dblp.uni-trier.dewww.uni-trier.de

Yi-Shiung Yeh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
28EEYi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin, Yu-Hao Chang: A Study on Parallel RSA Factorization. JCP 4(2): 112-118 (2009)
2006
27EEChuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh: Forgery attack on the RPC incremental unforgeable encryption scheme. ASIACCS 2006: 361
26EEChin Ching Chiu, Chung-Hsien Hsu, Yi-Shiung Yeh: A genetic algorithm for reliability-oriented task assignment with k/spl tilde/ duplications in distributed systems. IEEE Transactions on Reliability 55(1): 105-117 (2006)
25EEI-Te Chen, Ming-Hsin Chang, Yi-Shiung Yeh: Design of Proxy Signature in the Digital Signature Algorithm (DSA). J. Inf. Sci. Eng. 22(4): 965-973 (2006)
24EELin-Chuan Wu, Yi-Shiung Yeh, Tsann-Shyong Liu: Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes. Journal of Systems and Software 79(2): 176-179 (2006)
2005
23EERen-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen: An Efficient Decryption Method for RSA Cryptosystem. AINA 2005: 585-590
22EEMing-Hsin Chang, Yi-Shiung Yeh: Improving Lamport one-time signature scheme. Applied Mathematics and Computation 167(1): 118-124 (2005)
21EELin-Chuan Wu, Yi-Shiung Yeh: Comment on traceability on RSA-based partially signature with low computation. Applied Mathematics and Computation 170(2): 1344-1348 (2005)
2002
20EEChin Ching Chiu, Yi-Shiung Yeh, Jue-Sam Chou: A fast algorithm for reliability-oriented task assignment in a distributed system. Computer Communications 25(17): 1622-1630 (2002)
19EEJue-Sam Chou, Yi-Shiung Yeh: Mental poker game based on a bit commitment scheme through network. Computer Networks 38(2): 247-255 (2002)
18EEYi-Shiung Yeh, Wei-Shen Lai, Chung-Jaye Cheng: Applying lightweight directory access protocol service on session certification authority. Computer Networks 38(5): 675-692 (2002)
17EEYi-Shiung Yeh, Ching-Hung Hsu: An Extended DES. J. Inf. Sci. Eng. 18(3): 349-365 (2002)
16EEYi-Shiung Yeh, Ching-Hung Hsu: An Extended DES. J. Inf. Sci. Eng. 18(3): 349-365 (2002)
2001
15 Yi-Shiung Yeh, Chin Ching Chiu: A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems. Computer Communications 24(3-4): 422-433 (2001)
14EEChing-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen: Model calculations to estimate the probability of secret reconstruction in computer environments. Inf. Manag. Comput. Security 9(1): 13-20 (2001)
2000
13 Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh: A Randomization Enhanced Scheme for Chaum's Blind Signature. ICDCS Workshop on Internet 2000: A5-A8
12EEChin Ching Chiu, Yi-Shiung Yeh, Ruey-Shun Chen: Reduction of the total execution time to achieve the optimal k-node reliability of distributed computing systems using a novel heuristic algorithm. Computer Communications 23(1): 84-91 (2000)
11EEChun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh: Randomization enhanced Chaum's blind signature scheme. Computer Communications 23(17): 1677-1680 (2000)
10EEChun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh: Date attachable electronic cash. Computer Communications 23(4): 425-428 (2000)
9EEYi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang: Dynamic GOST. J. Inf. Sci. Eng. 16(6): 857-861 (2000)
1999
8 Chun-I Fan, Wei-Kuen Chen, Yi-Shiung Yeh: Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash. ICEIS 1999: 612-618
7 Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku: A Probability Model for Reconstructing Secret Sharing under the Internet Environment. Inf. Sci. 116(2-4): 109-127 (1999)
6 Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan: One-Way Hash Functions With Changeable Parameters. Inf. Sci. 118(1-4): 223-239 (1999)
1998
5 Ruey-Shun Chen, Chin Ching Chiu, Yi-Shiung Yeh: A Genetic Algorithm for the Reliability Optimization of a Distributed System. DEXA Workshop 1998: 484-489
4EEChing-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku: A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet. ICPADS 1998: 469-477
3EETsu-Miin Hsieh, Yi-Shiung Yeh, Yung-Cheng Hsieh, Chan-Chi Wang: A Homophonic DES. Inf. Process. Lett. 66(6): 317-320 (1998)
1993
2 Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang: Algebraic operations on encryped relational databases. Inf. Syst. 18(1): 55-62 (1993)
1986
1 George I. Davida, Yi-Shiung Yeh: Multilevel Cryptosecure Relational Database. EUROCRYPT 1986: 50

Coauthor Index

1Chin-Chen Chang [2]
2Ming-Hsin Chang [22] [25]
3Yu-Hao Chang [28]
4Chia-Yao Chen [23]
5Deng-Jyi Chen [4] [7] [14]
6I-Te Chen [25]
7Ruey-Shun Chen [5] [12]
8Wei-Kuei Chen [10] [11] [13]
9Wei-Kuen Chen [8]
10Chung-Jaye Cheng [18]
11Chin Ching Chiu [5] [12] [15] [20] [26]
12Jue-Sam Chou [19] [20]
13George I. Davida [1]
14Chun-I Fan [8] [10] [11] [13]
15Tsu-Miin Hsieh [3] [6]
16Yung-Cheng Hsieh [3]
17Ching-Hung Hsu [16] [17]
18Chung-Hsien Hsu [26]
19Ting-Yu Huang [28]
20Ren-Junn Hwang [23]
21Min-Chih Kao [27]
22Kuo-Lung Ku [4] [7]
23Wei-Shen Lai [18]
24Ching-Yun Lee [4] [7] [14]
25Chu-Hsing Lin [6] [9]
26Han-Yu Lin [28]
27Tsann-Shyong Liu [24]
28Feng-Fu Su [23]
29Ssu-Heng Tuan [6]
30Chan-Chi Wang [3] [9]
31Chuan Chi Wang [27]
32Lin-Chuan Wu [21] [24]
33Tzong-Chen Wu [2]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)