|
Search the dblp DataBase
Yu-Yi Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
A fair and secure mobile billing system. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:4, pp:517-524 [Journal]
- Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen
The design of a secure anonymous Internet voting system. [Citation Graph (0, 0)][DBLP] Computers & Security, 2004, v:23, n:4, pp:330-337 [Journal]
- Jinn-ke Jan, Yu-Yi Chen
A secure anonymous voting protocol with a complete supervision. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2002, v:17, n:4/5, pp:213-221 [Journal]
- Jinn-ke Jan, Yu-Yi Chen
"Paramita wisdom" password authentication scheme without verification tables. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 1998, v:42, n:1, pp:45-57 [Journal]
- Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan
A Secure Authentication Scheme for a Public Terminal Before a Transaction. [Citation Graph (0, 0)][DBLP] NBiS, 2007, pp:118-126 [Conf]
A Customer Privacy Protection Protocol on Agent-Based Electronic Commerce Transaction. [Citation Graph (, )][DBLP]
A Fair-Use DRM System Based on Web Service. [Citation Graph (, )][DBLP]
A Low-cost RFID Authentication Protocol with Location Privacy Protection. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|