| 2008 |
| 22 | EE | Jen-Bang Feng,
Hsien-Chu Wu,
Chwei-Shyong Tsai,
Ya-Fen Chang,
Yen-Ping Chu:
Visual secret sharing for multiple secrets.
Pattern Recognition 41(12): 3572-3581 (2008) |
| 2007 |
| 21 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Inform. 76(1-2): 13-23 (2007) |
| 20 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Pei-Yu Lin:
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, Lith. Acad. Sci. 18(4): 535-546 (2007) |
| 2006 |
| 19 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Enhanced Anonymous Auction Protocols with Freewheeling Bids.
AINA (1) 2006: 353-358 |
| 18 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Yu-Wei Su:
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
AINA (2) 2006: 741-745 |
| 17 | | Ya-Fen Chang,
Chin-Chen Chang,
Wei-Liang Tai:
Comments on Distributed Sign-and-Encryption Schemes.
IMECS 2006: 178-180 |
| 16 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
JCIS 2006 |
| 15 | EE | Ya-Fen Chang,
Jung-San Lee,
Chin-Chen Chang:
A secure and efficient authentication scheme for mobile users.
IJMC 4(5): 581-594 (2006) |
| 2005 |
| 14 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Password-authenticated 3PEKE with Round Efficiency without Server's Public Key.
CW 2005: 340-344 |
| 13 | EE | Chin-Chen Chang,
Ya-Fen Chang,
Wen-Chuan Wu:
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
CW 2005: 93-100 |
| 12 | EE | Ya-Fen Chang,
Chin-Chen Chang:
An Improvement on Strong-Password Authentication Protocols.
ICESS 2005: 629-637 |
| 11 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Hui-Feng Huang:
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Applied Mathematics and Computation 161(1): 211-227 (2005) |
| 10 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Authentication schemes with no verification table.
Applied Mathematics and Computation 167(2): 820-832 (2005) |
| 9 | EE | Chin-Chen Chang,
Jung-San Lee,
Ya-Fen Chang:
Efficient authentication protocols of GSM.
Computer Communications 28(8): 921-928 (2005) |
| 8 | EE | Ya-Fen Chang,
Chin-Chen Chang:
Schemes for Digital Gift Certificates with Low Computation Complexity.
Informatica, Lith. Acad. Sci. 16(4): 503-518 (2005) |
| 7 | EE | Ya-Fen Chang,
Chin-Chen Chang:
An efficient authentication protocol for mobile satellite communication systems.
Operating Systems Review 39(1): 70-84 (2005) |
| 2004 |
| 6 | EE | Chin-Chen Chang,
Ya-Fen Chang:
Yet Another Attack on a QR-based Password Authentication System.
AINA (2) 2004: 170-173 |
| 5 | | Chin-Chen Chang,
Ya-Fen Chang:
The Security Flaw of an Untraceable Signature Scheme.
ICEB 2004: 1379-1381 |
| 4 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Chia-Lin Kao:
An improvement on a deniable authentication protocol.
Operating Systems Review 38(3): 65-74 (2004) |
| 3 | EE | Ya-Fen Chang,
Chin-Chen Chang:
A secure and efficient strong-password authentication protocol.
Operating Systems Review 38(3): 79-90 (2004) |
| 2 | EE | Ya-Fen Chang,
Chin-Chen Chang,
Jui-Yi Kuo:
A secure one-time password authentication scheme using smart cards without limiting login times.
Operating Systems Review 38(4): 80-90 (2004) |
| 2003 |
| 1 | EE | Chin-Chen Chang,
Ya-Fen Chang:
Efficient anonymous auction protocols with freewheeling bids.
Computers & Security 22(8): 728-734 (2003) |