Yalin Chen

According to our database1, Yalin Chen authored at least 54 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Diffie-Hellman quantum session key establishment protocol without entanglement.
IACR Cryptology ePrint Archive, 2019

A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography.
IACR Cryptology ePrint Archive, 2019

A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography.
IACR Cryptology ePrint Archive, 2019

2018
Retrieval Priming in Product Verification: Evidence From Retrieval-Induced Forgetting.
JNC, 2018

Stacked K-Means Hashing Quantization for Nearest Neighbor Search.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

2017
No Tranfer of Training in Simple Addition.
Proceedings of the 39th Annual Meeting of the Cognitive Science Society, 2017

2016
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
IACR Cryptology ePrint Archive, 2016

Improved on an improved remote user authentication scheme with key agreement.
IACR Cryptology ePrint Archive, 2016

A modified MOEA/D approach to the solution of multi-objective optimal power flow problem.
Appl. Soft Comput., 2016

2015
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking".
I. J. Network Security, 2015

ECC-based untraceable authentication for large-scale active-tag RFID systems.
Electronic Commerce Research, 2015

2014
Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage".
IACR Cryptology ePrint Archive, 2014

Cryptanalysis on "Secure untraceable off-line electronic cash system".
IACR Cryptology ePrint Archive, 2014

Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking".
IACR Cryptology ePrint Archive, 2014

Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks.
IACR Cryptology ePrint Archive, 2014

2013
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card.
IACR Cryptology ePrint Archive, 2013

Comments on Three Multi-Server Authentication Protocols.
IACR Cryptology ePrint Archive, 2013

ECC-Based Non-Interactive Deniable Authentication with Designated Verifier.
IACR Cryptology ePrint Archive, 2013

2012
Improved multi-server authentication protocol.
Security and Communication Networks, 2012

Comments on four multi-server authentication protocols using smart card.
IACR Cryptology ePrint Archive, 2012

A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electronic Commerce Research and Applications, 2012

2011
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing.
IACR Cryptology ePrint Archive, 2011

An Efficient Secure Anonymous Proxy Signature Scheme.
IACR Cryptology ePrint Archive, 2011

An efficient RFID mutual authentication scheme based on ECC.
IACR Cryptology ePrint Archive, 2011

Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach.
IACR Cryptology ePrint Archive, 2011

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem.
IACR Cryptology ePrint Archive, 2011

Internal pricing strategies design and simulation in virtual enterprise formation.
Expert Syst. Appl., 2011

A novel electronic cash system with trustee-based anonymity revocation from pairing.
Electronic Commerce Research and Applications, 2011

2010
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment.
IACR Cryptology ePrint Archive, 2010

A secure anonymous communication scheme in vehicular ad hoc networks from pairings.
IACR Cryptology ePrint Archive, 2010

A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem.
IACR Cryptology ePrint Archive, 2010

Comment on four two-party authentication protocols.
IACR Cryptology ePrint Archive, 2010

Comments on five smart card based password authentication protocols.
IACR Cryptology ePrint Archive, 2010

A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings.
IACR Cryptology ePrint Archive, 2010

Cryptanalysis on Four Two-Party Authentication Protocols
CoRR, 2010

Comments on Five Smart Card Based Password Authentication Protocols
CoRR, 2010

2009
An Efficient Secure Oblivious Transfer.
IACR Cryptology ePrint Archive, 2009

A Novel ID-based Electronic Cash System from Pairings.
IACR Cryptology ePrint Archive, 2009

A novel multi-server authentication protocol.
IACR Cryptology ePrint Archive, 2009

Improvements on two password-based authentication protocols.
IACR Cryptology ePrint Archive, 2009

2008
Comments on two password based protocols.
IACR Cryptology ePrint Archive, 2008

Comments on two multi-server authentication protocols.
IACR Cryptology ePrint Archive, 2008

An efficient session key generation for NTDR networks based on bilinear paring.
Computer Communications, 2008

A novel mutual authentication scheme based on quadratic residues for RFID systems.
Computer Networks, 2008

2007
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring.
IACR Cryptology ePrint Archive, 2007

Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking.
IACR Cryptology ePrint Archive, 2007

2006
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings.
IACR Cryptology ePrint Archive, 2006

A ID-Based Deniable Authentication Protocol on pairings.
IACR Cryptology ePrint Archive, 2006

An improvement of an efficient user identification scheme based on ID-based cryptosystem.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols.
IACR Cryptology ePrint Archive, 2005

Improvement of Manik et al.¡¦s remote user authentication scheme.
IACR Cryptology ePrint Archive, 2005

The Pricing Strategies for Agents in Real E-commerce.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

How the Enterprise Choosing Strategic Action: Modeling, Algorithm and Simulation.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

How to build bargaining agents in the e-commerce modeling and analysis.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005


  Loading...