Hung-Yu Chien New efficient user authentication scheme with user anonymity facilitating e-commerce applications. [Citation Graph (0, 0)][DBLP] CEC/EEE, 2007, pp:461-464 [Conf]
Hung-Yu Chien SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:337-340 [Journal]
Efficient Key Pre-distribution for Sensor Nodes with Strong Connectivity and Low Storage Space. [Citation Graph (, )][DBLP]
ID-Based Key Agreement with Anonymity for Ad Hoc Networks. [Citation Graph (, )][DBLP]
A Lightweight RFID Protocol Using Substring. [Citation Graph (, )][DBLP]
A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security. [Citation Graph (, )][DBLP]
Secure Fast Pre-authentication Based on IEEE 802.11i. [Citation Graph (, )][DBLP]
A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. [Citation Graph (, )][DBLP]
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model. [Citation Graph (, )][DBLP]
Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance. [Citation Graph (, )][DBLP]
Highly Efficient ID-Based Ring Signature from Pairings. [Citation Graph (, )][DBLP]
DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols. [Citation Graph (, )][DBLP]
Improved ID-based security framework for ad hoc network. [Citation Graph (, )][DBLP]
Selectively Convertible Authenticated Encryption in the Random Oracle Model. [Citation Graph (, )][DBLP]