• 261 Citations
  • 10 h-Index
19972019
If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Sen-Shan Huang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 5 Similar Profiles
Cryptography Engineering & Materials Science
Authentication Engineering & Materials Science
Ramanujan Mathematics
Signature Scheme Mathematics
Signature Mathematics
Continued fraction Mathematics
Servers Engineering & Materials Science
Public key cryptography Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1997 2019

  • 261 Citations
  • 10 h-Index
  • 36 Article
  • 3 Conference contribution

An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2019 Dec, In : IEEE Systems Journal. 13, 4, p. 3968-3979 12 p., 8643744.

Research output: Contribution to journalArticle

Communication
Side channel attack

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

Wu, J. D., Tseng, Y-M., Huang, S-S. & Tsai, T. T., 2019 Jan 1, In : IEEE Access. 7, p. 19041-19053 13 p., 8630914.

Research output: Contribution to journalArticle

Cryptography
Public key cryptography
Energy utilization
Side channel attack
5 Citations (Scopus)

Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2018 Jan 26, In : IEEE Access. 6, p. 17130-17142 13 p.

Research output: Contribution to journalArticle

Costs
Side channel attack
5 Citations (Scopus)

Identity-based encryption with cloud revocation authority and its applications

Tseng, Y-M., Tsai, T. T., Huang, S-S. & Huang, C. P., 2018 Oct 1, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1041-1053 13 p., 7430324.

Research output: Contribution to journalArticle

Cryptography
Outsourcing
Authentication
Scalability
Communication
1 Citation (Scopus)

Leakage-resilient certificateless key encapsulation scheme

Wu, J. D., Tseng, Y-M., Huang, S-S. & Chou, W. C., 2018 Jan 1, In : Informatica (Netherlands). 29, 1, p. 125-155 31 p.

Research output: Contribution to journalArticle

Encapsulation
Leakage
Side Channel Attacks
Public key cryptography
Cryptography