Yi-Fan Tseng

According to our database1, Yi-Fan Tseng authored at least 17 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption.
J. Inf. Sci. Eng., 2018

Probably Secure Efficient Anonymous Credential Scheme.
IJSI, 2018

An authenticated re-encryption scheme for secure file transfer in named data networks.
Int. J. Communication Systems, 2018

An Efficient Algorithm for the Shortest Vector Problem.
IEEE Access, 2018

Verifiable Privacy-Preserving Payment Mechanism for Smart Grids.
Proceedings of the Internet and Distributed Computing Systems, 2018

Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

2017
Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal and Information Processing over Networks, 2017

Attribute-Based Encryption from Identity-Based Encryption.
IACR Cryptology ePrint Archive, 2017

Homomorphic encryption supporting logical operations.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

2016
Enabled/disabled predicate encryption in clouds.
Future Generation Comp. Syst., 2016

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

2015
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security.
Symmetry, 2015

Malware Detection Systems Based on API Log Data Mining.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Attribute-Based Proxy Re-encryption with Dynamic Membership.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Anonymous Credential Scheme Supporting Active Revocation.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Secure Certificateless Signature Scheme Supporting Batch Verification.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013


  Loading...