Search the dblp DataBase
Jinn-ke Jan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yuh-Min Tseng , Jinn-ke Jan ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:237-243 [Conf ] Jinn-ke Jan , Yi-Hwa Chen A New Efficient MAKEP for Wireless Communications. [Citation Graph (0, 0)][DBLP ] AINA (2), 2004, pp:347-350 [Conf ] Hung-Yu Chien , Jinn-ke Jan , Yuh-Min Tseng RSA-Based Partially Blind Signature with Low Computation. [Citation Graph (0, 0)][DBLP ] ICPADS, 2001, pp:385-389 [Conf ] Jinn-ke Jan , Yuh-Min Tseng New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:198-203 [Conf ] Fuw-Yi Yang , Jinn-ke Jan A Secure Scheme for Restrictive Partially Blind Signatures. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Fuw-Yi Yang , Jinn-ke Jan An Efficient Group Signature Based on the Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] iiWAS, 2004, pp:- [Conf ] Whe Dar Lin , Jinn-ke Jan A Wireless-based Authentication and Anonymous Channels for Large Scale Area. [Citation Graph (0, 0)][DBLP ] ISCC, 2001, pp:36-41 [Conf ] Chun-Hua Chen , Jinn-ke Jan , Chao-Hsing Hsu One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature. [Citation Graph (0, 0)][DBLP ] ICICIC (3), 2006, pp:300-303 [Conf ] Chung-Chuan Wang , Chin-Chen Chang , Jinn-ke Jan , Jieh-Shan Yeh Novel Steganographic Schemes Based on Row-Major Mapping Relation. [Citation Graph (0, 0)][DBLP ] IIH-MSP, 2006, pp:392-395 [Conf ] Hung-Yu Chien , Jinn-ke Jan Robust and Simple Authentication Protocol. [Citation Graph (0, 0)][DBLP ] Comput. J., 2003, v:46, n:2, pp:193-201 [Journal ] Yu-Yi Chen , Jinn-ke Jan , Chin-Ling Chen A fair and secure mobile billing system. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2005, v:48, n:4, pp:517-524 [Journal ] Yuh-Min Tseng , Jinn-ke Jan Anonymous conference key distribution systems based on the discrete logarithm problem. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:8, pp:749-754 [Journal ] Yu-Yi Chen , Jinn-ke Jan , Chin-Ling Chen The design of a secure anonymous Internet voting system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2004, v:23, n:4, pp:330-337 [Journal ] Hung-Yu Chien , Jinn-ke Jan New hierarchical assignment without Public Key cryptography. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2003, v:22, n:6, pp:523-526 [Journal ] Hung-Yu Chien , Jinn-ke Jan , Yuh-Min Tseng An Efficient and Practical Solution to Remote Authentication: Smart Card. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:4, pp:372-375 [Journal ] Jinn-ke Jan , Yu-Yi Chen A secure anonymous voting protocol with a complete supervision. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2002, v:17, n:4/5, pp:213-221 [Journal ] Yuh-Min Tseng , Jinn-ke Jan Generalized group-oriented cryptosystem with authenticated sender. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2001, v:16, n:5, pp:291-294 [Journal ] Hung-Yu Chien , Jinn-ke Jan , Yuh-Min Tseng Partially Blind Threshold Signature Based on RSA. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2003, v:14, n:2, pp:155-166 [Journal ] Yuh-Min Tseng , Jinn-ke Jan , Hung-Yu Chien On the Security of Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP ] Informatica, Lith. Acad. Sci., 2001, v:12, n:3, pp:469-476 [Journal ] Hung-Yu Chien , Tzong-Chen Wu , Jinn-ke Jan , Yuh-Min Tseng Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2001, v:80, n:2, pp:113-117 [Journal ] Jinn-ke Jan , Yuh-Min Tseng On the Security of Image Encryption Method. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1996, v:60, n:5, pp:261-265 [Journal ] Yuh-Min Tseng , Jinn-ke Jan Attacks on Threshold Signature Schemes with Traceable Signers. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1999, v:71, n:1, pp:1-4 [Journal ] Jinn-ke Jan A single-key access control scheme in information protection systems. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1990, v:51, n:1, pp:1-11 [Journal ] Yuh-Min Tseng , Jinn-ke Jan A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1998, v:112, n:1-4, pp:199-211 [Journal ] Yuh-Min Tseng , Jinn-ke Jan A Novel ID-based Group Signature. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1999, v:120, n:1-4, pp:131-141 [Journal ] Ren-Hung Lin , Jinn-ke Jan A tree-based scheme for security of many-to-many communications. [Citation Graph (0, 0)][DBLP ] J. High Speed Networks, 2007, v:16, n:1, pp:69-79 [Journal ] Jinn-ke Jan , Min-Jinn Jan A New Dynamic Access Control Method Using Binary Locks. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 1995, v:11, n:3, pp:371-389 [Journal ] Yuh-Min Tseng , Jinn-ke Jan An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:1, pp:41-46 [Journal ] Hung-Yu Chien , Jinn-ke Jan A hybrid authentication protocol for large mobile network. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2003, v:67, n:2, pp:123-130 [Journal ] Hung-Yu Chien , Jinn-ke Jan , Yuh-Min Tseng A modified remote login authentication scheme based on geometric approach. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2001, v:55, n:3, pp:287-290 [Journal ] Hung-Yu Chien , Jinn-ke Jan , Yuh-Min Tseng Solving the invalid signer-verified signature problem and comments on Xia-You group signature. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:73, n:3, pp:369-373 [Journal ] Jinn-ke Jan , Yu-Yi Chen "Paramita wisdom" password authentication scheme without verification tables. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:42, n:1, pp:45-57 [Journal ] Jinn-ke Jan , Chih-Chang Tai A secure electronic voting protocol with IC cards. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1997, v:39, n:2, pp:93-101 [Journal ] Shiuh-Jeng Wang , Jinn-ke Jan A displacement addressing method for letter-oriented keys. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1999, v:46, n:1, pp:77-88 [Journal ] Yi-Hwa Chen , Jinn-ke Jan Enhancement of digital signature with message recovery using self-certified public keys and its variants. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2005, v:39, n:3, pp:90-96 [Journal ] Chung-Chuan Wang , Chin-Chen Chang , Xinpeng Zhang , Jinn-ke Jan Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. [Citation Graph (0, 0)][DBLP ] MCAM, 2007, pp:351-360 [Conf ] Chin-Ling Chen , Yu-Yi Chen , Jinn-ke Jan A Secure Authentication Scheme for a Public Terminal Before a Transaction. [Citation Graph (0, 0)][DBLP ] NBiS, 2007, pp:118-126 [Conf ] Ren-Hung Lin , Jinn-ke Jan An innovative revocation scheme for one-to-many E-services. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research and Applications, 2007, v:6, n:3, pp:358-363 [Journal ] A Low-cost RFID Authentication Protocol with Location Privacy Protection. [Citation Graph (, )][DBLP ] Using Mobile Device to Design a Secure Transaction. [Citation Graph (, )][DBLP ] Search in 0.032secs, Finished in 0.034secs