2008 |
26 | EE | Narn-Yih Lee,
Chien-Nan Wu,
Chien-Chih Wang:
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings.
Computers & Electrical Engineering 34(1): 12-20 (2008) |
2007 |
25 | EE | Narn-Yih Lee,
Ching-Chun Wang:
Yet Another Wavelet Watermarking Scheme for Copyright Protection.
CEC/EEE 2007: 421-424 |
24 | EE | Narn-Yih Lee,
Ming-Feng Lee:
Web Metering Scheme Based on the Bilinear Pairings.
IEICE Transactions 90-D(3): 688-691 (2007) |
23 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem.
Informatica, Lith. Acad. Sci. 18(1): 61-66 (2007) |
2005 |
22 | EE | Narn-Yih Lee,
Ming-Feng Lee:
The security of a strong proxy signature scheme with proxy signer privacy protection.
Applied Mathematics and Computation 161(3): 807-812 (2005) |
21 | EE | Narn-Yih Lee,
Shu-Ya Yang:
The design of integrating subliminal channel with access control.
Applied Mathematics and Computation 171(1): 573-580 (2005) |
20 | EE | Narn-Yih Lee,
Jung-Chic Chen:
Improvement of One-Time Password Authentication Scheme Using Smart Cards.
IEICE Transactions 88-B(9): 3765-3767 (2005) |
19 | EE | Narn-Yih Lee,
Chien-Chih Wang:
Verifiable Oblivious Transfer Protocol.
IEICE Transactions 88-D(12): 2890-2892 (2005) |
2004 |
18 | EE | Narn-Yih Lee,
Pei-Hsiu Ho:
Convertible undeniable signature with subliminal channels.
Applied Mathematics and Computation 158(1): 169-175 (2004) |
17 | EE | Narn-Yih Lee,
Chien-Nan Wu:
Improved authentication key exchange protocol without using one-way hash function.
Operating Systems Review 38(2): 85-92 (2004) |
16 | EE | Narn-Yih Lee,
Ming-Feng Lee:
Comments on multiparty key exchange scheme.
Operating Systems Review 38(4): 70-73 (2004) |
2001 |
15 | EE | Narn-Yih Lee,
Tzonelih Hwang:
New Multistage Secret Sharing Scheme Based on Factorization Problem.
J. Inf. Sci. Eng. 17(3): 525-529 (2001) |
2000 |
14 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chuan-Ming Li:
(t, n) Threshold Untraceable Signatures.
J. Inf. Sci. Eng. 16(6): 835-846 (2000) |
1999 |
13 | EE | Marc Joye,
Seungjoo Kim,
Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes.
ISW 1999: 271-275 |
12 | EE | Marc Joye,
Narn-Yih Lee,
Tzonelih Hwang:
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.
ISW 1999: 47-51 |
11 | | Narn-Yih Lee,
Tzonelih Hwang:
Comments on ``Dynamic Key Management Schemes for Access control in a Hierarchy''.
Computer Communications 22(1): 87-89 (1999) |
10 | EE | Narn-Yih Lee,
Tzonelih Hwang:
On the security of fair blind signature scheme using oblivious transfer.
Computer Communications 22(3): 287-290 (1999) |
9 | EE | Narn-Yih Lee,
Tzonelih Hwang:
Group-oriented undeniable signature schemes with a trusted center.
Computer Communications 22(8): 730-734 (1999) |
8 | EE | Chih-Hung Wang,
Tzonelih Hwang,
Narn-Yih Lee:
Comments on Two Group Signatures.
Inf. Process. Lett. 69(2): 95-97 (1999) |
7 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Inf. Process. Lett. 70(2): 79-81 (1999) |
1998 |
6 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
On Zhang's Nonrepudiable Proxy Signature Schemes.
ACISP 1998: 415-422 |
1995 |
5 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chih-Hung Wang,
Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system.
Computer Communications 18(12): 978-981 (1995) |
4 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chuan-Ming Li,
Ming-Yung Ko,
Yung-Hsiang Chen:
Two Attacks on Neuman-Stubblebine Authentication Protocols.
Inf. Process. Lett. 53(2): 103-107 (1995) |
1994 |
3 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.
EUROCRYPT 1994: 194-204 |
2 | EE | Narn-Yih Lee,
Tzonelih Hwang:
A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy.
J. Inf. Sci. Eng. 11(4): 601-610 (1994) |
1993 |
1 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Remark on the Threshold RSA Signature Scheme.
CRYPTO 1993: 413-420 |