Narn-Yih Lee

According to our database1, Narn-Yih Lee authored at least 40 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hardware Implementation of High-Throughput S-Box in AES for Information Security.
IEEE Access, 2023

2017
Privacy Protection Technology and Access Control Mechanism for Medical Big Data.
Proceedings of the 6th IIAI International Congress on Advanced Applied Informatics, 2017

2013
Cloud Server Aided Computation for ElGamal Elliptic Curve Cryptosystem.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

2011
Hybrid Provable Data Possession at Untrusted Stores in Cloud Computing.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2009
User Friendly Digital Rights Management System Based on Smart Cards.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

2008
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings.
Comput. Electr. Eng., 2008

2007
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem.
Informatica, 2007

Web Metering Scheme Based on the Bilinear Pairings.
IEICE Trans. Inf. Syst., 2007

Yet Another Wavelet Watermarking Scheme for Copyright Protection.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

2005
Verifiable Oblivious Transfer Protocol.
IEICE Trans. Inf. Syst., 2005

Improvement of One-Time Password Authentication Scheme Using Smart Cards.
IEICE Trans. Commun., 2005

Improved remote authentication scheme with smart card.
Comput. Stand. Interfaces, 2005

The design of integrating subliminal channel with access control.
Appl. Math. Comput., 2005

The security of a strong proxy signature scheme with proxy signer privacy protection.
Appl. Math. Comput., 2005

2004
Improved authentication key exchange protocol without using one-way hash function.
ACM SIGOPS Oper. Syst. Rev., 2004

Comments on multiparty key exchange scheme.
ACM SIGOPS Oper. Syst. Rev., 2004

Further improvement on the modified authenticated key agreement scheme.
Appl. Math. Comput., 2004

Convertible undeniable signature with subliminal channels.
Appl. Math. Comput., 2004

2003
Digital signature with a threshold subliminal channel.
IEEE Trans. Consumer Electron., 2003

Analysis on Traceability on Stadler et al.'s Fair Blind Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Robust Digital Signature Scheme with Subliminal Channels.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2002
The Security of the Improvement on the Generalization of Threshold Signature and Authenticated Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
New Multistage Secret Sharing Scheme Based on Factorization Problem.
J. Inf. Sci. Eng., 2001

2000
(t, n) Threshold Untraceable Signatures.
J. Inf. Sci. Eng., 2000

(T, N) Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders.
Cryptologia, 2000

1999
Comments on Two Group Signatures.
Inf. Process. Lett., 1999

The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Inf. Process. Lett., 1999

Group-oriented undeniable signature schemes with a trusted center.
Comput. Commun., 1999

On the security of fair blind signature scheme using oblivious transfer.
Comput. Commun., 1999

Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy".
Comput. Commun., 1999

On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.
Proceedings of the Information Security, Second International Workshop, 1999

Cryptanalysis of Two Group Signature Schemes.
Proceedings of the Information Security, Second International Workshop, 1999

1998
On Zhang's Nonrepudiable Proxy Signature Schemes.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1996
On the security of Park et al.'s key distribution protocol for digital mobile communications.
Proceedings of the 7th IEEE International Symposium on Personal, 1996

1995
Two Attacks on Neuman-Stubblebine Authentication Protocols.
Inf. Process. Lett., 1995

On the security of Wu and Yeh's conference key distribution system.
Comput. Commun., 1995

1994
A Pseudo-Key Scheme for Dynamic Access Control in a Hierarchy.
J. Inf. Sci. Eng., 1994

Conspiracy Attacks on the Threshold RSA Signature Scheme.
Cryptologia, 1994

Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.
Proceedings of the Advances in Cryptology, 1994

1993
Remark on the Threshold RSA Signature Scheme.
Proceedings of the Advances in Cryptology, 1993


  Loading...