Ting Yi Chang

According to our database1, Ting Yi Chang authored at least 28 papers between 2002 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Password Authenticated Key Exchange and Protected Password Change Protocols.
Symmetry, 2017

2013
A New Group Signature Scheme Based on RSA Assumption.
Inf. Technol. Control., 2013

2012
Cryptanalysis on an Improved Version of ElGamal-Like Public-Key Encryption Scheme for Encrypting Large Messages.
Informatica, 2012

2011
An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem.
Inf. Technol. Control., 2011

A communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2011

User-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications.
Int. J. Mob. Commun., 2011

An ID-based multi-signer universal designated multi-verifier signature scheme.
Inf. Comput., 2011

2010
An Computation-Efficient Generalized Group-Oriented Cryptosystem.
Informatica, 2010

Cryptanalysis of Security Enhancement for a Modified Authenticated Key Agreement Protocol.
Int. J. Netw. Secur., 2010

2009
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks.
Comput. Commun., 2009

2008
A Convertible Multi-Authenticated Encryption scheme for group communications.
Inf. Sci., 2008

2005
A new multi-stage secret sharing scheme using one-way function.
ACM SIGOPS Oper. Syst. Rev., 2005

Threshold Signatures: Current Status and Key Issues.
Int. J. Netw. Secur., 2005

A simple broadcasting cryptosystem in computer networks using eXclusive-OR.
Int. J. Comput. Appl. Technol., 2005

Mobile IP Assistance in Ad Hoc Routing Security Using Geometric Properties of Lines.
IEICE Trans. Commun., 2005

An improvement of the Yang-Shieh password authentication schemes.
Appl. Math. Comput., 2005

Cryptanalysis of the improved authenticated key agreement protocol.
Appl. Math. Comput., 2005

An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme.
Appl. Math. Comput., 2005

2004
Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks.
Informatica, 2004

A threshold signature scheme for group communications without a shared distribution center.
Future Gener. Comput. Syst., 2004

A (t, n) multi-secret sharing scheme.
Appl. Math. Comput., 2004

On the Security of an Enhanced Authentication Key Exchange Protocol.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem.
Informatica, 2003

Security of Improvement on Methods for Protecting Password Transmission.
Informatica, 2003

A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem.
Comput. Stand. Interfaces, 2003

A Novel Mobile IP Registration Scheme for Hierarchical Mobility Management.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

2002
Broadcasting Cryptosystem in Computer Networks Using Geometric Properties of Lines.
J. Inf. Sci. Eng., 2002

A Solution to Mobile IP Registration for AAA.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002


  Loading...