dblp.uni-trier.dewww.uni-trier.de

Yu-Fang Chung

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EEYu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang: Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. AINA Workshops 2008: 650-655
16EEYu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen: Access control in user hierarchy based on elliptic curve cryptosystem. Inf. Sci. 178(1): 230-243 (2008)
15EEYu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen: Unconditionally secure cryptosystems based on quantum cryptography. Inf. Sci. 178(8): 2044-2058 (2008)
14EEYu-Fang Chung, Kuo-Hsuan Huang, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen: Bidder-anonymous English auction scheme with privacy and public verifiability. Journal of Systems and Software 81(1): 113-119 (2008)
2006
13EEYu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen: A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. CIS 2006: 502-512
12EEYu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen: Anonymous Signcryption in Ring Signature Scheme over Elliptic Curve Cryptosystem. JCIS 2006
11EEYu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen: Unconditionally Secure Cryptosystem Based on Quantum Cryptography. JCIS 2006
10EEYu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen: Threshold Signature Scheme Resistible for Conspiracy Attack. PDCAT 2006: 479-483
2004
9EETzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian: A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. COMPSAC 2004: 396-397
8EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. EEE 2004: 106-112
7EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. EEE 2004: 569-572
6EETzer-Shyong Chen, Yu-Fang Chung, Kuo-Hsuan Huang: A traceable proxy multisignature scheme based on the elliptic curve cryptosystem. Applied Mathematics and Computation 159(1): 137-145 (2004)
5EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: Modified cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme. Applied Mathematics and Computation 159(1): 147-155 (2004)
4EETzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung: Digital Multi-Signature Scheme Based on the Elliptic Curve Cryptosystem. J. Comput. Sci. Technol. 19(4): 570- (2004)
2003
3EETzer-Shyong Chen, Yu-Fang Chung, Gwo-Shiuan Huang: Efficient proxy multisignature schemes based on the elliptic curve cryptosystem. Computers & Security 22(6): 527-534 (2003)
2EETzer-Shyong Chen, Yu-Fang Chung: An Efficient Key Assignment Scheme Based on One-Way Hash Function in a User Hierarchy. J. Comput. Sci. Technol. 18(2): 210-213 (2003)
2002
1 Tzer-Shyong Chen, Yu-Fang Chung: Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. Computers & Security 21(6): 565-570 (2002)

Coauthor Index

1Tzer-Shyong Chen [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17]
2Gwo-Shiuan Huang [3]
3Kuo-Hsuan Huang [4] [5] [6] [7] [8] [14]
4Feipei Lai [10] [11] [12] [13] [14] [16]
5Hsiu-Hui Lee [14] [16]
6Chia-Hui Liu [10] [17]
7Chang-Sin Tian [9]
8Tzu-Chi Wang [17]
9Zhen Yu Wu [11] [12] [13] [15]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)