dblp.uni-trier.dewww.uni-trier.de

Narn-Yih Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
26EENarn-Yih Lee, Chien-Nan Wu, Chien-Chih Wang: Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Computers & Electrical Engineering 34(1): 12-20 (2008)
2007
25EENarn-Yih Lee, Ching-Chun Wang: Yet Another Wavelet Watermarking Scheme for Copyright Protection. CEC/EEE 2007: 421-424
24EENarn-Yih Lee, Ming-Feng Lee: Web Metering Scheme Based on the Bilinear Pairings. IEICE Transactions 90-D(3): 688-691 (2007)
23EEChuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee: Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem. Informatica, Lith. Acad. Sci. 18(1): 61-66 (2007)
2005
22EENarn-Yih Lee, Ming-Feng Lee: The security of a strong proxy signature scheme with proxy signer privacy protection. Applied Mathematics and Computation 161(3): 807-812 (2005)
21EENarn-Yih Lee, Shu-Ya Yang: The design of integrating subliminal channel with access control. Applied Mathematics and Computation 171(1): 573-580 (2005)
20EENarn-Yih Lee, Jung-Chic Chen: Improvement of One-Time Password Authentication Scheme Using Smart Cards. IEICE Transactions 88-B(9): 3765-3767 (2005)
19EENarn-Yih Lee, Chien-Chih Wang: Verifiable Oblivious Transfer Protocol. IEICE Transactions 88-D(12): 2890-2892 (2005)
2004
18EENarn-Yih Lee, Pei-Hsiu Ho: Convertible undeniable signature with subliminal channels. Applied Mathematics and Computation 158(1): 169-175 (2004)
17EENarn-Yih Lee, Chien-Nan Wu: Improved authentication key exchange protocol without using one-way hash function. Operating Systems Review 38(2): 85-92 (2004)
16EENarn-Yih Lee, Ming-Feng Lee: Comments on multiparty key exchange scheme. Operating Systems Review 38(4): 70-73 (2004)
2001
15EENarn-Yih Lee, Tzonelih Hwang: New Multistage Secret Sharing Scheme Based on Factorization Problem. J. Inf. Sci. Eng. 17(3): 525-529 (2001)
2000
14EENarn-Yih Lee, Tzonelih Hwang, Chuan-Ming Li: (t, n) Threshold Untraceable Signatures. J. Inf. Sci. Eng. 16(6): 835-846 (2000)
1999
13EEMarc Joye, Seungjoo Kim, Narn-Yih Lee: Cryptanalysis of Two Group Signature Schemes. ISW 1999: 271-275
12EEMarc Joye, Narn-Yih Lee, Tzonelih Hwang: On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. ISW 1999: 47-51
11 Narn-Yih Lee, Tzonelih Hwang: Comments on ``Dynamic Key Management Schemes for Access control in a Hierarchy''. Computer Communications 22(1): 87-89 (1999)
10EENarn-Yih Lee, Tzonelih Hwang: On the security of fair blind signature scheme using oblivious transfer. Computer Communications 22(3): 287-290 (1999)
9EENarn-Yih Lee, Tzonelih Hwang: Group-oriented undeniable signature schemes with a trusted center. Computer Communications 22(8): 730-734 (1999)
8EEChih-Hung Wang, Tzonelih Hwang, Narn-Yih Lee: Comments on Two Group Signatures. Inf. Process. Lett. 69(2): 95-97 (1999)
7EENarn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang: The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures. Inf. Process. Lett. 70(2): 79-81 (1999)
1998
6EENarn-Yih Lee, Tzonelih Hwang, Chih-Hung Wang: On Zhang's Nonrepudiable Proxy Signature Schemes. ACISP 1998: 415-422
1995
5EETzonelih Hwang, Narn-Yih Lee, Chih-Hung Wang, Ming-Yung Ko: On the security of Wu and Yeh's conference key distribution system. Computer Communications 18(12): 978-981 (1995)
4EETzonelih Hwang, Narn-Yih Lee, Chuan-Ming Li, Ming-Yung Ko, Yung-Hsiang Chen: Two Attacks on Neuman-Stubblebine Authentication Protocols. Inf. Process. Lett. 53(2): 103-107 (1995)
1994
3EEChuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee: Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders. EUROCRYPT 1994: 194-204
2EENarn-Yih Lee, Tzonelih Hwang: A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy. J. Inf. Sci. Eng. 11(4): 601-610 (1994)
1993
1EEChuan-Ming Li, Tzonelih Hwang, Narn-Yih Lee: Remark on the Threshold RSA Signature Scheme. CRYPTO 1993: 413-420

Coauthor Index

1Jung-Chic Chen [20]
2Yung-Hsiang Chen [4]
3Pei-Hsiu Ho [18]
4Tzonelih Hwang [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [14] [15] [23]
5Marc Joye [12] [13]
6Seungjoo Kim [13]
7Ming-Yung Ko [4] [5]
8Ming-Feng Lee [16] [22] [24]
9Chuan-Ming Li [1] [3] [4] [14] [23]
10Chien-Chih Wang [19] [26]
11Chih-Hung Wang [5] [6] [7] [8]
12Ching-Chun Wang [25]
13Chien-Nan Wu [17] [26]
14Shu-Ya Yang [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)