Yi-Shiung Yeh

According to our database1, Yi-Shiung Yeh authored at least 36 papers between 1982 and 2013.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms.
J. Inf. Sci. Eng., 2013

A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.
J. Inf. Sci. Eng., 2011

Generalized secure hash algorithm: SHA-X.
Proceedings of EUROCON 2011, 2011

Efficient proxy signcryption scheme with provable CCA and CMA security.
Comput. Math. Appl., 2010

Structural Binary CBC Encryption Mode.
J. Inf. Sci. Eng., 2009

A Study on Parallel RSA Factorization.
J. Comput., 2009

Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Untraceable Identity Management Framework for Mobile Access.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

A genetic algorithm for reliability-oriented task assignment with k~ duplications in distributed systems.
IEEE Trans. Reliab., 2006

Security analysis of transformed-key asymmetric watermarking system.
IEEE Signal Process. Lett., 2006

Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes.
J. Syst. Softw., 2006

Design of Proxy Signature in the Digital Signature Algorithm (DSA).
J. Inf. Sci. Eng., 2006

Forgery attack on the RPC incremental unforgeable encryption scheme.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Comment on traceability on RSA-based partially signature with low computation.
Appl. Math. Comput., 2005

Improving Lamport one-time signature scheme.
Appl. Math. Comput., 2005

An Efficient Decryption Method for RSA Cryptosystem.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

An Extended DES.
J. Inf. Sci. Eng., 2002

A fast algorithm for reliability-oriented task assignment in a distributed system.
Comput. Commun., 2002

Applying lightweight directory access protocol service on session certification authority.
Comput. Networks, 2002

Mental poker game based on a bit commitment scheme through network.
Comput. Networks, 2002

Model calculations to estimate the probability of secret reconstruction in computer environments.
Inf. Manag. Comput. Secur., 2001

A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems.
Comput. Commun., 2001

Dynamic GOST.
J. Inf. Sci. Eng., 2000

Randomization enhanced Chaum's blind signature scheme.
Comput. Commun., 2000

Date attachable electronic cash.
Comput. Commun., 2000

Reduction of the total execution time to achieve the optimal <i>k</i>-node reliability of distributed computing systems using a novel heuristic algorithm.
Comput. Commun., 2000

A Randomization Enhanced Scheme for Chaum's Blind Signature.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

A Probability Model for Reconstructing Secret Sharing under the Internet Environment.
Inf. Sci., 1999

One-Way Hash Functions With Changeable Parameters.
Inf. Sci., 1999

Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999

A Homophonic DES.
Inf. Process. Lett., 1998

A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

A Genetic Algorithm for the Reliability Optimization of a Distributed System.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

Algebraic operations on encryped relational databases.
Inf. Syst., 1993

Multilevel Cryptosecure Relational Database.

Cryptographic Relational Algebra.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982