2009 |
34 | EE | Hung-Yu Chien,
Tzu-Hang Hsu:
Secure fast WLAN handoff using time-bound delegated authentication.
Int. J. Communication Systems 22(5): 565-584 (2009) |
2008 |
33 | EE | Hung-Yu Chien,
Rung Ching Chen,
Annie Shen:
Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space.
AINA 2008: 327-333 |
32 | EE | Hung-Yu Chien,
Tzong-Chen Wu:
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model.
ISI Workshops 2008: 69-76 |
31 | EE | Hung-Yu Chien,
Ru-Yu Lin:
Improved ID-based security framework for ad hoc network.
Ad Hoc Networks 6(1): 47-60 (2008) |
30 | EE | Hung-Yu Chien:
Selectively Convertible Authenticated Encryption in the Random Oracle Model.
Comput. J. 51(4): 419-434 (2008) |
29 | EE | Hung-Yu Chien:
Practical anonymous user authentication scheme with security proof.
Computers & Security 27(5-6): 216-223 (2008) |
2007 |
28 | EE | Hung-Yu Chien:
New efficient user authentication scheme with user anonymity facilitating e-commerce applications.
CEC/EEE 2007: 461-464 |
27 | EE | Hung-Yu Chien:
ID-Based Key Agreement with Anonymity for Ad Hoc Networks.
EUC 2007: 333-345 |
26 | EE | Hung-Yu Chien,
Chen-Wei Huang:
A Lightweight RFID Protocol Using Substring.
EUC 2007: 422-431 |
25 | | Hung-Yu Chien,
Yuan-Liang Tang,
Tzu-Hang Hsu:
Secure Fast Pre-authentication Based on IEEE 802.11i.
IMECS 2007: 1325-1330 |
24 | | Hung-Yu Chien,
Yuan-Liang Tang,
Ying-Lun Chen:
A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme.
IMECS 2007: 371-374 |
23 | EE | Hung-Yu Chien:
SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity.
IEEE Trans. Dependable Sec. Comput. 4(4): 337-340 (2007) |
22 | EE | Hung-Yu Chien,
Chen-Wei Huang:
Security of ultra-lightweight RFID authentication protocols and its improvements.
Operating Systems Review 41(4): 83-86 (2007) |
2006 |
21 | | Hung-Yu Chien:
On the Revocation of Proxy Signatures.
IMECS 2006: 160-162 |
20 | | Hung-Yu Chien,
Ru-Yu Lin:
ID-Based E-Will System using Bilinear Pairings.
IMECS 2006: 225-230 |
19 | | Hung-Yu Chien,
Hung-Yi Teng,
Yen-Cheng Chen:
Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks.
IMECS 2006: 258-263 |
18 | EE | Hung-Yu Chien:
Secure Access Control Schemes for RFID Systems with Anonymity.
MDM 2006: 96 |
17 | EE | Hung-Yu Chien,
Ru-Yu Lin:
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing.
SUTC (1) 2006: 520-529 |
2005 |
16 | EE | Hung-Yu Chien,
Che-Hao Chen:
A Remote Authentication Scheme Preserving User Anonymity.
AINA 2005: 245-248 |
15 | | Chin-Ming Hong,
Chih-Ming Chen,
Hung-Yu Chien:
Learning Efficiency Improvement of Fuzzy CMAC by Aitken Acceleration Method.
SEKE 2005: 556-595 |
14 | EE | Hung-Yu Chien:
Comments on ID-based multi-signature with distinguished signing authorities.
Applied Mathematics and Computation 170(2): 1284-1289 (2005) |
13 | EE | Hung-Yu Chien,
Ren-Chiun Wang,
Chou Chen Yang:
Note on Robust and Simple Authentication Protocol.
Comput. J. 48(1): 27-29 (2005) |
2004 |
12 | EE | Hung-Yu Chien:
Efficient Time-Bound Hierarchical Key Assignment Scheme.
IEEE Trans. Knowl. Data Eng. 16(10): 1301-1304 (2004) |
11 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
Solving the invalid signer-verified signature problem and comments on Xia-You group signature.
Journal of Systems and Software 73(3): 369-373 (2004) |
2003 |
10 | EE | Hung-Yu Chien,
Jinn-ke Jan:
Robust and Simple Authentication Protocol.
Comput. J. 46(2): 193-201 (2003) |
9 | EE | Hung-Yu Chien,
Jinn-ke Jan:
New hierarchical assignment without Public Key cryptography.
Computers & Security 22(6): 523-526 (2003) |
8 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
Partially Blind Threshold Signature Based on RSA.
Informatica, Lith. Acad. Sci. 14(2): 155-166 (2003) |
7 | EE | Hung-Yu Chien:
Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function.
Informatica, Lith. Acad. Sci. 14(4): 445-454 (2003) |
6 | EE | Hung-Yu Chien,
Jinn-ke Jan:
A hybrid authentication protocol for large mobile network.
Journal of Systems and Software 67(2): 123-130 (2003) |
2002 |
5 | | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
An Efficient and Practical Solution to Remote Authentication: Smart Card.
Computers & Security 21(4): 372-375 (2002) |
2001 |
4 | | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
RSA-Based Partially Blind Signature with Low Computation.
ICPADS 2001: 385-389 |
3 | EE | Hung-Yu Chien,
Tzong-Chen Wu,
Jinn-ke Jan,
Yuh-Min Tseng:
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett. 80(2): 113-117 (2001) |
2 | EE | Yuh-Min Tseng,
Jinn-ke Jan,
Hung-Yu Chien:
On the Security of Methods for Protecting Password Transmission.
Informatica, Lith. Acad. Sci. 12(3): 469-476 (2001) |
1 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
A modified remote login authentication scheme based on geometric approach.
Journal of Systems and Software 55(3): 287-290 (2001) |