Sen-Shan Huang

According to our database1, Sen-Shan Huang authored at least 42 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings.
IEEE Access, 2024

2023
Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks.
IEEE Syst. J., June, 2023

Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications.
Informatica, 2023

Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model.
IEEE Access, 2023

Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme.
IEEE Access, 2023

2022
Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol.
IEEE Open J. Comput. Soc., 2022

Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority.
Informatica, 2022

Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model.
IEEE Access, 2022

Practical Leakage-resilient Signcryption Scheme Suitable for Mobile Environments.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

Equality Test of Ciphertexts in Certificateless Public Key Systems with an Outsourced Revocation Authority.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022

2021
An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices.
IEEE Syst. J., 2021

A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices.
Comput. Networks, 2021

A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism.
IEEE Access, 2021

2020
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage.
IEEE Open J. Comput. Soc., 2020

Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server.
Inf. Technol. Control., 2020

Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority.
Informatica, 2020

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks.
IEEE Access, 2020

2019
An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage.
IEEE Syst. J., 2019

Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices.
Informatica, 2019

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks.
IEEE Access, 2019

2018
Identity-Based Encryption with Cloud Revocation Authority and Its Applications.
IEEE Trans. Cloud Comput., 2018

Leakage-Resilient Certificateless Signature Under Continual Leakage Model.
Inf. Technol. Control., 2018

Leakage-Resilient Certificateless Key Encapsulation Scheme.
Informatica, 2018

Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model.
IEEE Access, 2018

2017
Lattice-Based Revocable Certificateless Signature.
Symmetry, 2017

Efficient Anonymous Multireceiver Certificateless Encryption.
IEEE Syst. J., 2017

Revocable ID-Based Signature with Short Size over Lattices.
Secur. Commun. Networks, 2017

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices.
Informatica, 2017

Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments.
Int. J. Commun. Syst., 2017

Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems.
IEEE Access, 2017

2016
List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures.
IEEE Trans. Emerg. Top. Comput., 2016

Leakage-resilient ID-based signature scheme in the generic bilinear group model.
Secur. Commun. Networks, 2016

A Short Certificate-based Signature Scheme with Provable Security.
Inf. Technol. Control., 2016

A Revocable Certificateless Short Signature Scheme and Its Authentication Application.
Informatica, 2016

Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016

2015
Enhancement on strongly secure group key agreement.
Secur. Commun. Networks, 2015

Efficient revocable certificateless public key encryption with a delegated revocation authority.
Secur. Commun. Networks, 2015

Certificateless Signature with Strong Unforgeability in the Standard Model.
Informatica, 2015

A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices.
Int. J. Distributed Sens. Networks, 2015

Leakage-Free ID-Based Signature.
Comput. J., 2015

2014
Strongly Secure Revocable ID-based Signature without Random Oracles.
Inf. Technol. Control., 2014

Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles.
Informatica, 2014


  Loading...