The SCEAS System
Navigation Menu

Search the dblp DataBase


Chou Chen Yang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cheng-Ying Yang, Yi-Wei Ting, Chou Chen Yang
    A Loop-Free Multi-Path Routing With QoS for Wireless Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:179-185 [Conf]
  2. Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang
    A Solution to Mobile IP Registration for AAA. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:329-337 [Conf]
  3. Chou Chen Yang, Jian Wei Li, Ting Yi Chang
    A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:367-374 [Conf]
  4. Hsien-Chou Liao, Yi-Wei Ting, Shih-Hsuan Yen, Chou Chen Yang
    Ant Mobility Model Platform for Network Simulator. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:380-384 [Conf]
  5. Hung-Yu Chien, Ren-Chiun Wang, Chou-Chen Yang
    Note on Robust and Simple Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2005, v:48, n:1, pp:27-29 [Journal]
  6. Chou-Chen Yang, Ren-Chiun Wang
    Cryptanalysis of a user friendly remote authentication scheme with smart cards. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:5, pp:425-427 [Journal]
  7. Chou-Chen Yang, Ren-Chiun Wang, Wei-Ting Liu
    Secure authentication scheme for session initiation protocol. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:5, pp:381-386 [Journal]
  8. Ting Yi Chang, Chou Chen Yang, Min-Shiang Hwang
    A threshold signature scheme for group communications without a shared distribution center. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2004, v:20, n:6, pp:1013-1021 [Journal]
  9. Ting Yi Chang, Chou Chen Yang, Chia-Meng Chen
    Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2004, v:15, n:2, pp:161-170 [Journal]
  10. Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang
    Security of Improvement on Methods for Protecting Password Transmission. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:4, pp:551-558 [Journal]
  11. Chou Chen Yang, Ting Yi Chang, Jian Wei Li, Min-Shiang Hwang
    Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Informatica, Lith. Acad. Sci., 2003, v:14, n:1, pp:111-120 [Journal]
  12. Chou Chen Yang, Ren-Ching Wang
    An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2004, v:38, n:3, pp:91-96 [Journal]

  13. A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. [Citation Graph (, )][DBLP]

  14. A protected password change protocol [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002