Chun-I Fan

According to our database1, Chun-I Fan authored at least 82 papers between 1996 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.
IEEE Systems Journal, 2018

Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
JIP, 2018

Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading.
IEEE Internet of Things Journal, 2018

Probably Secure Efficient Anonymous Credential Scheme.
IJSI, 2018

An authenticated re-encryption scheme for secure file transfer in named data networks.
Int. J. Communication Systems, 2018

ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G.
CoRR, 2018

Verifiable Privacy-Preserving Payment Mechanism for Smart Grids.
Proceedings of the Internet and Distributed Computing Systems, 2018

Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal and Information Processing over Networks, 2017

Provably Secure Timed-Release Proxy Conditional Reencryption.
IEEE Systems Journal, 2017

Deniable Searchable Symmetric Encryption.
Inf. Sci., 2017

Attribute-Based Encryption from Identity-Based Encryption.
IACR Cryptology ePrint Archive, 2017

Homomorphic encryption supporting logical operations.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

2016
Privacy enhancement for fair PayWord-based micropayment.
Security and Communication Networks, 2016

Enabled/disabled predicate encryption in clouds.
Future Generation Comp. Syst., 2016

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security.
Symmetry, 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015

Malware Detection Systems Based on API Log Data Mining.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Attribute-Based Proxy Re-encryption with Dynamic Membership.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Encrypted Data Deduplication in Cloud Storage.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid.
IEEE Trans. Industrial Informatics, 2014

Truly Anonymous Paper Submission and Review Scheme.
Trans. Data Privacy, 2014

Arbitrary-State Attribute-Based Encryption with Dynamic Membership.
IEEE Trans. Computers, 2014

An Efficient Authentication and Service Key Agreement Scheme in IOT Environments.
Proceedings of the Intelligent Systems and Applications, 2014

Anonymous Credential Scheme Supporting Active Revocation.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

Strongly Privacy-Preserving Communication Protocol for VANETs.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs.
IEEE Trans. Parallel Distrib. Syst., 2013

Design and implementation of privacy preserving billing protocol for smart grid.
The Journal of Supercomputing, 2013

Multi-recastable e-bidding game with dual-blindness.
Mathematical and Computer Modelling, 2013

User efficient recoverable off-line e-cash scheme with fast anonymity revoking.
Mathematical and Computer Modelling, 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
TIIS, 2013

Controllable privacy preserving search based on symmetric predicate encryption in cloud storage.
Future Generation Comp. Syst., 2013

Active One-Time Password Mechanism for User Authentication.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Anonymous Multi-receiver Certificate-Based Encryption.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

Secure Certificateless Signature Scheme Supporting Batch Verification.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme.
Security and Communication Networks, 2012

Attribute-based strong designated-verifier signature scheme.
Journal of Systems and Software, 2012

Predictive pixel differencing expansion in data reversibility scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings.
J. Inf. Sci. Eng., 2011

IoT-IMS Communication Platform for Future Internet.
IJARAS, 2011

Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Group Signature with Constant Revocation Costs for Signers and Verifiers.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Provably Secure Integrated On/Off-Line Electronic Cash for Flexible and Efficient Payment.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Anonymous Multireceiver Identity-Based Encryption.
IEEE Trans. Computers, 2010

Provably secure randomized blind signature scheme based on bilinear pairing.
Computers & Mathematics with Applications, 2010

2009
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics.
IEEE Trans. Information Forensics and Security, 2009

Fair anonymous rewarding based on electronic cash.
Journal of Systems and Software, 2009

Buyer-seller watermarking protocols with off-line trusted third parties.
IJAHUC, 2009

Cryptanalysis of Lee-Hwang-Yang blind signature scheme.
Computer Standards & Interfaces, 2009

Truly Anonymous Paper Submission and Review Scheme.
Proceedings of the The Forth International Conference on Availability, 2009

2008
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting.
Mathematical and Computer Modelling, 2008

Anonymous Fair Transaction Protocols Based on Electronic Cash.
Int. J. Electronic Commerce, 2008

Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Multi-recastable E-Bidding Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
Customer Efficient Electronic Cash Protocols.
J. Org. Computing and E. Commerce, 2007

Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Buyer-Seller Watermarking Protocols with Off-line Trusted Parties.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.
Proceedings of the Advances in Information and Computer Security, 2007

2006
Ownership-attached unblinding of blind signatures for untraceable electronic cash, .
Inf. Sci., 2006

Fair Transaction Protocols Based on Electronic Cash.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Uncoercible Anonymous Electronic Voting.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Remote Password Authentication Scheme with Smart Cards and Biometrics.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol.
IACR Cryptology ePrint Archive, 2005

Robust remote authentication scheme with smart cards.
Computers & Security, 2005

2003
Improved low-computation partially blind signatures.
Applied Mathematics and Computation, 2003

2002
An unlinkably divisible and intention attachable ticket scheme for runoff elections.
J. Network and Computer Applications, 2002

A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash.
J. Inf. Sci. Eng., 2002

2001
An Efficient Blind Signature Scheme for Information Hiding.
Int. J. Electronic Commerce, 2001

2000
Randomization enhanced Chaum's blind signature scheme.
Computer Communications, 2000

Date attachable electronic cash.
Computer Communications, 2000

A Randomization Enhanced Scheme for Chaum's Blind Signature.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

An Anonymous Electronic Voting Protocol with the Latest Decision on Voters' Intentions.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999

1997
Secure Rewarding Schemes.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
A Multi-Recastable Ticket Scheme for Electronic Elections.
Proceedings of the Advances in Cryptology, 1996


  Loading...