Hui-Feng Huang [11]
5Chia-Lin Kao [4]
6Jui-Yi Kuo [2]
7Jung-San Lee [9] [15]
8Pei-Yu Lin [20]
9Yu-Wei Su [18]
10Wei-Liang Tai [17]
11Chwei-Shyong Tsai [22]
12Hsien-Chu Wu [22]
13Wen-Chuan Wu [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)