| 2008 |
| 26 | EE | Narn-Yih Lee,
Chien-Nan Wu,
Chien-Chih Wang:
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings.
Computers & Electrical Engineering 34(1): 12-20 (2008) |
| 2007 |
| 25 | EE | Narn-Yih Lee,
Ching-Chun Wang:
Yet Another Wavelet Watermarking Scheme for Copyright Protection.
CEC/EEE 2007: 421-424 |
| 24 | EE | Narn-Yih Lee,
Ming-Feng Lee:
Web Metering Scheme Based on the Bilinear Pairings.
IEICE Transactions 90-D(3): 688-691 (2007) |
| 23 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem.
Informatica, Lith. Acad. Sci. 18(1): 61-66 (2007) |
| 2005 |
| 22 | EE | Narn-Yih Lee,
Ming-Feng Lee:
The security of a strong proxy signature scheme with proxy signer privacy protection.
Applied Mathematics and Computation 161(3): 807-812 (2005) |
| 21 | EE | Narn-Yih Lee,
Shu-Ya Yang:
The design of integrating subliminal channel with access control.
Applied Mathematics and Computation 171(1): 573-580 (2005) |
| 20 | EE | Narn-Yih Lee,
Jung-Chic Chen:
Improvement of One-Time Password Authentication Scheme Using Smart Cards.
IEICE Transactions 88-B(9): 3765-3767 (2005) |
| 19 | EE | Narn-Yih Lee,
Chien-Chih Wang:
Verifiable Oblivious Transfer Protocol.
IEICE Transactions 88-D(12): 2890-2892 (2005) |
| 2004 |
| 18 | EE | Narn-Yih Lee,
Pei-Hsiu Ho:
Convertible undeniable signature with subliminal channels.
Applied Mathematics and Computation 158(1): 169-175 (2004) |
| 17 | EE | Narn-Yih Lee,
Chien-Nan Wu:
Improved authentication key exchange protocol without using one-way hash function.
Operating Systems Review 38(2): 85-92 (2004) |
| 16 | EE | Narn-Yih Lee,
Ming-Feng Lee:
Comments on multiparty key exchange scheme.
Operating Systems Review 38(4): 70-73 (2004) |
| 2001 |
| 15 | EE | Narn-Yih Lee,
Tzonelih Hwang:
New Multistage Secret Sharing Scheme Based on Factorization Problem.
J. Inf. Sci. Eng. 17(3): 525-529 (2001) |
| 2000 |
| 14 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chuan-Ming Li:
(t, n) Threshold Untraceable Signatures.
J. Inf. Sci. Eng. 16(6): 835-846 (2000) |
| 1999 |
| 13 | EE | Marc Joye,
Seungjoo Kim,
Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes.
ISW 1999: 271-275 |
| 12 | EE | Marc Joye,
Narn-Yih Lee,
Tzonelih Hwang:
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.
ISW 1999: 47-51 |
| 11 | | Narn-Yih Lee,
Tzonelih Hwang:
Comments on ``Dynamic Key Management Schemes for Access control in a Hierarchy''.
Computer Communications 22(1): 87-89 (1999) |
| 10 | EE | Narn-Yih Lee,
Tzonelih Hwang:
On the security of fair blind signature scheme using oblivious transfer.
Computer Communications 22(3): 287-290 (1999) |
| 9 | EE | Narn-Yih Lee,
Tzonelih Hwang:
Group-oriented undeniable signature schemes with a trusted center.
Computer Communications 22(8): 730-734 (1999) |
| 8 | EE | Chih-Hung Wang,
Tzonelih Hwang,
Narn-Yih Lee:
Comments on Two Group Signatures.
Inf. Process. Lett. 69(2): 95-97 (1999) |
| 7 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Inf. Process. Lett. 70(2): 79-81 (1999) |
| 1998 |
| 6 | EE | Narn-Yih Lee,
Tzonelih Hwang,
Chih-Hung Wang:
On Zhang's Nonrepudiable Proxy Signature Schemes.
ACISP 1998: 415-422 |
| 1995 |
| 5 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chih-Hung Wang,
Ming-Yung Ko:
On the security of Wu and Yeh's conference key distribution system.
Computer Communications 18(12): 978-981 (1995) |
| 4 | EE | Tzonelih Hwang,
Narn-Yih Lee,
Chuan-Ming Li,
Ming-Yung Ko,
Yung-Hsiang Chen:
Two Attacks on Neuman-Stubblebine Authentication Protocols.
Inf. Process. Lett. 53(2): 103-107 (1995) |
| 1994 |
| 3 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.
EUROCRYPT 1994: 194-204 |
| 2 | EE | Narn-Yih Lee,
Tzonelih Hwang:
A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy.
J. Inf. Sci. Eng. 11(4): 601-610 (1994) |
| 1993 |
| 1 | EE | Chuan-Ming Li,
Tzonelih Hwang,
Narn-Yih Lee:
Remark on the Threshold RSA Signature Scheme.
CRYPTO 1993: 413-420 |