Chou Chen Yang

According to our database1, Chou Chen Yang
  • authored at least 42 papers between 2002 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Password Authenticated Key Exchange and Protected Password Change Protocols.
Symmetry, 2017

A Secure and Efficient One-time Password Authentication Scheme for WSN.
I. J. Network Security, 2017

2016
A Survey of Attribute-based Access Control with User Revocation in Cloud Data Storage.
I. J. Network Security, 2016

A Survey of Public Auditing for Shared Data Storage with User Revocation in Cloud Computing.
I. J. Network Security, 2016

A Survey of Public Auditing for Secure Data Storage in Cloud Computing.
I. J. Network Security, 2016

2014
NFC Attacks Analysis and Survey.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

2013
A New Group Signature Scheme Based on RSA Assumption.
ITC, 2013

A Study of Public Key Encryption with Keyword Search.
I. J. Network Security, 2013

Privacy Protection Data Access Control.
I. J. Network Security, 2013

Enhanced digital rights management authentication scheme based on smart card.
IET Information Security, 2013

2012
A secure routing protocol with node selfishness resistance in MANETs.
IJMC, 2012

A Universal Lightweight Authentication Scheme Based on Delegation Mechanism in Heterogeneous Networks.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

2010
A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Authorized file-sharing system on P2P networks.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

2009
Identity-Based DRM in Ubiquitous Multimedia System.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2007
Mobility Management with Distributed AAA Architecture.
I. J. Network Security, 2007

2006
A Robust Authentication Protocol with Non-Repudiation Service for Integrating WLAN and 3G Network.
Wireless Personal Communications, 2006

3G and WLAN Interworking Security: Current Status and Key.
I. J. Network Security, 2006

Cryptanalysis of Two Improved Password Authentication Schemes Using Smart Cards.
I. J. Network Security, 2006

A Loop-Free Multi-Path Routing With QoS for Wireless Ad Hoc Network.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Transactions, 2005

Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines.
IEICE Transactions, 2005

A protected password change protocol
CoRR, 2005

Secure authentication scheme for session initiation protocol.
Computers & Security, 2005

Note on Robust and Simple Authentication Protocol.
Comput. J., 2005

An improvement of the Yang-Shieh password authentication schemes.
Applied Mathematics and Computation, 2005

Cryptanalysis of improved authenticated multiple-key agreement protocol without using conventional one-way function.
Applied Mathematics and Computation, 2005

A secure and efficient authentication protocol for anonymous channel in wireless communications.
Applied Mathematics and Computation, 2005

2004
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks.
Wireless Personal Communications, 2004

Cryptanalysis of security enhancement for the timestamp-based password authentication scheme using smart cards.
IEEE Trans. Consumer Electronics, 2004

An improvement of security enhancement for the timestamp-based password authentication scheme using smart cards.
Operating Systems Review, 2004

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks.
Informatica, Lith. Acad. Sci., 2004

A threshold signature scheme for group communications without a shared distribution center.
Future Generation Comp. Syst., 2004

A new mutual authentication and key exchange protocol with balanced computational power for wireless settings.
European Transactions on Telecommunications, 2004

Cryptanalysis of a user friendly remote authentication scheme with smart cards.
Computers & Security, 2004

A (t, n) multi-secret sharing scheme.
Applied Mathematics and Computation, 2004

Ant Mobility Model Platform for Network Simulator.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2003
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem.
Informatica, Lith. Acad. Sci., 2003

Security of Improvement on Methods for Protecting Password Transmission.
Informatica, Lith. Acad. Sci., 2003

A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem.
Computer Standards & Interfaces, 2003

A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
A Solution to Mobile IP Registration for AAA.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002


  Loading...