The SCEAS System
Navigation Menu

Search the dblp DataBase


Ya-Fen Chang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chin-Chen Chang, Ya-Fen Chang
    Yet Another Attack on a QR-based Password Authentication System. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2004, pp:170-173 [Conf]
  2. Ya-Fen Chang, Chin-Chen Chang
    Enhanced Anonymous Auction Protocols with Freewheeling Bids. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2006, pp:353-358 [Conf]
  3. Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su
    A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:741-745 [Conf]
  4. Ya-Fen Chang, Chin-Chen Chang
    Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:340-344 [Conf]
  5. Chin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu
    An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:93-100 [Conf]
  6. Chin-Chen Chang, Ya-Fen Chang
    The Security Flaw of an Untraceable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:1379-1381 [Conf]
  7. Ya-Fen Chang, Chin-Chen Chang
    An Improvement on Strong-Password Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ICESS, 2005, pp:629-637 [Conf]
  8. Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai
    Comments on Distributed Sign-and-Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:178-180 [Conf]
  9. Ya-Fen Chang, Chin-Chen Chang
    Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. [Citation Graph (0, 0)][DBLP]
    JCIS, 2006, pp:- [Conf]
  10. Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang
    Efficient authentication protocols of GSM. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:8, pp:921-928 [Journal]
  11. Chin-Chen Chang, Ya-Fen Chang
    Efficient anonymous auction protocols with freewheeling bids. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:8, pp:728-734 [Journal]
  12. Ya-Fen Chang, Chin-Chen Chang
    Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2007, v:76, n:1-2, pp:13-23 [Journal]
  13. Ya-Fen Chang, Chin-Chen Chang
    A secure and efficient strong-password authentication protocol. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:3, pp:79-90 [Journal]
  14. Ya-Fen Chang, Chin-Chen Chang
    An efficient authentication protocol for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2005, v:39, n:1, pp:70-84 [Journal]
  15. Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo
    A secure one-time password authentication scheme using smart cards without limiting login times. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:4, pp:80-90 [Journal]
  16. Ya-Fen Chang, Chin-Chen Chang
    Schemes for Digital Gift Certificates with Low Computation Complexity. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2005, v:16, n:4, pp:503-518 [Journal]

  17. An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. [Citation Graph (, )][DBLP]

  18. The Essential Design Principles of Verifiable Non-interactive OT Protocols. [Citation Graph (, )][DBLP]

  19. Performance Evaluation of Mobility Management in Cellular IP. [Citation Graph (, )][DBLP]

  20. Security of Dynamic ID-Based Remote User Authentication Scheme. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002