The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jinn-ke Jan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuh-Min Tseng, Jinn-ke Jan
    ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:237-243 [Conf]
  2. Jinn-ke Jan, Yi-Hwa Chen
    A New Efficient MAKEP for Wireless Communications. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:347-350 [Conf]
  3. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    RSA-Based Partially Blind Signature with Low Computation. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2001, pp:385-389 [Conf]
  4. Jinn-ke Jan, Yuh-Min Tseng
    New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:198-203 [Conf]
  5. Fuw-Yi Yang, Jinn-ke Jan
    A Secure Scheme for Restrictive Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  6. Fuw-Yi Yang, Jinn-ke Jan
    An Efficient Group Signature Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    iiWAS, 2004, pp:- [Conf]
  7. Whe Dar Lin, Jinn-ke Jan
    A Wireless-based Authentication and Anonymous Channels for Large Scale Area. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:36-41 [Conf]
  8. Chun-Hua Chen, Jinn-ke Jan, Chao-Hsing Hsu
    One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature. [Citation Graph (0, 0)][DBLP]
    ICICIC (3), 2006, pp:300-303 [Conf]
  9. Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh
    Novel Steganographic Schemes Based on Row-Major Mapping Relation. [Citation Graph (0, 0)][DBLP]
    IIH-MSP, 2006, pp:392-395 [Conf]
  10. Hung-Yu Chien, Jinn-ke Jan
    Robust and Simple Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2003, v:46, n:2, pp:193-201 [Journal]
  11. Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
    A fair and secure mobile billing system. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2005, v:48, n:4, pp:517-524 [Journal]
  12. Yuh-Min Tseng, Jinn-ke Jan
    Anonymous conference key distribution systems based on the discrete logarithm problem. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:749-754 [Journal]
  13. Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
    The design of a secure anonymous Internet voting system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:4, pp:330-337 [Journal]
  14. Hung-Yu Chien, Jinn-ke Jan
    New hierarchical assignment without Public Key cryptography. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:523-526 [Journal]
  15. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    An Efficient and Practical Solution to Remote Authentication: Smart Card. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:4, pp:372-375 [Journal]
  16. Jinn-ke Jan, Yu-Yi Chen
    A secure anonymous voting protocol with a complete supervision. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2002, v:17, n:4/5, pp:213-221 [Journal]
  17. Yuh-Min Tseng, Jinn-ke Jan
    Generalized group-oriented cryptosystem with authenticated sender. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2001, v:16, n:5, pp:291-294 [Journal]
  18. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    Partially Blind Threshold Signature Based on RSA. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:2, pp:155-166 [Journal]
  19. Yuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien
    On the Security of Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2001, v:12, n:3, pp:469-476 [Journal]
  20. Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng
    Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:2, pp:113-117 [Journal]
  21. Jinn-ke Jan, Yuh-Min Tseng
    On the Security of Image Encryption Method. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:60, n:5, pp:261-265 [Journal]
  22. Yuh-Min Tseng, Jinn-ke Jan
    Attacks on Threshold Signature Schemes with Traceable Signers. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1999, v:71, n:1, pp:1-4 [Journal]
  23. Jinn-ke Jan
    A single-key access control scheme in information protection systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1990, v:51, n:1, pp:1-11 [Journal]
  24. Yuh-Min Tseng, Jinn-ke Jan
    A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1998, v:112, n:1-4, pp:199-211 [Journal]
  25. Yuh-Min Tseng, Jinn-ke Jan
    A Novel ID-based Group Signature. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:120, n:1-4, pp:131-141 [Journal]
  26. Ren-Hung Lin, Jinn-ke Jan
    A tree-based scheme for security of many-to-many communications. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2007, v:16, n:1, pp:69-79 [Journal]
  27. Jinn-ke Jan, Min-Jinn Jan
    A New Dynamic Access Control Method Using Binary Locks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 1995, v:11, n:3, pp:371-389 [Journal]
  28. Yuh-Min Tseng, Jinn-ke Jan
    An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:1, pp:41-46 [Journal]
  29. Hung-Yu Chien, Jinn-ke Jan
    A hybrid authentication protocol for large mobile network. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:67, n:2, pp:123-130 [Journal]
  30. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    A modified remote login authentication scheme based on geometric approach. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:287-290 [Journal]
  31. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    Solving the invalid signer-verified signature problem and comments on Xia-You group signature. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:73, n:3, pp:369-373 [Journal]
  32. Jinn-ke Jan, Yu-Yi Chen
    "Paramita wisdom" password authentication scheme without verification tables. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:42, n:1, pp:45-57 [Journal]
  33. Jinn-ke Jan, Chih-Chang Tai
    A secure electronic voting protocol with IC cards. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1997, v:39, n:2, pp:93-101 [Journal]
  34. Shiuh-Jeng Wang, Jinn-ke Jan
    A displacement addressing method for letter-oriented keys. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:46, n:1, pp:77-88 [Journal]
  35. Yi-Hwa Chen, Jinn-ke Jan
    Enhancement of digital signature with message recovery using self-certified public keys and its variants. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:3, pp:90-96 [Journal]
  36. Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan
    Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. [Citation Graph (0, 0)][DBLP]
    MCAM, 2007, pp:351-360 [Conf]
  37. Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan
    A Secure Authentication Scheme for a Public Terminal Before a Transaction. [Citation Graph (0, 0)][DBLP]
    NBiS, 2007, pp:118-126 [Conf]
  38. Ren-Hung Lin, Jinn-ke Jan
    An innovative revocation scheme for one-to-many E-services. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2007, v:6, n:3, pp:358-363 [Journal]

  39. A Low-cost RFID Authentication Protocol with Location Privacy Protection. [Citation Graph (, )][DBLP]


  40. Using Mobile Device to Design a Secure Transaction. [Citation Graph (, )][DBLP]


Search in 0.032secs, Finished in 0.034secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002