dblp.uni-trier.dewww.uni-trier.de

Jinn-ke Jan

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
41EEChung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan: NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns. Fundam. Inform. 90(1-2): 125-155 (2009)
2007
40EEChung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan: Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360
39EEChin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan: A Secure Authentication Scheme for a Public Terminal Before a Transaction. NBiS 2007: 118-126
38EEHsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan: A simple mobile communication billing system among charged parties. Applied Mathematics and Computation 192(2): 487-495 (2007)
37EERen-Hung Lin, Jinn-ke Jan: An innovative revocation scheme for one-to-many E-services. Electronic Commerce Research and Applications 6(3): 358-363 (2007)
36EERen-Hung Lin, Jinn-ke Jan: A tree-based scheme for security of many-to-many communications. J. High Speed Networks 16(1): 69-79 (2007)
2006
35EEChun-Hua Chen, Jinn-ke Jan, Chao-Hsing Hsu: One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature. ICICIC (3) 2006: 300-303
34EEChung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh: Novel Steganographic Schemes Based on Row-Major Mapping Relation. IIH-MSP 2006: 392-395
2005
33EEYu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen: A novel proxy deposit protocol for e-cash systems. Applied Mathematics and Computation 163(2): 869-877 (2005)
32EEYu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen: A fair and secure mobile billing system. Computer Networks 48(4): 517-524 (2005)
31EEYi-Hwa Chen, Jinn-ke Jan: Enhancement of digital signature with message recovery using self-certified public keys and its variants. Operating Systems Review 39(3): 90-96 (2005)
2004
30EEJinn-ke Jan, Yi-Hwa Chen: A New Efficient MAKEP for Wireless Communications. AINA (2) 2004: 347-350
29 Fuw-Yi Yang, Jinn-ke Jan: A Secure Scheme for Restrictive Partially Blind Signatures. iiWAS 2004
28 Fuw-Yi Yang, Jinn-ke Jan: An Efficient Group Signature Based on the Discrete Logarithm Problem. iiWAS 2004
27EEYu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen: The design of a secure anonymous Internet voting system. Computers & Security 23(4): 330-337 (2004)
26EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: Solving the invalid signer-verified signature problem and comments on Xia-You group signature. Journal of Systems and Software 73(3): 369-373 (2004)
2003
25EEHung-Yu Chien, Jinn-ke Jan: Robust and Simple Authentication Protocol. Comput. J. 46(2): 193-201 (2003)
24EEHung-Yu Chien, Jinn-ke Jan: New hierarchical assignment without Public Key cryptography. Computers & Security 22(6): 523-526 (2003)
23EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: Partially Blind Threshold Signature Based on RSA. Informatica, Lith. Acad. Sci. 14(2): 155-166 (2003)
22EEHung-Yu Chien, Jinn-ke Jan: A hybrid authentication protocol for large mobile network. Journal of Systems and Software 67(2): 123-130 (2003)
2002
21 Jinn-ke Jan, Yu-Yi Chen: A secure anonymous voting protocol with a complete supervision. Comput. Syst. Sci. Eng. 17(4/5): 213-221 (2002)
20 Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4): 372-375 (2002)
19EEYuh-Min Tseng, Jinn-ke Jan: An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs. J. Inf. Sci. Eng. 18(1): 41-46 (2002)
2001
18 Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: RSA-Based Partially Blind Signature with Low Computation. ICPADS 2001: 385-389
17EEWhe Dar Lin, Jinn-ke Jan: A Wireless-based Authentication and Anonymous Channels for Large Scale Area. ISCC 2001: 36-41
16 Yuh-Min Tseng, Jinn-ke Jan: Generalized group-oriented cryptosystem with authenticated sender. Comput. Syst. Sci. Eng. 16(5): 291-294 (2001)
15EEHung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng: Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. Inf. Process. Lett. 80(2): 113-117 (2001)
14EEYuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien: On the Security of Methods for Protecting Password Transmission. Informatica, Lith. Acad. Sci. 12(3): 469-476 (2001)
13EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: A modified remote login authentication scheme based on geometric approach. Journal of Systems and Software 55(3): 287-290 (2001)
1999
12EEJinn-ke Jan, Yuh-Min Tseng: New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. ICPP Workshops 1999: 198-203
11EEYuh-Min Tseng, Jinn-ke Jan: Anonymous conference key distribution systems based on the discrete logarithm problem. Computer Communications 22(8): 749-754 (1999)
10EEYuh-Min Tseng, Jinn-ke Jan: Attacks on Threshold Signature Schemes with Traceable Signers. Inf. Process. Lett. 71(1): 1-4 (1999)
9 Yuh-Min Tseng, Jinn-ke Jan: A Novel ID-based Group Signature. Inf. Sci. 120(1-4): 131-141 (1999)
8EEShiuh-Jeng Wang, Jinn-ke Jan: A displacement addressing method for letter-oriented keys. Journal of Systems and Software 46(1): 77-88 (1999)
1998
7EEYuh-Min Tseng, Jinn-ke Jan: ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. ACSAC 1998: 237-243
6 Yuh-Min Tseng, Jinn-ke Jan: A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. Inf. Sci. 112(1-4): 199-211 (1998)
5EEJinn-ke Jan, Yu-Yi Chen: "Paramita wisdom" password authentication scheme without verification tables. Journal of Systems and Software 42(1): 45-57 (1998)
1997
4EEJinn-ke Jan, Chih-Chang Tai: A secure electronic voting protocol with IC cards. Journal of Systems and Software 39(2): 93-101 (1997)
1996
3EEJinn-ke Jan, Yuh-Min Tseng: On the Security of Image Encryption Method. Inf. Process. Lett. 60(5): 261-265 (1996)
1995
2EEJinn-ke Jan, Min-Jinn Jan: A New Dynamic Access Control Method Using Binary Locks. J. Inf. Sci. Eng. 11(3): 371-389 (1995)
1990
1EEJinn-ke Jan: A single-key access control scheme in information protection systems. Inf. Sci. 51(1): 1-11 (1990)

Coauthor Index

1Chin-Chen Chang [34] [40] [41]
2Chin-Ling Chen [27] [32] [33] [39]
3Chun-Hua Chen [35]
4Yi-Hwa Chen [30] [31]
5Yu-Yi Chen [5] [21] [27] [32] [33] [39]
6Hung-Yu Chien [13] [14] [15] [18] [20] [22] [23] [24] [25] [26]
7Chao-Hsing Hsu [35]
8Min-Shiang Hwang [38]
9Min-Jinn Jan [2]
10Ren-Hung Lin [36] [37]
11Whe Dar Lin [17]
12Hsia-Hung Ou [38]
13Chih-Chang Tai [4]
14Yuh-Min Tseng [3] [6] [7] [9] [10] [11] [12] [13] [14] [15] [16] [18] [19] [20] [23] [26]
15Chung-Chuan Wang [34] [40] [41]
16Shiuh-Jeng Wang [8]
17Tzong-Chen Wu [15]
18Fuw-Yi Yang [28] [29]
19Jieh-Shan Yeh [34]
20Xinpeng Zhang [40]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)