|
Search the dblp DataBase
Ya-Fen Chang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Chin-Chen Chang, Ya-Fen Chang
Yet Another Attack on a QR-based Password Authentication System. [Citation Graph (0, 0)][DBLP] AINA (2), 2004, pp:170-173 [Conf]
- Ya-Fen Chang, Chin-Chen Chang
Enhanced Anonymous Auction Protocols with Freewheeling Bids. [Citation Graph (0, 0)][DBLP] AINA (1), 2006, pp:353-358 [Conf]
- Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:741-745 [Conf]
- Ya-Fen Chang, Chin-Chen Chang
Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. [Citation Graph (0, 0)][DBLP] CW, 2005, pp:340-344 [Conf]
- Chin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. [Citation Graph (0, 0)][DBLP] CW, 2005, pp:93-100 [Conf]
- Chin-Chen Chang, Ya-Fen Chang
The Security Flaw of an Untraceable Signature Scheme. [Citation Graph (0, 0)][DBLP] ICEB, 2004, pp:1379-1381 [Conf]
- Ya-Fen Chang, Chin-Chen Chang
An Improvement on Strong-Password Authentication Protocols. [Citation Graph (0, 0)][DBLP] ICESS, 2005, pp:629-637 [Conf]
- Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai
Comments on Distributed Sign-and-Encryption Schemes. [Citation Graph (0, 0)][DBLP] IMECS, 2006, pp:178-180 [Conf]
- Ya-Fen Chang, Chin-Chen Chang
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. [Citation Graph (0, 0)][DBLP] JCIS, 2006, pp:- [Conf]
- Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang
Efficient authentication protocols of GSM. [Citation Graph (0, 0)][DBLP] Computer Communications, 2005, v:28, n:8, pp:921-928 [Journal]
- Chin-Chen Chang, Ya-Fen Chang
Efficient anonymous auction protocols with freewheeling bids. [Citation Graph (0, 0)][DBLP] Computers & Security, 2003, v:22, n:8, pp:728-734 [Journal]
- Ya-Fen Chang, Chin-Chen Chang
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. [Citation Graph (0, 0)][DBLP] Fundam. Inform., 2007, v:76, n:1-2, pp:13-23 [Journal]
- Ya-Fen Chang, Chin-Chen Chang
A secure and efficient strong-password authentication protocol. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2004, v:38, n:3, pp:79-90 [Journal]
- Ya-Fen Chang, Chin-Chen Chang
An efficient authentication protocol for mobile satellite communication systems. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2005, v:39, n:1, pp:70-84 [Journal]
- Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo
A secure one-time password authentication scheme using smart cards without limiting login times. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2004, v:38, n:4, pp:80-90 [Journal]
- Ya-Fen Chang, Chin-Chen Chang
Schemes for Digital Gift Certificates with Low Computation Complexity. [Citation Graph (0, 0)][DBLP] Informatica, Lith. Acad. Sci., 2005, v:16, n:4, pp:503-518 [Journal]
An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. [Citation Graph (, )][DBLP]
The Essential Design Principles of Verifiable Non-interactive OT Protocols. [Citation Graph (, )][DBLP]
Performance Evaluation of Mobility Management in Cellular IP. [Citation Graph (, )][DBLP]
Security of Dynamic ID-Based Remote User Authentication Scheme. [Citation Graph (, )][DBLP]
Search in 0.019secs, Finished in 0.020secs
|