The SCEAS System
| |||||||

## Search the dblp DataBase
Yi-Shiung Yeh:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen
**An Efficient Decryption Method for RSA Cryptosystem.**[Citation Graph (0, 0)][DBLP] AINA, 2005, pp:585-590 [Conf] - Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh
**Forgery attack on the RPC incremental unforgeable encryption scheme.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:361- [Conf] - Ruey-Shun Chen, Chin Ching Chiu, Yi-Shiung Yeh
**A Genetic Algorithm for the Reliability Optimization of a Distributed System.**[Citation Graph (0, 0)][DBLP] DEXA Workshop, 1998, pp:484-489 [Conf] - George I. Davida, Yi-Shiung Yeh
**Multilevel Cryptosecure Relational Database.**[Citation Graph (0, 0)][DBLP] EUROCRYPT, 1986, pp:50- [Conf] - Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
**A Randomization Enhanced Scheme for Chaum's Blind Signature.**[Citation Graph (0, 0)][DBLP] ICDCS Workshop on Internet, 2000, pp:0-0 [Conf] - Chun-I Fan, Wei-Kuen Chen, Yi-Shiung Yeh
**Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.**[Citation Graph (0, 0)][DBLP] ICEIS, 1999, pp:612-618 [Conf] - Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku
**A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet.**[Citation Graph (0, 0)][DBLP] ICPADS, 1998, pp:469-477 [Conf] - Jue-Sam Chou, Yi-Shiung Yeh
**Mental poker game based on a bit commitment scheme through network.**[Citation Graph (0, 0)][DBLP] Computer Networks, 2002, v:38, n:2, pp:247-255 [Journal] - Yi-Shiung Yeh, Wei-Shen Lai, Chung-Jaye Cheng
**Applying lightweight directory access protocol service on session certification authority.**[Citation Graph (0, 0)][DBLP] Computer Networks, 2002, v:38, n:5, pp:675-692 [Journal] - Chin Ching Chiu, Yi-Shiung Yeh, Ruey-Shun Chen
**Reduction of the total execution time to achieve the optimal**[Citation Graph (0, 0)][DBLP]*k*-node reliability of distributed computing systems using a novel heuristic algorithm. Computer Communications, 2000, v:23, n:1, pp:84-91 [Journal] - Chin Ching Chiu, Yi-Shiung Yeh, Jue-Sam Chou
**A fast algorithm for reliability-oriented task assignment in a distributed system.**[Citation Graph (0, 0)][DBLP] Computer Communications, 2002, v:25, n:17, pp:1622-1630 [Journal] - Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
**Date attachable electronic cash.**[Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:4, pp:425-428 [Journal] - Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
**Randomization enhanced Chaum's blind signature scheme.**[Citation Graph (0, 0)][DBLP] Computer Communications, 2000, v:23, n:17, pp:1677-1680 [Journal] - Yi-Shiung Yeh, Chin Ching Chiu
**A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems.**[Citation Graph (0, 0)][DBLP] Computer Communications, 2001, v:24, n:3-4, pp:422-433 [Journal] - Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen
**Model calculations to estimate the probability of secret reconstruction in computer environments.**[Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:13-20 [Journal] - Tsu-Miin Hsieh, Yi-Shiung Yeh, Yung-Cheng Hsieh, Chan-Chi Wang
**A Homophonic DES.**[Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1998, v:66, n:6, pp:317-320 [Journal] - Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang
**Algebraic operations on encryped relational databases.**[Citation Graph (0, 0)][DBLP] Inf. Syst., 1993, v:18, n:1, pp:55-62 [Journal] - Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan
**One-Way Hash Functions With Changeable Parameters.**[Citation Graph (0, 0)][DBLP] Inf. Sci., 1999, v:118, n:1-4, pp:223-239 [Journal] - Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku
**A Probability Model for Reconstructing Secret Sharing under the Internet Environment.**[Citation Graph (0, 0)][DBLP] Inf. Sci., 1999, v:116, n:2-4, pp:109-127 [Journal] - I-Te Chen, Ming-Hsin Chang, Yi-Shiung Yeh
**Design of Proxy Signature in the Digital Signature Algorithm (DSA).**[Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2006, v:22, n:4, pp:965-973 [Journal] - Yi-Shiung Yeh, Ching-Hung Hsu
**An Extended DES.**[Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:349-365 [Journal] - Yi-Shiung Yeh, Ching-Hung Hsu
**An Extended DES.**[Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:349-365 [Journal] - Yi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang
**Dynamic GOST.**[Citation Graph (0, 0)][DBLP] J. Inf. Sci. Eng., 2000, v:16, n:6, pp:857-861 [Journal] - Lin-Chuan Wu, Yi-Shiung Yeh, Tsann-Shyong Liu
**Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes.**[Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2006, v:79, n:2, pp:176-179 [Journal] - Chin Ching Chiu, Chung-Hsien Hsu, Yi-Shiung Yeh
**A genetic algorithm for reliability-oriented task assignment with k/spl tilde/ duplications in distributed systems.**[Citation Graph (0, 0)][DBLP] IEEE Transactions on Reliability, 2006, v:55, n:1, pp:105-117 [Journal] **Untraceable Identity Management Framework for Mobile Access.**[Citation Graph (, )][DBLP]**Self-Certified Proxy Convertible Authenticated Encryption Scheme.**[Citation Graph (, )][DBLP]
Search in 0.017secs, Finished in 0.020secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |