Syh-Yuan Tan

Orcid: 0000-0003-1182-1210

According to our database1, Syh-Yuan Tan authored at least 45 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comment on "An efficient identity-based signature scheme with provable security".
Inf. Sci., February, 2024

2023
Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2023

A Relational Credential System from q-SDH-based Graph Signatures.
IACR Cryptol. ePrint Arch., 2023

New Identity-Based Identification and Signature Schemes in the Standard Model.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2021
An Implementation Suite for a Hybrid Public Key Infrastructure.
Symmetry, 2021

ECQV-IBI: Identity-based identification with implicit certification.
J. Inf. Secur. Appl., 2021

2020
On the Invisibility and Anonymity of Undeniable Signature Schemes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Strengthen user authentication on mobile devices by using user's touch dynamics pattern.
J. Ambient Intell. Humaniz. Comput., 2020

A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols.
IACR Cryptol. ePrint Arch., 2020

MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System.
IACR Cryptol. ePrint Arch., 2020

A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms.
IEEE Access, 2020

2019
A Generic Framework for Accountable Optimistic Fair Exchange Protocol.
Symmetry, 2019

Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things.
IEEE Internet Things J., 2019

Correction to "Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing".
IEEE Access, 2019

A Note on the Invisibility and Anonymity of Undeniable Signature Schemes.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Improving Signature Schemes with Tight Security Reductions.
Proceedings of the Information Security Practice and Experience, 2019

Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
Study of long short-term memory in flow-based network intrusion detection system.
J. Intell. Fuzzy Syst., 2018

Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
IEEE Access, 2018

2017
A Variant of BLS Signature Scheme with Tight Security Reduction.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A variant of Schnorr signature scheme with tight security reduction.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

From Sealed-Bid Electronic Auction to Electronic Cheque.
Proceedings of the Information Science and Applications 2017, 2017

Known Bid Attack on an Electronic Sealed-Bid Auction Scheme.
Proceedings of the Information Science and Applications 2017, 2017

2016
Cryptanalysis of a CP-ABE scheme with policy in normal forms.
Inf. Process. Lett., 2016

Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Cryptogr. Commun., 2016

Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

2015
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Secur. Commun. Networks, 2015

An implementation of enhanced public key infrastructure.
Multim. Tools Appl., 2015

A provable secure pairing-free certificateless identification scheme.
Int. J. Comput. Math., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

Reset-Secure Identity-Based Identification Schemes Without Pairings.
Proceedings of the Provable Security, 2015

Applications of undeniable signature schemes.
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015

A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

On the Security of Two Pairing-Based Signature Schemes.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2013
Argument on biometrics identity-based encryption schemes.
Secur. Commun. Networks, 2013

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2013

On the security of a modified Beth identity-based identification scheme.
Inf. Process. Lett., 2013

An authentication framework for peer-to-peer cloud.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

An Enhanced Public Key Infrastructure.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Efficient encryption with keyword search in mobile networks.
Secur. Commun. Networks, 2012

On the realization of fuzzy identity-based identification scheme using fingerprint biometrics.
Secur. Commun. Networks, 2012

Email Encryption System Using Certificateless Public Key Encryption Scheme.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
On the Security of Two Fuzzy Identity-Based Signature Schemes.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction.
Proceedings of the Future Generation Information Technology, 2011

2010
Java Implementation for Pairing-Based Cryptosystems.
Proceedings of the Computational Science and Its Applications, 2010


  Loading...