2009 |
28 | EE | Yi-Shiung Yeh,
Ting-Yu Huang,
Han-Yu Lin,
Yu-Hao Chang:
A Study on Parallel RSA Factorization.
JCP 4(2): 112-118 (2009) |
2006 |
27 | EE | Chuan Chi Wang,
Min-Chih Kao,
Yi-Shiung Yeh:
Forgery attack on the RPC incremental unforgeable encryption scheme.
ASIACCS 2006: 361 |
26 | EE | Chin Ching Chiu,
Chung-Hsien Hsu,
Yi-Shiung Yeh:
A genetic algorithm for reliability-oriented task assignment with k/spl tilde/ duplications in distributed systems.
IEEE Transactions on Reliability 55(1): 105-117 (2006) |
25 | EE | I-Te Chen,
Ming-Hsin Chang,
Yi-Shiung Yeh:
Design of Proxy Signature in the Digital Signature Algorithm (DSA).
J. Inf. Sci. Eng. 22(4): 965-973 (2006) |
24 | EE | Lin-Chuan Wu,
Yi-Shiung Yeh,
Tsann-Shyong Liu:
Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes.
Journal of Systems and Software 79(2): 176-179 (2006) |
2005 |
23 | EE | Ren-Junn Hwang,
Feng-Fu Su,
Yi-Shiung Yeh,
Chia-Yao Chen:
An Efficient Decryption Method for RSA Cryptosystem.
AINA 2005: 585-590 |
22 | EE | Ming-Hsin Chang,
Yi-Shiung Yeh:
Improving Lamport one-time signature scheme.
Applied Mathematics and Computation 167(1): 118-124 (2005) |
21 | EE | Lin-Chuan Wu,
Yi-Shiung Yeh:
Comment on traceability on RSA-based partially signature with low computation.
Applied Mathematics and Computation 170(2): 1344-1348 (2005) |
2002 |
20 | EE | Chin Ching Chiu,
Yi-Shiung Yeh,
Jue-Sam Chou:
A fast algorithm for reliability-oriented task assignment in a distributed system.
Computer Communications 25(17): 1622-1630 (2002) |
19 | EE | Jue-Sam Chou,
Yi-Shiung Yeh:
Mental poker game based on a bit commitment scheme through network.
Computer Networks 38(2): 247-255 (2002) |
18 | EE | Yi-Shiung Yeh,
Wei-Shen Lai,
Chung-Jaye Cheng:
Applying lightweight directory access protocol service on session certification authority.
Computer Networks 38(5): 675-692 (2002) |
17 | EE | Yi-Shiung Yeh,
Ching-Hung Hsu:
An Extended DES.
J. Inf. Sci. Eng. 18(3): 349-365 (2002) |
16 | EE | Yi-Shiung Yeh,
Ching-Hung Hsu:
An Extended DES.
J. Inf. Sci. Eng. 18(3): 349-365 (2002) |
2001 |
15 | | Yi-Shiung Yeh,
Chin Ching Chiu:
A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems.
Computer Communications 24(3-4): 422-433 (2001) |
14 | EE | Ching-Yun Lee,
Yi-Shiung Yeh,
Deng-Jyi Chen:
Model calculations to estimate the probability of secret reconstruction in computer environments.
Inf. Manag. Comput. Security 9(1): 13-20 (2001) |
2000 |
13 | | Chun-I Fan,
Wei-Kuei Chen,
Yi-Shiung Yeh:
A Randomization Enhanced Scheme for Chaum's Blind Signature.
ICDCS Workshop on Internet 2000: A5-A8 |
12 | EE | Chin Ching Chiu,
Yi-Shiung Yeh,
Ruey-Shun Chen:
Reduction of the total execution time to achieve the optimal k-node reliability of distributed computing systems using a novel heuristic algorithm.
Computer Communications 23(1): 84-91 (2000) |
11 | EE | Chun-I Fan,
Wei-Kuei Chen,
Yi-Shiung Yeh:
Randomization enhanced Chaum's blind signature scheme.
Computer Communications 23(17): 1677-1680 (2000) |
10 | EE | Chun-I Fan,
Wei-Kuei Chen,
Yi-Shiung Yeh:
Date attachable electronic cash.
Computer Communications 23(4): 425-428 (2000) |
9 | EE | Yi-Shiung Yeh,
Chu-Hsing Lin,
Chan-Chi Wang:
Dynamic GOST.
J. Inf. Sci. Eng. 16(6): 857-861 (2000) |
1999 |
8 | | Chun-I Fan,
Wei-Kuen Chen,
Yi-Shiung Yeh:
Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.
ICEIS 1999: 612-618 |
7 | | Ching-Yun Lee,
Yi-Shiung Yeh,
Deng-Jyi Chen,
Kuo-Lung Ku:
A Probability Model for Reconstructing Secret Sharing under the Internet Environment.
Inf. Sci. 116(2-4): 109-127 (1999) |
6 | | Tsu-Miin Hsieh,
Yi-Shiung Yeh,
Chu-Hsing Lin,
Ssu-Heng Tuan:
One-Way Hash Functions With Changeable Parameters.
Inf. Sci. 118(1-4): 223-239 (1999) |
1998 |
5 | | Ruey-Shun Chen,
Chin Ching Chiu,
Yi-Shiung Yeh:
A Genetic Algorithm for the Reliability Optimization of a Distributed System.
DEXA Workshop 1998: 484-489 |
4 | EE | Ching-Yun Lee,
Yi-Shiung Yeh,
Deng-Jyi Chen,
Kuo-Lung Ku:
A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet.
ICPADS 1998: 469-477 |
3 | EE | Tsu-Miin Hsieh,
Yi-Shiung Yeh,
Yung-Cheng Hsieh,
Chan-Chi Wang:
A Homophonic DES.
Inf. Process. Lett. 66(6): 317-320 (1998) |
1993 |
2 | | Tzong-Chen Wu,
Yi-Shiung Yeh,
Chin-Chen Chang:
Algebraic operations on encryped relational databases.
Inf. Syst. 18(1): 55-62 (1993) |
1986 |
1 | | George I. Davida,
Yi-Shiung Yeh:
Multilevel Cryptosecure Relational Database.
EUROCRYPT 1986: 50 |