2008 |
22 | EE | Jen-Bang Feng,
Hsien-Chu Wu,
Chwei-Shyong Tsai,
Ya-Fen Chang,
Yen-Ping Chu:
Visual secret sharing for multiple secrets.
Pattern Recognition 41(12): 3572-3581 (2008) |
2007 |
21 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Inform. 76(1-2): 13-23 (2007) |
20 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Pei-Yu Lin:
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007) |
2006 |
19 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Enhanced Anonymous Auction Protocols with Freewheeling Bids.
AINA (1) 2006: 353-358 |
18 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Yu-Wei Su:
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
AINA (2) 2006: 741-745 |
17 | | Ya-Fen Chang,
Chin-Chen Chang,
Wei-Liang Tai:
Comments on Distributed Sign-and-Encryption Schemes.
IMECS 2006: 178-180 |
16 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
JCIS 2006 |
15 | EE | Ya-Fen Chang,
Jung-San Lee,
Chin-Chen Chang:
A secure and efficient authentication scheme for mobile users.
IJMC 4(5): 581-594 (2006) |
2005 |
14 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Password-authenticated 3PEKE with Round Efficiency without Server's Public Key.
CW 2005: 340-344 |
13 | EE | Chin-Chen Chang,
Ya-Fen Chang,
Wen-Chuan Wu:
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
CW 2005: 93-100 |
12 | EE | Ya-Fen Chang,
Chin-Chen Chang:
An Improvement on Strong-Password Authentication Protocols.
ICESS 2005: 629-637 |
11 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Hui-Feng Huang:
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Applied Mathematics and Computation 161(1): 211-227 (2005) |
10 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Authentication schemes with no verification table.
Applied Mathematics and Computation 167(2): 820-832 (2005) |
9 | EE | Chin-Chen Chang,
Jung-San Lee,
Ya-Fen Chang:
Efficient authentication protocols of GSM.
Computer Communications 28(8): 921-928 (2005) |
8 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Schemes for Digital Gift Certificates with Low Computation Complexity.
Informatica, Lith. Acad. Sci. 16(4): 503-518 (2005) |
7 | EE | Ya-Fen Chang,
Chin-Chen Chang:
An efficient authentication protocol for mobile satellite communication systems.
Operating Systems Review 39(1): 70-84 (2005) |
2004 |
6 | EE | Chin-Chen Chang,
Ya-Fen Chang:
Yet Another Attack on a QR-based Password Authentication System.
AINA (2) 2004: 170-173 |
5 | | Chin-Chen Chang,
Ya-Fen Chang:
The Security Flaw of an Untraceable Signature Scheme.
ICEB 2004: 1379-1381 |
4 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Chia-Lin Kao:
An improvement on a deniable authentication protocol.
Operating Systems Review 38(3): 65-74 (2004) |
3 | EE | Ya-Fen Chang,
Chin-Chen Chang:
A secure and efficient strong-password authentication protocol.
Operating Systems Review 38(3): 79-90 (2004) |
2 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Jui-Yi Kuo:
A secure one-time password authentication scheme using smart cards without limiting login times.
Operating Systems Review 38(4): 80-90 (2004) |
2003 |
1 | EE | Chin-Chen Chang,
Ya-Fen Chang:
Efficient anonymous auction protocols with freewheeling bids.
Computers & Security 22(8): 728-734 (2003) |