118 results on '"Yuh-Min Tseng"'
Search Results
2. Leakage-Resilient Hybrid Signcryption in Heterogeneous Public-key Systems.
3. Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings.
4. Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications.
5. Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks.
6. Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model.
7. Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme.
8. Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority.
9. Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model.
10. Leakage-Resilient Certificate-Based Authenticated Key Exchange Protocol.
11. An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices.
12. A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism.
13. Practical Leakage-resilient Signcryption Scheme Suitable for Mobile Environments.
14. Equality Test of Ciphertexts in Certificateless Public Key Systems with an Outsourced Revocation Authority.
15. Exploration of Fast Edible Oil Classification Using Infrared Spectrum, Machine Learning, and Chemometrics.
16. Finding Longest (s, t)-paths of O-shaped Supergrid Graphs in Linear Time.
17. Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server.
18. Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority.
19. A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks.
20. Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage.
21. Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments.
22. Some Study of Applying Infra-Red in Agriculture IoT.
23. Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices.
24. An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage.
25. Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks.
26. Leakage-Resilient Certificateless Signature Under Continual Leakage Model.
27. Leakage-Resilient Certificateless Key Encapsulation Scheme.
28. Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model.
29. Identity-Based Encryption with Cloud Revocation Authority and Its Applications.
30. Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage.
31. An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP.
32. SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices.
33. Efficient Anonymous Multireceiver Certificateless Encryption.
34. Revocable ID-Based Signature with Short Size over Lattices.
35. Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems.
36. CAKE: Compatible Authentication and Key Exchange Protocol for a Smart City in 5G Networks.
37. A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices.
38. A Short Certificate-based Signature Scheme with Provable Security.
39. A Revocable Certificateless Short Signature Scheme and Its Authentication Application.
40. Leakage-resilient ID-based signature scheme in the generic bilinear group model.
41. List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures.
42. CCA-secure Anonymous Multi-receiver ID-based Encryption.
43. Revocable ID-based Signature Scheme with Batch Verifications.
44. A Novel Convinced Diffie-Hellman Computation Scheme and Its Cryptographic Application.
45. A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices.
46. Certificateless Signature with Strong Unforgeability in the Standard Model.
47. Revocable Certificateless Public Key Encryption.
48. Enhancement on strongly secure group key agreement.
49. Efficient revocable certificateless public key encryption with a delegated revocation authority.
50. Leakage-Free ID-Based Signature.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.