Jinn-ke Jan

According to our database1, Jinn-ke Jan authored at least 87 papers between 1990 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


An Interpolative AMBTC-based high-payload RDH scheme for encrypted images.
Signal Process. Image Commun., 2019

A new approach of lossy image compression based on hybrid image resizing techniques.
Int. Arab J. Inf. Technol., 2019

A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy.
J. Netw. Intell., 2018

Effective quality improvement of upscaled images by differential image scheme.
Proceedings of the 12th International Conference on Natural Computation, 2016

Equalized CR-dropping for Image Compression.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

A high capacity data hiding scheme for binary images based on block patterns.
J. Syst. Softw., 2014

Towards secure and efficient user authentication scheme using smart card for multi-server environments.
J. Supercomput., 2013

A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System.
J. Medical Syst., 2013

The design of speedy seamless safe messaging mechanism in VANET.
Int. J. Comput. Math., 2013

A Secure EHR System Based on Hybrid Clouds.
J. Medical Syst., 2012

A Design of Tamper Resistant Prescription RFID Access Control System.
J. Medical Syst., 2012

On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management.
KSII Trans. Internet Inf. Syst., 2012

Two Phased Decompression Scheme for Quality Improvement of Vector Quantized Images.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

A tagged-product ownership transfer mechanism used in retailer and second-hand transaction.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
CoRR, 2011

The design of RFID access control protocol using the strategy of indefinite-index and challenge-response.
Comput. Commun., 2011

Study and Implementation of RFID Eseals for Power Meters.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

A secure negotiable on-demand services model for cloud environment.
Proceedings of EUROCON 2011, 2011

A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping.
Proceedings of the 2011 International Conference on Broadband, 2011

A Provable Billing Protocol on the Current UMTS.
Wirel. Pers. Commun., 2010

A cocktail protocol with the Authentication and Key Agreement on the UMTS.
J. Syst. Softw., 2010

Using Mobile Device to Design a Secure Transaction.
Proceedings of the CISIS 2010, 2010

Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS.
Int. J. Netw. Manag., 2009

NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Informaticae, 2009

The UMTS-AKA Protocols for Intelligent Transportation Systems.
EURASIP J. Wirel. Commun. Netw., 2009

A Low-cost RFID Authentication Protocol with Location Privacy Protection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Mobile Ticket System Based on Personal Trusted Device.
Wirel. Pers. Commun., 2007

A tree-based scheme for security of many-to-many communications.
J. High Speed Networks, 2007

An innovative revocation scheme for one-to-many E-services.
Electron. Commer. Res. Appl., 2007

A simple mobile communication billing system among charged parties.
Appl. Math. Comput., 2007

A Secure Authentication Scheme for a Public Terminal Before a Transaction.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Novel Steganographic Schemes Based on Row-Major Mapping Relation.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Enhancement of digital signature with message recovery using self-certified public keys and its variants.
ACM SIGOPS Oper. Syst. Rev., 2005

Design of a fair proxy raffle protocol on the Internet.
Comput. Stand. Interfaces, 2005

A fair and secure mobile billing system.
Comput. Networks, 2005

A novel proxy deposit protocol for e-cash systems.
Appl. Math. Comput., 2005

Cryptanalysis of log-in authentication based on circle property.
IEEE Trans. Consumer Electron., 2004

Solving the invalid signer-verified signature problem and comments on Xia-You group signature.
J. Syst. Softw., 2004

Cryptanalysis of a threshold proxy signature with known signers.
IACR Cryptol. ePrint Arch., 2004

An Enhanced and Secure Protocol for Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2004

A Provable Secure Scheme for Partially Blind Signatures.
IACR Cryptol. ePrint Arch., 2004

A Secure and Efficient Key Exchange Protocol for Mobile Communications.
IACR Cryptol. ePrint Arch., 2004

A Provably Secure Scheme for Restrictive Partially Blind Signatures.
IACR Cryptol. ePrint Arch., 2004

The design of a secure anonymous Internet voting system.
Comput. Secur., 2004

Improved authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2004

An Efficient Group Signature Based on the Discrete Logarithm Problem.
Proceedings of the iiWAS'2004, 2004

A Secure Scheme for Restrictive Partially Blind Signatures.
Proceedings of the iiWAS'2004, 2004

A New Efficient MAKEP for Wireless Communications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A provable secure access control using smart cards.
IEEE Trans. Consumer Electron., 2003

A hybrid authentication protocol for large mobile network.
J. Syst. Softw., 2003

Partially Blind Threshold Signature Based on RSA.
Informatica, 2003

New hierarchical assignment without Public Key cryptography.
Comput. Secur., 2003

Robust and Simple Authentication Protocol.
Comput. J., 2003

Authenticated encryption schemes with message linkages for message flows.
Comput. Electr. Eng., 2003

Digital signature with message recovery using self-certified public keys and its variants.
Appl. Math. Comput., 2003

Cryptanalysis on Mu-Varadharajan's e-voting schemes.
Appl. Math. Comput., 2003

Forgery attacks on "Multisignature schemes for authenticating mobile code delegates".
IEEE Trans. Veh. Technol., 2002

An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs.
J. Inf. Sci. Eng., 2002

A secure anonymous voting protocol with a complete supervision.
Comput. Syst. Sci. Eng., 2002

An Efficient and Practical Solution to Remote Authentication: Smart Card.
Comput. Secur., 2002

A modified remote login authentication scheme based on geometric approach.
J. Syst. Softw., 2001

Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett., 2001

On the Security of Methods for Protecting Password Transmission.
Informatica, 2001

Generalized group-oriented cryptosystem with authenticated sender.
Comput. Syst. Sci. Eng., 2001

A Wireless-based Authentication and Anonymous Channels for Large Scale Area.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

RSA-Based Partially Blind Signature with Low Computation.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

A displacement addressing method for letter-oriented keys.
J. Syst. Softw., 1999

A Novel ID-based Group Signature.
Inf. Sci., 1999

Attacks on Threshold Signature Schemes with Traceable Signers.
Inf. Process. Lett., 1999

Anonymous conference key distribution systems based on the discrete logarithm problem.
Comput. Commun., 1999

New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

"Paramita wisdom" password authentication scheme without verification tables.
J. Syst. Softw., 1998

A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy.
Inf. Sci., 1998

ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

A secure electronic voting protocol with IC cards.
J. Syst. Softw., 1997

A Digital Signature Scheme Based upon the Theory of Quadratic residues.
Cryptologia, 1997

On the Security of Image Encryption Method.
Inf. Process. Lett., 1996

A New Dynamic Access Control Method Using Binary Locks.
J. Inf. Sci. Eng., 1995

A scheme to determine the relationship between two users in a hierarchy.
Comput. Secur., 1994

A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files.
BIT Comput. Sci. Sect., 1993

A dynamic key-lock-pair access control scheme.
Comput. Secur., 1991

On the Design of a Machine-Independent Perfect Hashing Scheme.
Comput. J., 1991

A single-key access control scheme in information protection systems.
Inf. Sci., 1990