# Yi-Shiung Yeh

According to our database

Collaborative distances:

^{1}, Yi-Shiung Yeh authored at least 36 papers between 1982 and 2013.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2013

Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms.

J. Inf. Sci. Eng., 2013

2011

A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.

J. Inf. Sci. Eng., 2011

Proceedings of EUROCON 2011, 2011

2010

Comput. Math. Appl., 2010

2009

J. Inf. Sci. Eng., 2009

J. Comput., 2009

2008

Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2006

A genetic algorithm for reliability-oriented task assignment with k~ duplications in distributed systems.

IEEE Trans. Reliab., 2006

IEEE Signal Process. Lett., 2006

Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes.

J. Syst. Softw., 2006

J. Inf. Sci. Eng., 2006

Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005

Appl. Math. Comput., 2005

Appl. Math. Comput., 2005

Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2002

J. Inf. Sci. Eng., 2002

A fast algorithm for reliability-oriented task assignment in a distributed system.

Comput. Commun., 2002

Applying lightweight directory access protocol service on session certification authority.

Comput. Networks, 2002

Comput. Networks, 2002

2001

Model calculations to estimate the probability of secret reconstruction in computer environments.

Inf. Manag. Comput. Secur., 2001

A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems.

Comput. Commun., 2001

2000

J. Inf. Sci. Eng., 2000

Comput. Commun., 2000

Comput. Commun., 2000

Reduction of the total execution time to achieve the optimal <i>k</i>-node reliability of distributed computing systems using a novel heuristic algorithm.

Comput. Commun., 2000

A Randomization Enhanced Scheme for Chaum's Blind Signature.

Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999

A Probability Model for Reconstructing Secret Sharing under the Internet Environment.

Inf. Sci., 1999

Inf. Sci., 1999

Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.

Proceedings of the 1st International Conference on Enterprise Information Systems, 1999

1998

Inf. Process. Lett., 1998

A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet.

Proceedings of the International Conference on Parallel and Distributed Systems, 1998

Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1993

Inf. Syst., 1993

1986

Multilevel Cryptosecure Relational Database.

EUROCRYPT, 1986

1982

Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982