The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hung-Yu Chien: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hung-Yu Chien, Che-Hao Chen
    A Remote Authentication Scheme Preserving User Anonymity. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:245-248 [Conf]
  2. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    RSA-Based Partially Blind Signature with Low Computation. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2001, pp:385-389 [Conf]
  3. Hung-Yu Chien
    On the Revocation of Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:160-162 [Conf]
  4. Hung-Yu Chien, Ru-Yu Lin
    ID-Based E-Will System using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:225-230 [Conf]
  5. Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen
    Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP Networks. [Citation Graph (0, 0)][DBLP]
    IMECS, 2006, pp:258-263 [Conf]
  6. Hung-Yu Chien
    Secure Access Control Schemes for RFID Systems with Anonymity. [Citation Graph (0, 0)][DBLP]
    MDM, 2006, pp:96- [Conf]
  7. Chin-Ming Hong, Chih-Ming Chen, Hung-Yu Chien
    Learning Efficiency Improvement of Fuzzy CMAC by Aitken Acceleration Method. [Citation Graph (0, 0)][DBLP]
    SEKE, 2005, pp:556-595 [Conf]
  8. Hung-Yu Chien, Ru-Yu Lin
    Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:520-529 [Conf]
  9. Hung-Yu Chien, Jinn-ke Jan
    Robust and Simple Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2003, v:46, n:2, pp:193-201 [Journal]
  10. Hung-Yu Chien, Ren-Chiun Wang, Chou-Chen Yang
    Note on Robust and Simple Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:1, pp:27-29 [Journal]
  11. Hung-Yu Chien, Jinn-ke Jan
    New hierarchical assignment without Public Key cryptography. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2003, v:22, n:6, pp:523-526 [Journal]
  12. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    An Efficient and Practical Solution to Remote Authentication: Smart Card. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:4, pp:372-375 [Journal]
  13. Hung-Yu Chien
    Convertible Authenticated Encryption Scheme Without Using Conventional One-Way Function. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:4, pp:445-454 [Journal]
  14. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    Partially Blind Threshold Signature Based on RSA. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:2, pp:155-166 [Journal]
  15. Yuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien
    On the Security of Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2001, v:12, n:3, pp:469-476 [Journal]
  16. Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng
    Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2001, v:80, n:2, pp:113-117 [Journal]
  17. Hung-Yu Chien, Jinn-ke Jan
    A hybrid authentication protocol for large mobile network. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2003, v:67, n:2, pp:123-130 [Journal]
  18. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    A modified remote login authentication scheme based on geometric approach. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2001, v:55, n:3, pp:287-290 [Journal]
  19. Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng
    Solving the invalid signer-verified signature problem and comments on Xia-You group signature. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:73, n:3, pp:369-373 [Journal]
  20. Hung-Yu Chien
    Efficient Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1301-1304 [Journal]
  21. Hung-Yu Chien
    New efficient user authentication scheme with user anonymity facilitating e-commerce applications. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2007, pp:461-464 [Conf]
  22. Hung-Yu Chien
    SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:337-340 [Journal]

  23. Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space. [Citation Graph (, )][DBLP]


  24. ID-Based Key Agreement with Anonymity for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  25. A Lightweight RFID Protocol Using Substring. [Citation Graph (, )][DBLP]


  26. A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security. [Citation Graph (, )][DBLP]


  27. Secure Fast Pre-authentication Based on IEEE 802.11i. [Citation Graph (, )][DBLP]


  28. A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (, )][DBLP]


  29. Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. [Citation Graph (, )][DBLP]


  30. Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance. [Citation Graph (, )][DBLP]


  31. Highly Efficient ID-Based Ring Signature from Pairings. [Citation Graph (, )][DBLP]


  32. DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols. [Citation Graph (, )][DBLP]


  33. Improved ID-based security framework for ad hoc network. [Citation Graph (, )][DBLP]


  34. Selectively Convertible Authenticated Encryption in the Random Oracle Model. [Citation Graph (, )][DBLP]


  35. Provably Secure Password-Based Three-Party Key Exchange With Optimal Message Steps. [Citation Graph (, )][DBLP]


  36. Practical anonymous user authentication scheme with security proof. [Citation Graph (, )][DBLP]


Search in 0.013secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002