Jinn-ke Jan

According to our database1, Jinn-ke Jan authored at least 87 papers between 1990 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images.
Signal Process. Image Commun., 2019

A new approach of lossy image compression based on hybrid image resizing techniques.
Int. Arab J. Inf. Technol., 2019

2018
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy.
J. Netw. Intell., 2018

2016
Effective quality improvement of upscaled images by differential image scheme.
Proceedings of the 12th International Conference on Natural Computation, 2016

2015
Equalized CR-dropping for Image Compression.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
A high capacity data hiding scheme for binary images based on block patterns.
J. Syst. Softw., 2014

2013
Towards secure and efficient user authentication scheme using smart card for multi-server environments.
J. Supercomput., 2013

A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System.
J. Medical Syst., 2013

The design of speedy seamless safe messaging mechanism in VANET.
Int. J. Comput. Math., 2013

2012
A Secure EHR System Based on Hybrid Clouds.
J. Medical Syst., 2012

A Design of Tamper Resistant Prescription RFID Access Control System.
J. Medical Syst., 2012

On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management.
KSII Trans. Internet Inf. Syst., 2012

Two Phased Decompression Scheme for Quality Improvement of Vector Quantized Images.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
A tagged-product ownership transfer mechanism used in retailer and second-hand transaction.
Int. J. Radio Freq. Identif. Technol. Appl., 2011

A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
CoRR, 2011

The design of RFID access control protocol using the strategy of indefinite-index and challenge-response.
Comput. Commun., 2011

Study and Implementation of RFID Eseals for Power Meters.
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011

A secure negotiable on-demand services model for cloud environment.
Proceedings of EUROCON 2011, 2011

A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping.
Proceedings of the 2011 International Conference on Broadband, 2011

2010
A Provable Billing Protocol on the Current UMTS.
Wirel. Pers. Commun., 2010

A cocktail protocol with the Authentication and Key Agreement on the UMTS.
J. Syst. Softw., 2010

Using Mobile Device to Design a Secure Transaction.
Proceedings of the CISIS 2010, 2010

Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS.
Int. J. Netw. Manag., 2009

NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Informaticae, 2009

The UMTS-AKA Protocols for Intelligent Transportation Systems.
EURASIP J. Wirel. Commun. Netw., 2009

A Low-cost RFID Authentication Protocol with Location Privacy Protection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2007
A Mobile Ticket System Based on Personal Trusted Device.
Wirel. Pers. Commun., 2007

A tree-based scheme for security of many-to-many communications.
J. High Speed Networks, 2007

An innovative revocation scheme for one-to-many E-services.
Electron. Commer. Res. Appl., 2007

A simple mobile communication billing system among charged parties.
Appl. Math. Comput., 2007

A Secure Authentication Scheme for a Public Terminal Before a Transaction.
Proceedings of the Network-Based Information Systems, First International Conference, 2007

Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007

A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
Novel Steganographic Schemes Based on Row-Major Mapping Relation.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Enhancement of digital signature with message recovery using self-certified public keys and its variants.
ACM SIGOPS Oper. Syst. Rev., 2005

Design of a fair proxy raffle protocol on the Internet.
Comput. Stand. Interfaces, 2005

A fair and secure mobile billing system.
Comput. Networks, 2005

A novel proxy deposit protocol for e-cash systems.
Appl. Math. Comput., 2005

2004
Cryptanalysis of log-in authentication based on circle property.
IEEE Trans. Consumer Electron., 2004

Solving the invalid signer-verified signature problem and comments on Xia-You group signature.
J. Syst. Softw., 2004

Cryptanalysis of a threshold proxy signature with known signers.
IACR Cryptol. ePrint Arch., 2004

An Enhanced and Secure Protocol for Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2004

A Provable Secure Scheme for Partially Blind Signatures.
IACR Cryptol. ePrint Arch., 2004

A Secure and Efficient Key Exchange Protocol for Mobile Communications.
IACR Cryptol. ePrint Arch., 2004

A Provably Secure Scheme for Restrictive Partially Blind Signatures.
IACR Cryptol. ePrint Arch., 2004

The design of a secure anonymous Internet voting system.
Comput. Secur., 2004

Improved authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2004

An Efficient Group Signature Based on the Discrete Logarithm Problem.
Proceedings of the iiWAS'2004, 2004

A Secure Scheme for Restrictive Partially Blind Signatures.
Proceedings of the iiWAS'2004, 2004

A New Efficient MAKEP for Wireless Communications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
A provable secure access control using smart cards.
IEEE Trans. Consumer Electron., 2003

A hybrid authentication protocol for large mobile network.
J. Syst. Softw., 2003

Partially Blind Threshold Signature Based on RSA.
Informatica, 2003

New hierarchical assignment without Public Key cryptography.
Comput. Secur., 2003

Robust and Simple Authentication Protocol.
Comput. J., 2003

Authenticated encryption schemes with message linkages for message flows.
Comput. Electr. Eng., 2003

Digital signature with message recovery using self-certified public keys and its variants.
Appl. Math. Comput., 2003

Cryptanalysis on Mu-Varadharajan's e-voting schemes.
Appl. Math. Comput., 2003

2002
Forgery attacks on "Multisignature schemes for authenticating mobile code delegates".
IEEE Trans. Veh. Technol., 2002

An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs.
J. Inf. Sci. Eng., 2002

A secure anonymous voting protocol with a complete supervision.
Comput. Syst. Sci. Eng., 2002

An Efficient and Practical Solution to Remote Authentication: Smart Card.
Comput. Secur., 2002

2001
A modified remote login authentication scheme based on geometric approach.
J. Syst. Softw., 2001

Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett., 2001

On the Security of Methods for Protecting Password Transmission.
Informatica, 2001

Generalized group-oriented cryptosystem with authenticated sender.
Comput. Syst. Sci. Eng., 2001

A Wireless-based Authentication and Anonymous Channels for Large Scale Area.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

RSA-Based Partially Blind Signature with Low Computation.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

1999
A displacement addressing method for letter-oriented keys.
J. Syst. Softw., 1999

A Novel ID-based Group Signature.
Inf. Sci., 1999

Attacks on Threshold Signature Schemes with Traceable Signers.
Inf. Process. Lett., 1999

Anonymous conference key distribution systems based on the discrete logarithm problem.
Comput. Commun., 1999

New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
"Paramita wisdom" password authentication scheme without verification tables.
J. Syst. Softw., 1998

A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy.
Inf. Sci., 1998

ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
A secure electronic voting protocol with IC cards.
J. Syst. Softw., 1997

A Digital Signature Scheme Based upon the Theory of Quadratic residues.
Cryptologia, 1997

1996
On the Security of Image Encryption Method.
Inf. Process. Lett., 1996

1995
A New Dynamic Access Control Method Using Binary Locks.
J. Inf. Sci. Eng., 1995

1994
A scheme to determine the relationship between two users in a hierarchy.
Comput. Secur., 1994

1993
A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files.
BIT Comput. Sci. Sect., 1993

1991
A dynamic key-lock-pair access control scheme.
Comput. Secur., 1991

On the Design of a Machine-Independent Perfect Hashing Scheme.
Comput. J., 1991

1990
A single-key access control scheme in information protection systems.
Inf. Sci., 1990


  Loading...