2008 |
29 | EE | Yuh-Min Tseng,
Tsu-Yang Wu,
Jui-Di Wu:
A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards.
Informatica, Lith. Acad. Sci. 19(2): 285-302 (2008) |
2007 |
28 | EE | Yuh-Min Tseng,
Tsu-Yang Wu,
Jui-Di Wu:
A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices.
COMPSAC (2) 2007: 700-710 |
27 | EE | Yuh-Min Tseng:
A secure authenticated group key agreement protocol for resource-limited mobile devices.
Comput. J. 50(1): 41-52 (2007) |
26 | EE | Yuh-Min Tseng:
A resource-constrained group key agreement protocol for imbalanced wireless networks.
Computers & Security 26(4): 331-337 (2007) |
25 | EE | Yuh-Min Tseng:
An Efficient Two-Party Identity-Based Key Exchange Protocol.
Informatica, Lith. Acad. Sci. 18(1): 125-136 (2007) |
24 | EE | Yuh-Min Tseng:
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks.
Int. Journal of Network Management 17(1): 3-15 (2007) |
23 | EE | Yuh-Min Tseng:
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy.
Journal of Systems and Software 80(7): 1091-1101 (2007) |
2006 |
22 | EE | Yuh-Min Tseng:
On the Security of Two Group Key Agreement Protocols for Mobile Devices.
MDM 2006: 97 |
2005 |
21 | EE | Yuh-Min Tseng:
A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants.
Comput. J. 48(4): 480-487 (2005) |
20 | EE | Yuh-Min Tseng:
An Improved Conference-Key Agreement Protocol with Forward Secrecy.
Informatica, Lith. Acad. Sci. 16(2): 275-284 (2005) |
19 | EE | Yuh-Min Tseng:
Efficient authenticated key agreement protocols resistant to a denial-of-service attack.
Int. Journal of Network Management 15(3): 193-202 (2005) |
2004 |
18 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
Solving the invalid signer-verified signature problem and comments on Xia-You group signature.
Journal of Systems and Software 73(3): 369-373 (2004) |
2003 |
17 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
Partially Blind Threshold Signature Based on RSA.
Informatica, Lith. Acad. Sci. 14(2): 155-166 (2003) |
16 | EE | Yuh-Min Tseng:
A scalable key-management scheme with minimizing key storage for secure group communications.
Int. Journal of Network Management 13(6): 419-425 (2003) |
2002 |
15 | | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
An Efficient and Practical Solution to Remote Authentication: Smart Card.
Computers & Security 21(4): 372-375 (2002) |
14 | EE | Yuh-Min Tseng:
Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications.
Informatica, Lith. Acad. Sci. 13(3): 369-376 (2002) |
13 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs.
J. Inf. Sci. Eng. 18(1): 41-46 (2002) |
2001 |
12 | | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
RSA-Based Partially Blind Signature with Low Computation.
ICPADS 2001: 385-389 |
11 | | Yuh-Min Tseng,
Jinn-ke Jan:
Generalized group-oriented cryptosystem with authenticated sender.
Comput. Syst. Sci. Eng. 16(5): 291-294 (2001) |
10 | EE | Hung-Yu Chien,
Tzong-Chen Wu,
Jinn-ke Jan,
Yuh-Min Tseng:
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett. 80(2): 113-117 (2001) |
9 | EE | Yuh-Min Tseng,
Jinn-ke Jan,
Hung-Yu Chien:
On the Security of Methods for Protecting Password Transmission.
Informatica, Lith. Acad. Sci. 12(3): 469-476 (2001) |
8 | EE | Hung-Yu Chien,
Jinn-ke Jan,
Yuh-Min Tseng:
A modified remote login authentication scheme based on geometric approach.
Journal of Systems and Software 55(3): 287-290 (2001) |
1999 |
7 | EE | Jinn-ke Jan,
Yuh-Min Tseng:
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem.
ICPP Workshops 1999: 198-203 |
6 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
Anonymous conference key distribution systems based on the discrete logarithm problem.
Computer Communications 22(8): 749-754 (1999) |
5 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
Attacks on Threshold Signature Schemes with Traceable Signers.
Inf. Process. Lett. 71(1): 1-4 (1999) |
4 | | Yuh-Min Tseng,
Jinn-ke Jan:
A Novel ID-based Group Signature.
Inf. Sci. 120(1-4): 131-141 (1999) |
1998 |
3 | EE | Yuh-Min Tseng,
Jinn-ke Jan:
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System.
ACSAC 1998: 237-243 |
2 | | Yuh-Min Tseng,
Jinn-ke Jan:
A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy.
Inf. Sci. 112(1-4): 199-211 (1998) |
1996 |
1 | EE | Jinn-ke Jan,
Yuh-Min Tseng:
On the Security of Image Encryption Method.
Inf. Process. Lett. 60(5): 261-265 (1996) |