The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuh-Min Tseng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuh-Min Tseng, Jinn-ke Jan
    ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:237-243 [Conf]
  2. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    RSA-Based Partially Blind Signature with Low Computation. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2001, pp:385-389 [Conf]
  3. Jinn-ke Jan, Yuh-Min Tseng
    New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:198-203 [Conf]
  4. Yuh-Min Tseng
    On the Security of Two Group Key Agreement Protocols for Mobile Devices. [Citation Graph (0, 0)][DBLP]
    MDM, 2006, pp:97- [Conf]
  5. Yuh-Min Tseng
    A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:4, pp:480-487 [Journal]
  6. Yuh-Min Tseng
    A secure authenticated group key agreement protocol for resource-limited mobile devices. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2007, v:50, n:1, pp:41-52 [Journal]
  7. Yuh-Min Tseng, Jinn-ke Jan
    Anonymous conference key distribution systems based on the discrete logarithm problem. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:749-754 [Journal]
  8. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    An Efficient and Practical Solution to Remote Authentication: Smart Card. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:4, pp:372-375 [Journal]
  9. Yuh-Min Tseng, Jinn-ke Jan
    Generalized group-oriented cryptosystem with authenticated sender. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:5, pp:291-294 [Journal]
  10. Yuh-Min Tseng
    A scalable key-management scheme with minimizing key storage for secure group communications. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2003, v:13, n:6, pp:419-425 [Journal]
  11. Yuh-Min Tseng
    Efficient authenticated key agreement protocols resistant to a denial-of-service attack. [Citation Graph (0, 0)][DBLP]
    Int. Journal of Network Management, 2005, v:15, n:3, pp:193-202 [Journal]
  12. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    Partially Blind Threshold Signature Based on RSA. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:2, pp:155-166 [Journal]
  13. Yuh-Min Tseng
    Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2002, v:13, n:3, pp:369-376 [Journal]
  14. Yuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien
    On the Security of Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2001, v:12, n:3, pp:469-476 [Journal]
  15. Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng
    Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:2, pp:113-117 [Journal]
  16. Jinn-ke Jan, Yuh-Min Tseng
    On the Security of Image Encryption Method. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:60, n:5, pp:261-265 [Journal]
  17. Yuh-Min Tseng, Jinn-ke Jan
    Attacks on Threshold Signature Schemes with Traceable Signers. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:71, n:1, pp:1-4 [Journal]
  18. Yuh-Min Tseng, Jinn-ke Jan
    A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1998, v:112, n:1-4, pp:199-211 [Journal]
  19. Yuh-Min Tseng, Jinn-ke Jan
    A Novel ID-based Group Signature. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:120, n:1-4, pp:131-141 [Journal]
  20. Yuh-Min Tseng, Jinn-ke Jan
    An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:41-46 [Journal]
  21. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    A modified remote login authentication scheme based on geometric approach. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:287-290 [Journal]
  22. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    Solving the invalid signer-verified signature problem and comments on Xia-You group signature. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:73, n:3, pp:369-373 [Journal]
  23. Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
    A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. [Citation Graph (0, 0)][DBLP]
    COMPSAC (2), 2007, pp:700-710 [Conf]
  24. Yuh-Min Tseng
    An Improved Conference-Key Agreement Protocol with Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:2, pp:275-284 [Journal]
  25. Yuh-Min Tseng
    An Efficient Two-Party Identity-Based Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2007, v:18, n:1, pp:125-136 [Journal]
  26. Yuh-Min Tseng
    A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:7, pp:1091-1101 [Journal]

  27. Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. [Citation Graph (, )][DBLP]


  28. A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application. [Citation Graph (, )][DBLP]


  29. An efficient user authentication and key exchange protocol for mobile client-server environment. [Citation Graph (, )][DBLP]


  30. A resource-constrained group key agreement protocol for imbalanced wireless networks. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.282secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002