dblp.uni-trier.dewww.uni-trier.de

Hung-Yu Chien

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
34EEHung-Yu Chien, Tzu-Hang Hsu: Secure fast WLAN handoff using time-bound delegated authentication. Int. J. Communication Systems 22(5): 565-584 (2009)
2008
33EEHung-Yu Chien, Rung Ching Chen, Annie Shen: Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space. AINA 2008: 327-333
32EEHung-Yu Chien, Tzong-Chen Wu: Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. ISI Workshops 2008: 69-76
31EEHung-Yu Chien, Ru-Yu Lin: Improved ID-based security framework for ad hoc network. Ad Hoc Networks 6(1): 47-60 (2008)
30EEHung-Yu Chien: Selectively Convertible Authenticated Encryption in the Random Oracle Model. Comput. J. 51(4): 419-434 (2008)
29EEHung-Yu Chien: Practical anonymous user authentication scheme with security proof. Computers & Security 27(5-6): 216-223 (2008)
2007
28EEHung-Yu Chien: New efficient user authentication scheme with user anonymity facilitating e-commerce applications. CEC/EEE 2007: 461-464
27EEHung-Yu Chien: ID-Based Key Agreement with Anonymity for Ad Hoc Networks. EUC 2007: 333-345
26EEHung-Yu Chien, Chen-Wei Huang: A Lightweight RFID Protocol Using Substring. EUC 2007: 422-431
25 Hung-Yu Chien, Yuan-Liang Tang, Tzu-Hang Hsu: Secure Fast Pre-authentication Based on IEEE 802.11i. IMECS 2007: 1325-1330
24 Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen: A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. IMECS 2007: 371-374
23EEHung-Yu Chien: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Trans. Dependable Sec. Comput. 4(4): 337-340 (2007)
22EEHung-Yu Chien, Chen-Wei Huang: Security of ultra-lightweight RFID authentication protocols and its improvements. Operating Systems Review 41(4): 83-86 (2007)
2006
21 Hung-Yu Chien: On the Revocation of Proxy Signatures. IMECS 2006: 160-162
20 Hung-Yu Chien, Ru-Yu Lin: ID-Based E-Will System using Bilinear Pairings. IMECS 2006: 225-230
19 Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen: Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks. IMECS 2006: 258-263
18EEHung-Yu Chien: Secure Access Control Schemes for RFID Systems with Anonymity. MDM 2006: 96
17EEHung-Yu Chien, Ru-Yu Lin: Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing. SUTC (1) 2006: 520-529
2005
16EEHung-Yu Chien, Che-Hao Chen: A Remote Authentication Scheme Preserving User Anonymity. AINA 2005: 245-248
15 Chin-Ming Hong, Chih-Ming Chen, Hung-Yu Chien: Learning Efficiency Improvement of Fuzzy CMAC by Aitken Acceleration Method. SEKE 2005: 556-595
14EEHung-Yu Chien: Comments on ID-based multi-signature with distinguished signing authorities. Applied Mathematics and Computation 170(2): 1284-1289 (2005)
13EEHung-Yu Chien, Ren-Chiun Wang, Chou Chen Yang: Note on Robust and Simple Authentication Protocol. Comput. J. 48(1): 27-29 (2005)
2004
12EEHung-Yu Chien: Efficient Time-Bound Hierarchical Key Assignment Scheme. IEEE Trans. Knowl. Data Eng. 16(10): 1301-1304 (2004)
11EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: Solving the invalid signer-verified signature problem and comments on Xia-You group signature. Journal of Systems and Software 73(3): 369-373 (2004)
2003
10EEHung-Yu Chien, Jinn-ke Jan: Robust and Simple Authentication Protocol. Comput. J. 46(2): 193-201 (2003)
9EEHung-Yu Chien, Jinn-ke Jan: New hierarchical assignment without Public Key cryptography. Computers & Security 22(6): 523-526 (2003)
8EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: Partially Blind Threshold Signature Based on RSA. Informatica, Lith. Acad. Sci. 14(2): 155-166 (2003)
7EEHung-Yu Chien: Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function. Informatica, Lith. Acad. Sci. 14(4): 445-454 (2003)
6EEHung-Yu Chien, Jinn-ke Jan: A hybrid authentication protocol for large mobile network. Journal of Systems and Software 67(2): 123-130 (2003)
2002
5 Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4): 372-375 (2002)
2001
4 Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: RSA-Based Partially Blind Signature with Low Computation. ICPADS 2001: 385-389
3EEHung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng: Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. Inf. Process. Lett. 80(2): 113-117 (2001)
2EEYuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien: On the Security of Methods for Protecting Password Transmission. Informatica, Lith. Acad. Sci. 12(3): 469-476 (2001)
1EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: A modified remote login authentication scheme based on geometric approach. Journal of Systems and Software 55(3): 287-290 (2001)

Coauthor Index

1Che-Hao Chen [16]
2Chih-Ming Chen [15]
3Rung Ching Chen [33]
4Yen-Cheng Chen [19]
5Ying-Lun Chen [24]
6Chin-Ming Hong [15]
7Tzu-Hang Hsu [25] [34]
8Chen-Wei Huang [22] [26]
9Jinn-ke Jan [1] [2] [3] [4] [5] [6] [8] [9] [10] [11]
10Ru-Yu Lin [17] [20] [31]
11Annie Shen [33]
12Yuan-Liang Tang [24] [25]
13Hung-Yi Teng [19]
14Yuh-Min Tseng [1] [2] [3] [4] [5] [8] [11]
15Ren-Chiun Wang [13]
16Tzong-Chen Wu [3] [32]
17Chou Chen Yang [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)