2009 |
41 | EE | Chung-Chuan Wang,
Chin-Chen Chang,
Jinn-ke Jan:
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Inform. 90(1-2): 125-155 (2009) |
2007 |
40 | EE | Chung-Chuan Wang,
Chin-Chen Chang,
Xinpeng Zhang,
Jinn-ke Jan:
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
MCAM 2007: 351-360 |
39 | EE | Chin-Ling Chen,
Yu-Yi Chen,
Jinn-ke Jan:
A Secure Authentication Scheme for a Public Terminal Before a Transaction.
NBiS 2007: 118-126 |
38 | EE | Hsia-Hung Ou,
Min-Shiang Hwang,
Jinn-ke Jan:
A simple mobile communication billing system among charged parties.
Applied Mathematics and Computation 192(2): 487-495 (2007) |
37 | EE | Ren-Hung Lin,
Jinn-ke Jan:
An innovative revocation scheme for one-to-many E-services.
Electronic Commerce Research and Applications 6(3): 358-363 (2007) |
36 | EE | Ren-Hung Lin,
Jinn-ke Jan:
A tree-based scheme for security of many-to-many communications.
J. High Speed Networks 16(1): 69-79 (2007) |
2006 |
35 | EE | Chun-Hua Chen,
Jinn-ke Jan,
Chao-Hsing Hsu:
One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature.
ICICIC (3) 2006: 300-303 |
34 | EE | Chung-Chuan Wang,
Chin-Chen Chang,
Jinn-ke Jan,
Jieh-Shan Yeh:
Novel Steganographic Schemes Based on Row-Major Mapping Relation.
IIH-MSP 2006: 392-395 |
2005 |
33 | EE | Yu-Yi Chen,
Jinn-ke Jan,
Chin-Ling Chen:
A novel proxy deposit protocol for e-cash systems.
Applied Mathematics and Computation 163(2): 869-877 (2005) |
32 | EE | Yu-Yi Chen,
Jinn-ke Jan,
Chin-Ling Chen:
A fair and secure mobile billing system.
Computer Networks 48(4): 517-524 (2005) |
31 | EE | Yi-Hwa Chen,
Jinn-ke Jan:
Enhancement of digital signature with message recovery using self-certified public keys and its variants.
Operating Systems Review 39(3): 90-96 (2005) |
2004 |
30 | EE | Jinn-ke Jan,
Yi-Hwa Chen:
A New Efficient MAKEP for Wireless Communications.
AINA (2) 2004: 347-350 |
29 | | Fuw-Yi Yang,
Jinn-ke Jan:
A Secure Scheme for Restrictive Partially Blind Signatures.
iiWAS 2004 |
28 | | Fuw-Yi Yang,
Jinn-ke Jan:
An Efficient Group Signature Based on the Discrete Logarithm Problem.
iiWAS 2004 |
27 | EE | Yu-Yi Chen,
Jinn-ke Jan,
Chin-Ling Chen:
The design of a secure anonymous Internet voting system.
Computers & Security 23(4): 330-337 (2004) |
26 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
Solving the invalid signer-verified signature problem and comments on Xia-You group signature.
Journal of Systems and Software 73(3): 369-373 (2004) |
2003 |
25 | EE | Hung-Yu Chien,
Jinn-ke Jan:
Robust and Simple Authentication Protocol.
Comput. J. 46(2): 193-201 (2003) |
24 | EE | Hung-Yu Chien,
Jinn-ke Jan:
New hierarchical assignment without Public Key cryptography.
Computers & Security 22(6): 523-526 (2003) |
23 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
Partially Blind Threshold Signature Based on RSA.
Informatica, Lith. Acad. Sci. 14(2): 155-166 (2003) |
22 | EE | Hung-Yu Chien,
Jinn-ke Jan:
A hybrid authentication protocol for large mobile network.
Journal of Systems and Software 67(2): 123-130 (2003) |
2002 |
21 | | Jinn-ke Jan,
Yu-Yi Chen:
A secure anonymous voting protocol with a complete supervision.
Comput. Syst. Sci. Eng. 17(4/5): 213-221 (2002) |
20 | | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
An Efficient and Practical Solution to Remote Authentication: Smart Card.
Computers & Security 21(4): 372-375 (2002) |
19 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs.
J. Inf. Sci. Eng. 18(1): 41-46 (2002) |
2001 |
18 | | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
RSA-Based Partially Blind Signature with Low Computation.
ICPADS 2001: 385-389 |
17 | EE | Whe Dar Lin,
Jinn-ke Jan:
A Wireless-based Authentication and Anonymous Channels for Large Scale Area.
ISCC 2001: 36-41 |
16 | | Yuh-Min Tseng,
Jinn-ke Jan:
Generalized group-oriented cryptosystem with authenticated sender.
Comput. Syst. Sci. Eng. 16(5): 291-294 (2001) |
15 | EE | Hung-Yu Chien,
Tzong-Chen Wu,
Jinn-ke Jan,
Yuh-Min Tseng:
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett. 80(2): 113-117 (2001) |
14 | EE | Yuh-Min Tseng,
Jinn-ke Jan,
Hung-Yu Chien:
On the Security of Methods for Protecting Password Transmission.
Informatica, Lith. Acad. Sci. 12(3): 469-476 (2001) |
13 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
A modified remote login authentication scheme based on geometric approach.
Journal of Systems and Software 55(3): 287-290 (2001) |
1999 |
12 | EE | Jinn-ke Jan,
Yuh-Min Tseng:
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem.
ICPP Workshops 1999: 198-203 |
11 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
Anonymous conference key distribution systems based on the discrete logarithm problem.
Computer Communications 22(8): 749-754 (1999) |
10 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
Attacks on Threshold Signature Schemes with Traceable Signers.
Inf. Process. Lett. 71(1): 1-4 (1999) |
9 | | Yuh-Min Tseng,
Jinn-ke Jan:
A Novel ID-based Group Signature.
Inf. Sci. 120(1-4): 131-141 (1999) |
8 | EE | Shiuh-Jeng Wang,
Jinn-ke Jan:
A displacement addressing method for letter-oriented keys.
Journal of Systems and Software 46(1): 77-88 (1999) |
1998 |
7 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System.
ACSAC 1998: 237-243 |
6 | | Yuh-Min Tseng,
Jinn-ke Jan:
A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy.
Inf. Sci. 112(1-4): 199-211 (1998) |
5 | EE | Jinn-ke Jan,
Yu-Yi Chen:
"Paramita wisdom" password authentication scheme without verification tables.
Journal of Systems and Software 42(1): 45-57 (1998) |
1997 |
4 | EE | Jinn-ke Jan,
Chih-Chang Tai:
A secure electronic voting protocol with IC cards.
Journal of Systems and Software 39(2): 93-101 (1997) |
1996 |
3 | EE | Jinn-ke Jan,
Yuh-Min Tseng:
On the Security of Image Encryption Method.
Inf. Process. Lett. 60(5): 261-265 (1996) |
1995 |
2 | EE | Jinn-ke Jan,
Min-Jinn Jan:
A New Dynamic Access Control Method Using Binary Locks.
J. Inf. Sci. Eng. 11(3): 371-389 (1995) |
1990 |
1 | EE | Jinn-ke Jan:
A single-key access control scheme in information protection systems.
Inf. Sci. 51(1): 1-11 (1990) |