The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yi-Shiung Yeh: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen
    An Efficient Decryption Method for RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:585-590 [Conf]
  2. Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh
    Forgery attack on the RPC incremental unforgeable encryption scheme. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:361- [Conf]
  3. Ruey-Shun Chen, Chin Ching Chiu, Yi-Shiung Yeh
    A Genetic Algorithm for the Reliability Optimization of a Distributed System. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:484-489 [Conf]
  4. George I. Davida, Yi-Shiung Yeh
    Multilevel Cryptosecure Relational Database. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:50- [Conf]
  5. Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
    A Randomization Enhanced Scheme for Chaum's Blind Signature. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshop on Internet, 2000, pp:0-0 [Conf]
  6. Chun-I Fan, Wei-Kuen Chen, Yi-Shiung Yeh
    Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash. [Citation Graph (0, 0)][DBLP]
    ICEIS, 1999, pp:612-618 [Conf]
  7. Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku
    A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1998, pp:469-477 [Conf]
  8. Jue-Sam Chou, Yi-Shiung Yeh
    Mental poker game based on a bit commitment scheme through network. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:38, n:2, pp:247-255 [Journal]
  9. Yi-Shiung Yeh, Wei-Shen Lai, Chung-Jaye Cheng
    Applying lightweight directory access protocol service on session certification authority. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2002, v:38, n:5, pp:675-692 [Journal]
  10. Chin Ching Chiu, Yi-Shiung Yeh, Ruey-Shun Chen
    Reduction of the total execution time to achieve the optimal k-node reliability of distributed computing systems using a novel heuristic algorithm. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:1, pp:84-91 [Journal]
  11. Chin Ching Chiu, Yi-Shiung Yeh, Jue-Sam Chou
    A fast algorithm for reliability-oriented task assignment in a distributed system. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:17, pp:1622-1630 [Journal]
  12. Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
    Date attachable electronic cash. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:4, pp:425-428 [Journal]
  13. Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh
    Randomization enhanced Chaum's blind signature scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1677-1680 [Journal]
  14. Yi-Shiung Yeh, Chin Ching Chiu
    A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2001, v:24, n:3-4, pp:422-433 [Journal]
  15. Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen
    Model calculations to estimate the probability of secret reconstruction in computer environments. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:13-20 [Journal]
  16. Tsu-Miin Hsieh, Yi-Shiung Yeh, Yung-Cheng Hsieh, Chan-Chi Wang
    A Homophonic DES. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:66, n:6, pp:317-320 [Journal]
  17. Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang
    Algebraic operations on encryped relational databases. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1993, v:18, n:1, pp:55-62 [Journal]
  18. Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan
    One-Way Hash Functions With Changeable Parameters. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:118, n:1-4, pp:223-239 [Journal]
  19. Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku
    A Probability Model for Reconstructing Secret Sharing under the Internet Environment. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:116, n:2-4, pp:109-127 [Journal]
  20. I-Te Chen, Ming-Hsin Chang, Yi-Shiung Yeh
    Design of Proxy Signature in the Digital Signature Algorithm (DSA). [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2006, v:22, n:4, pp:965-973 [Journal]
  21. Yi-Shiung Yeh, Ching-Hung Hsu
    An Extended DES. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:349-365 [Journal]
  22. Yi-Shiung Yeh, Ching-Hung Hsu
    An Extended DES. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2002, v:18, n:3, pp:349-365 [Journal]
  23. Yi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang
    Dynamic GOST. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2000, v:16, n:6, pp:857-861 [Journal]
  24. Lin-Chuan Wu, Yi-Shiung Yeh, Tsann-Shyong Liu
    Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2006, v:79, n:2, pp:176-179 [Journal]
  25. Chin Ching Chiu, Chung-Hsien Hsu, Yi-Shiung Yeh
    A genetic algorithm for reliability-oriented task assignment with k/spl tilde/ duplications in distributed systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Reliability, 2006, v:55, n:1, pp:105-117 [Journal]

  26. Untraceable Identity Management Framework for Mobile Access. [Citation Graph (, )][DBLP]


  27. Self-Certified Proxy Convertible Authenticated Encryption Scheme. [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.016secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002