Yi-Fan Tseng

According to our database1, Yi-Fan Tseng authored at least 20 papers between 2013 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


FGAC-NDN: Fine-Grained Access Control for Named Data Networks.
IEEE Trans. Network and Service Management, 2019

Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption.
J. Inf. Sci. Eng., 2018

Probably Secure Efficient Anonymous Credential Scheme.
IJSI, 2018

An authenticated re-encryption scheme for secure file transfer in named data networks.
Int. J. Communication Systems, 2018

An Efficient Algorithm for the Shortest Vector Problem.
IEEE Access, 2018

Verifiable Privacy-Preserving Payment Mechanism for Smart Grids.
Proceedings of the Internet and Distributed Computing Systems, 2018

Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal and Information Processing over Networks, 2017

Attribute-Based Encryption from Identity-Based Encryption.
IACR Cryptology ePrint Archive, 2017

Homomorphic encryption supporting logical operations.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

Enabled/disabled predicate encryption in clouds.
Future Generation Comp. Syst., 2016

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security.
Symmetry, 2015

Malware Detection Systems Based on API Log Data Mining.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Attribute-Based Proxy Re-encryption with Dynamic Membership.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Anonymous Credential Scheme Supporting Active Revocation.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

Secure Certificateless Signature Scheme Supporting Batch Verification.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013