Yalin Chen

According to our database1, Yalin Chen authored at least 55 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Design and Implementation of Attitude and Heading Reference System with Extended Kalman Filter Based on MEMS Multi-Sensor Fusion.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

2020
Sliding Mode Control of Truss Bridge Structure with GMMAs.
Proceedings of the 16th International Conference on Computational Intelligence and Security, 2020

2019
A Diffie-Hellman quantum session key establishment protocol without entanglement.
IACR Cryptol. ePrint Arch., 2019

A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography.
IACR Cryptol. ePrint Arch., 2019

A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography.
IACR Cryptol. ePrint Arch., 2019

2018
Retrieval Priming in Product Verification: Evidence From Retrieval-Induced Forgetting.
J. Numer. Cogn., 2018

Stacked K-Means Hashing Quantization for Nearest Neighbor Search.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

2017
No Tranfer of Training in Simple Addition.
Proceedings of the 39th Annual Meeting of the Cognitive Science Society, 2017

2016
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
IACR Cryptol. ePrint Arch., 2016

Improved on an improved remote user authentication scheme with key agreement.
IACR Cryptol. ePrint Arch., 2016

A modified MOEA/D approach to the solution of multi-objective optimal power flow problem.
Appl. Soft Comput., 2016

2015
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking".
Int. J. Netw. Secur., 2015

ECC-based untraceable authentication for large-scale active-tag RFID systems.
Electron. Commer. Res., 2015

2014
Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage".
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis on "Secure untraceable off-line electronic cash system".
IACR Cryptol. ePrint Arch., 2014

Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking".
IACR Cryptol. ePrint Arch., 2014

Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks.
IACR Cryptol. ePrint Arch., 2014

2013
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card.
IACR Cryptol. ePrint Arch., 2013

Comments on Three Multi-Server Authentication Protocols.
IACR Cryptol. ePrint Arch., 2013

ECC-Based Non-Interactive Deniable Authentication with Designated Verifier.
IACR Cryptol. ePrint Arch., 2013

2012
Improved multi-server authentication protocol.
Secur. Commun. Networks, 2012

Comments on four multi-server authentication protocols using smart card.
IACR Cryptol. ePrint Arch., 2012

A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electron. Commer. Res. Appl., 2012

2011
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2011

An Efficient Secure Anonymous Proxy Signature Scheme.
IACR Cryptol. ePrint Arch., 2011

An efficient RFID mutual authentication scheme based on ECC.
IACR Cryptol. ePrint Arch., 2011

Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach.
IACR Cryptol. ePrint Arch., 2011

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem.
IACR Cryptol. ePrint Arch., 2011

Internal pricing strategies design and simulation in virtual enterprise formation.
Expert Syst. Appl., 2011

A novel electronic cash system with trustee-based anonymity revocation from pairing.
Electron. Commer. Res. Appl., 2011

2010
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment.
IACR Cryptol. ePrint Arch., 2010

A secure anonymous communication scheme in vehicular ad hoc networks from pairings.
IACR Cryptol. ePrint Arch., 2010

A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem.
IACR Cryptol. ePrint Arch., 2010

Comment on four two-party authentication protocols.
IACR Cryptol. ePrint Arch., 2010

Comments on five smart card based password authentication protocols.
IACR Cryptol. ePrint Arch., 2010

A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis on Four Two-Party Authentication Protocols
CoRR, 2010

2009
An Efficient Secure Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2009

A Novel ID-based Electronic Cash System from Pairings.
IACR Cryptol. ePrint Arch., 2009

A novel multi-server authentication protocol.
IACR Cryptol. ePrint Arch., 2009

Improvements on two password-based authentication protocols.
IACR Cryptol. ePrint Arch., 2009

2008
Comments on two password based protocols.
IACR Cryptol. ePrint Arch., 2008

Comments on two multi-server authentication protocols.
IACR Cryptol. ePrint Arch., 2008

An efficient session key generation for NTDR networks based on bilinear paring.
Comput. Commun., 2008

A novel mutual authentication scheme based on quadratic residues for RFID systems.
Comput. Networks, 2008

2007
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking.
IACR Cryptol. ePrint Arch., 2007

2006
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006

A ID-Based Deniable Authentication Protocol on pairings.
IACR Cryptol. ePrint Arch., 2006

An improvement of an efficient user identification scheme based on ID-based cryptosystem.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols.
IACR Cryptol. ePrint Arch., 2005

Improvement of Manik et al.¡¦s remote user authentication scheme.
IACR Cryptol. ePrint Arch., 2005

The Pricing Strategies for Agents in Real E-commerce.
Proceedings of the Internet and Network Economics, First International Workshop, 2005

How the Enterprise Choosing Strategic Action: Modeling, Algorithm and Simulation.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

How to build bargaining agents in the e-commerce modeling and analysis.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005


  Loading...