Search the dblp DataBase
Yi-Shiung Yeh :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ren-Junn Hwang , Feng-Fu Su , Yi-Shiung Yeh , Chia-Yao Chen An Efficient Decryption Method for RSA Cryptosystem. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:585-590 [Conf ] Chuan Chi Wang , Min-Chih Kao , Yi-Shiung Yeh Forgery attack on the RPC incremental unforgeable encryption scheme. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:361- [Conf ] Ruey-Shun Chen , Chin Ching Chiu , Yi-Shiung Yeh A Genetic Algorithm for the Reliability Optimization of a Distributed System. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:484-489 [Conf ] George I. Davida , Yi-Shiung Yeh Multilevel Cryptosecure Relational Database. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:50- [Conf ] Chun-I Fan , Wei-Kuei Chen , Yi-Shiung Yeh A Randomization Enhanced Scheme for Chaum's Blind Signature. [Citation Graph (0, 0)][DBLP ] ICDCS Workshop on Internet, 2000, pp:0-0 [Conf ] Chun-I Fan , Wei-Kuen Chen , Yi-Shiung Yeh Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash. [Citation Graph (0, 0)][DBLP ] ICEIS, 1999, pp:612-618 [Conf ] Ching-Yun Lee , Yi-Shiung Yeh , Deng-Jyi Chen , Kuo-Lung Ku A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet. [Citation Graph (0, 0)][DBLP ] ICPADS, 1998, pp:469-477 [Conf ] Jue-Sam Chou , Yi-Shiung Yeh Mental poker game based on a bit commitment scheme through network. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:38, n:2, pp:247-255 [Journal ] Yi-Shiung Yeh , Wei-Shen Lai , Chung-Jaye Cheng Applying lightweight directory access protocol service on session certification authority. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2002, v:38, n:5, pp:675-692 [Journal ] Chin Ching Chiu , Yi-Shiung Yeh , Ruey-Shun Chen Reduction of the total execution time to achieve the optimal k -node reliability of distributed computing systems using a novel heuristic algorithm. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:1, pp:84-91 [Journal ] Chin Ching Chiu , Yi-Shiung Yeh , Jue-Sam Chou A fast algorithm for reliability-oriented task assignment in a distributed system. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2002, v:25, n:17, pp:1622-1630 [Journal ] Chun-I Fan , Wei-Kuei Chen , Yi-Shiung Yeh Date attachable electronic cash. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:4, pp:425-428 [Journal ] Chun-I Fan , Wei-Kuei Chen , Yi-Shiung Yeh Randomization enhanced Chaum's blind signature scheme. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:17, pp:1677-1680 [Journal ] Yi-Shiung Yeh , Chin Ching Chiu A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2001, v:24, n:3-4, pp:422-433 [Journal ] Ching-Yun Lee , Yi-Shiung Yeh , Deng-Jyi Chen Model calculations to estimate the probability of secret reconstruction in computer environments. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2001, v:9, n:1, pp:13-20 [Journal ] Tsu-Miin Hsieh , Yi-Shiung Yeh , Yung-Cheng Hsieh , Chan-Chi Wang A Homophonic DES. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:66, n:6, pp:317-320 [Journal ] Tzong-Chen Wu , Yi-Shiung Yeh , Chin-Chen Chang Algebraic operations on encryped relational databases. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1993, v:18, n:1, pp:55-62 [Journal ] Tsu-Miin Hsieh , Yi-Shiung Yeh , Chu-Hsing Lin , Ssu-Heng Tuan One-Way Hash Functions With Changeable Parameters. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1999, v:118, n:1-4, pp:223-239 [Journal ] Ching-Yun Lee , Yi-Shiung Yeh , Deng-Jyi Chen , Kuo-Lung Ku A Probability Model for Reconstructing Secret Sharing under the Internet Environment. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1999, v:116, n:2-4, pp:109-127 [Journal ] I-Te Chen , Ming-Hsin Chang , Yi-Shiung Yeh Design of Proxy Signature in the Digital Signature Algorithm (DSA). [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2006, v:22, n:4, pp:965-973 [Journal ] Yi-Shiung Yeh , Ching-Hung Hsu An Extended DES. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:349-365 [Journal ] Yi-Shiung Yeh , Ching-Hung Hsu An Extended DES. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2002, v:18, n:3, pp:349-365 [Journal ] Yi-Shiung Yeh , Chu-Hsing Lin , Chan-Chi Wang Dynamic GOST. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2000, v:16, n:6, pp:857-861 [Journal ] Lin-Chuan Wu , Yi-Shiung Yeh , Tsann-Shyong Liu Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2006, v:79, n:2, pp:176-179 [Journal ] Chin Ching Chiu , Chung-Hsien Hsu , Yi-Shiung Yeh A genetic algorithm for reliability-oriented task assignment with k/spl tilde/ duplications in distributed systems. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Reliability, 2006, v:55, n:1, pp:105-117 [Journal ] Untraceable Identity Management Framework for Mobile Access. [Citation Graph (, )][DBLP ] Self-Certified Proxy Convertible Authenticated Encryption Scheme. [Citation Graph (, )][DBLP ] Search in 0.014secs, Finished in 0.016secs