Chou Chen Yang

According to our database1, Chou Chen Yang authored at least 43 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A certificateless aggregate signature scheme for security and privacy protection in VANET.
Int. J. Distributed Sens. Networks, 2022

2017
Password Authenticated Key Exchange and Protected Password Change Protocols.
Symmetry, 2017

A Secure and Efficient One-time Password Authentication Scheme for WSN.
Int. J. Netw. Secur., 2017

2016
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage.
Int. J. Netw. Secur., 2016

A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing.
Int. J. Netw. Secur., 2016

A Survey of Public Auditing for Secure Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2016

2014
NFC Attacks Analysis and Survey.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
A New Group Signature Scheme Based on RSA Assumption.
Inf. Technol. Control., 2013

A Study of Public Key Encryption with Keyword Search.
Int. J. Netw. Secur., 2013

Privacy Protection Data Access Control.
Int. J. Netw. Secur., 2013

Enhanced digital rights management authentication scheme based on smart card.
IET Inf. Secur., 2013

2012
A secure routing protocol with node selfishness resistance in MANETs.
Int. J. Mob. Commun., 2012

A Universal Lightweight Authentication Scheme Based on Delegation Mechanism in Heterogeneous Networks.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2010
A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Authorized file-sharing system on P2P networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Identity-Based DRM in Ubiquitous Multimedia System.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2007
Mobility Management with Distributed AAA Architecture.
Int. J. Netw. Secur., 2007

2006
A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network.
Wirel. Pers. Commun., 2006

3G and WLAN Interworking Security: Current Status and Key.
Int. J. Netw. Secur., 2006

Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards.
Int. J. Netw. Secur., 2006

A Loop-Free Multi-Path Routing With QoS for Wireless Ad Hoc Network.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Trans. Commun., 2005

Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines.
IEICE Trans. Commun., 2005

A protected password change protocol
CoRR, 2005

Secure authentication scheme for session initiation protocol.
Comput. Secur., 2005

Note on Robust and Simple Authentication Protocol.
Comput. J., 2005

An improvement of the Yang-Shieh password authentication schemes.
Appl. Math. Comput., 2005

Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2005

A secure and efficient authentication protocol for anonymous channel in wireless communications.
Appl. Math. Comput., 2005

2004
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks.
Wirel. Pers. Commun., 2004

Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards.
IEEE Trans. Consumer Electron., 2004

An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards.
ACM SIGOPS Oper. Syst. Rev., 2004

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks.
Informatica, 2004

A threshold signature scheme for group communications without a shared distribution center.
Future Gener. Comput. Syst., 2004

A new mutual authentication and key exchange protocol with balanced computational power for wireless settings.
Eur. Trans. Telecommun., 2004

Cryptanalysis of a user friendly remote authentication scheme with smart cards.
Comput. Secur., 2004

A (t, n) multi-secret sharing scheme.
Appl. Math. Comput., 2004

Ant Mobility Model Platform for Network Simulator.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem.
Informatica, 2003

Security of Improvement on Methods for Protecting Password Transmission.
Informatica, 2003

A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2003

A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
A Solution to Mobile IP Registration for AAA.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002


  Loading...