Jen-Ho Yang

According to our database1, Jen-Ho Yang authored at least 28 papers between 2004 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
An Electronic Transaction Mechanism Using Mobile Devices for Cloud Computing.
Wireless Personal Communications, 2017

Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery.
Informatica, Lith. Acad. Sci., 2017

An offline user-verifiable electronic traveler's check system.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

2016
A mobile payment mechanism with anonymity for cloud computing.
Journal of Systems and Software, 2016

2015
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
I. J. Network Security, 2015

2014
A source authentication scheme based on message recovery digital signature for multicast.
Int. J. Communication Systems, 2014

An ID-Based User Authentication Scheme for Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Security and Communication Networks, 2013

An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment.
ITC, 2013

An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices.
Informatica (Slovenia), 2013

A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.
I. J. Network Security, 2013

A user authentication scheme on multi-server environments for cloud computing.
Proceedings of the 9th International Conference on Information, 2013

2012
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users.
Wireless Personal Communications, 2012

An Efficient and Flexible Mobile Payment Protocol.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
An efficient and reliable E-DRM scheme for mobile environments.
Expert Syst. Appl., 2010

2009
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
Journal of Systems and Software, 2009

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Computers & Security, 2009

Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation.
IET Computers & Digital Techniques, 2008

Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2006
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

2005
An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Computer Standards & Interfaces, 2005

An iterative modular multiplication algorithm in RNS.
Applied Mathematics and Computation, 2005

2004
A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math., 2004


  Loading...