• 971 Citations
  • 16 h-Index
20022018
If you made any changes in Pure these will be visible here soon.

Research Output 2002 2018

  • 971 Citations
  • 16 h-Index
  • 46 Article
  • 5 Conference contribution
  • 1 Conference article
  • 1 Letter
2018
3 Citations (Scopus)

Ephemeral-secret-leakage secure ID-based three-party Authenticated Key Agreement Protocol for mobile distributed computing environments

Liu, C. L., Tsai, W. J., Chang, T-Y. & Liu, T. M., 2018 Apr 1, In : Symmetry. 10, 4, 84.

Research output: Contribution to journalArticle

Key Agreement Protocol
Identity-based
Mobile Computing
Distributed computer systems
Distributed Computing

Improvements of Threshold Signature and Authenticated Encryption for Group Communications

Hwang, M. S., Chang, T. & Yang, C., 2018 Aug 30, In : Journal of Physics: Conference Series. 1069, 1, 012064.

Research output: Contribution to journalConference article

communication
signatures
thresholds
2017
1 Citation (Scopus)

Password authenticated key exchange and protected password change protocols

Chang, T. Y., Hwang, M. S. & Yang, C. C., 2017 Aug, In : Symmetry. 9, 8, 134.

Research output: Contribution to journalArticle

Authenticated Key Exchange
Password
attack
Network protocols
Public-key Cryptosystem
2016
7 Citations (Scopus)

A changeable personal identification number-based keystroke dynamics authentication system on smart phones

Chang, T-Y., Tsai, C. J., Tsai, W. J., Peng, C. C. & Wu, H. S., 2016 Oct 1, In : Security and Communication Networks. 9, 15, p. 2674-2685 12 p.

Research output: Contribution to journalArticle

Authentication
Biometrics
Glossaries
Experiments
2015
13 Citations (Scopus)

Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone

Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J. & Zhong, P. K., 2015 Jul 1, In : Journal of Network and Computer Applications. 53, p. 128-139 12 p.

Research output: Contribution to journalArticle

Biometrics
Authentication
Computer keyboards
Touch screens
Mobile phones
3 Citations (Scopus)

Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion

Liu, C. L., Tsai, W. J., Chang, T. Y., Peng, C. C. & Wong, P. S., 2015 Mar 19, In : Computer Journal. 58, 7, p. 1598-1606 9 p.

Research output: Contribution to journalArticle

Cryptography
Pixels
2 Citations (Scopus)

Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones

Tsai, C. J., Peng, C. C., Chiang, M. L., Chang, T. Y., Tsai, W. J. & Wu, H. S., 2015 Mar 3, Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014. Institute of Electrical and Electronics Engineers Inc., p. 353-356 4 p. 7054316. (Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
retraining
Biometrics
experiment
Experiments
2014
41 Citations (Scopus)

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

Tasia, C. J., Chang, T-Y., Cheng, P. C. & Lin, J. H., 2014 Jan 1, In : Security and Communication Networks. 7, 4, p. 750-758 9 p.

Research output: Contribution to journalArticle

Touch screens
Biometrics
Authentication
Mobile devices
Classifiers
2013
5 Citations (Scopus)

A new group signature scheme based on RSA assumption

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2013 Mar 25, In : Information Technology and Control. 42, 1, p. 61-66 6 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
Learning systems
Genetic algorithms
Chemical analysis
Particle swarm optimization (PSO)
Students
2012
73 Citations (Scopus)

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

Chang, T. Y., Tsai, C. J. & Lin, J. H., 2012 May, In : Journal of Systems and Software. 85, 5, p. 1157-1165 9 p.

Research output: Contribution to journalArticle

Touch screens
Mobile devices
Authentication
Computer keyboards
Graphical user interfaces
12 Citations (Scopus)
User Authentication
Authentication
Mouse
Password Authentication
Mobile phones
4 Citations (Scopus)

A simple keystroke dynamics-based authentication system using means and standard deviations

Liu, C. L., Chang, T. Y., Chiang, M. L. & Tsai, C. J., 2012 Jul 18, In : Journal of Internet Technology. 13, 3, p. 439-444 6 p.

Research output: Contribution to journalArticle

Authentication
4 Citations (Scopus)

Cryptanalysis on an improved version of ElGamal-Like Public-Key Encryption Scheme for encrypting large messages

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2012 Jan 1, In : Informatica (Netherlands). 23, 4, p. 537-562 26 p.

Research output: Contribution to journalArticle

Public Key Encryption
Cryptanalysis
Cryptography
Computational complexity
Repair
13 Citations (Scopus)

Dynamically generate a long-lived private key based on password keystroke features and neural network

Chang, T-Y., 2012 Nov 30, In : Information Sciences. 211, p. 36-47 12 p.

Research output: Contribution to journalArticle

Electronic document identification systems
Password
Security of data
Integrated circuits
Neural Networks
1 Citation (Scopus)

Improvement of convertible authenticated encryption schemes and its multiple recipients version

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2012 Dec 1, In : International Journal of Security and its Applications. 6, 4, p. 151-162 12 p.

Research output: Contribution to journalArticle

Cryptography
Authentication
Computational complexity
13 Citations (Scopus)

Simultaneously construct IRT-based parallel tests based on an adapted CLONALG algorithm

Chang, T. Y. & Shiu, Y. F., 2012 Jun 1, In : Applied Intelligence. 36, 4, p. 979-994 16 p.

Research output: Contribution to journalArticle

Linear programming
Computational complexity
Genetic algorithms
Polynomials
Specifications

The batch verifying multiple digital signature scheme: A modified version of Ohta-Okamoto digital signature

Hwang, M. S., Chang, T. Y. & Yang, W. P., 2012 Oct 8, Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012. p. 732-735 4 p. 6268596. (Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
2011
75 Citations (Scopus)

A communication-efficient three-party password authenticated key exchange protocol

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Sciences. 181, 1, p. 217-226 10 p.

Research output: Contribution to journalArticle

Authenticated Key Exchange
Password
Servers
Server
Network protocols
17 Citations (Scopus)

An ID-based multi-signer universal designated multi-verifier signature scheme

Chang, T. Y., 2011 Jul 1, In : Information and Computation. 209, 7, p. 1007-1015 9 p.

Research output: Contribution to journalArticle

Multisignature
Identity-based
Signature Scheme
Signature
Bilinear Pairings
12 Citations (Scopus)

An improved multi-stage secret sharing scheme based on the factorization problem

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Technology and Control. 40, 3, p. 246-251 6 p.

Research output: Contribution to journalArticle

Hash functions
Factorization
3 Citations (Scopus)

A novel and simple statistical fusion method for user authentication through keystroke features

Cheng, P. C., Chang, T. Y., Tsai, C. J., Li, J. W. & Wu, C. S., 2011 Feb 1, In : Journal of Convergence Information Technology. 6, 2, p. 347-356 10 p.

Research output: Contribution to journalArticle

Authentication
Fusion reactions
Classifiers
Experiments
10 Citations (Scopus)
Hotels
Mobile devices
Computational complexity
Wireless networks
Communication
2010
4 Citations (Scopus)

An computation-efficient generalized group-oriented cryptosystem

Chang, T. Y., 2010, In : Informatica. 21, 3, p. 307-319 13 p.

Research output: Contribution to journalArticle

Cryptosystem
Cryptography
Security Analysis
Diffie-Hellman
Attack
13 Citations (Scopus)

A personalized rhythm click-based authentication system

Chang, T. Y. & Yang, Y. J., 2010 Jun 8, In : Information Management & Computer Security. 18, 2, p. 72-85 14 p.

Research output: Contribution to journalArticle

Authentication
Mobile phones
Classifiers
neural network
Computer keyboards
17 Citations (Scopus)

Cryptanalysis of security enhancement for a modified authenticated key agreement protocol

Cheng, K. M., Chang, T-Y. & Lo, J. W., 2010 Dec 1, In : International Journal of Network Security. 11, 1, p. 55-57 3 p.

Research output: Contribution to journalLetter

2009
11 Citations (Scopus)

An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks

Chang, T. Y., 2009 Nov 15, In : Computer Communications. 32, 17, p. 1829-1836 8 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Attack and improve the Zhao-Liu authenticated encryption scheme

Chang, T. Y. & Chiang, M. L., 2009 Oct 1, In : International Journal of Innovative Computing, Information and Control. 5, 10, p. 3025-3030 6 p.

Research output: Contribution to journalArticle

Authenticated Encryption
Cryptography
Signature
Attack
Convert
39 Citations (Scopus)

Cooperative learning in E-learning: A peer assessment of student-centered using consistent fuzzy preference

Chang, T-Y. & Chen, Y. T., 2009 May 1, In : Expert Systems with Applications. 36, 4, p. 8342-8349 8 p.

Research output: Contribution to journalArticle

E-learning
Students
Teaching
2008
22 Citations (Scopus)

A Convertible Multi-Authenticated Encryption scheme for group communications

Chang, T. Y., 2008 Sep 1, In : Information Sciences. 178, 17, p. 3426-3434 9 p.

Research output: Contribution to journalArticle

Authenticated Encryption
Group Communication
Cryptography
Communication
Signature
2005
38 Citations (Scopus)

A new multi-stage secret sharing scheme using one-way function

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2005 Dec 1, In : Operating Systems Review (ACM). 39, 1, p. 48-55 8 p.

Research output: Contribution to journalArticle

41 Citations (Scopus)

An improvement of the Yang-Shieh password authentication schemes

Yang, C. C., Wang, R. C. & Chang, T. Y., 2005 Mar 25, In : Applied Mathematics and Computation. 162, 3, p. 1391-1396 6 p.

Research output: Contribution to journalArticle

Password Authentication
Authentication
Sun
Attack
Timestamp
42 Citations (Scopus)

An improvement on the Lin-Wu (t,n) threshold verifiable multi-secret sharing scheme

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2005 Apr 5, In : Applied Mathematics and Computation. 163, 1, p. 169-178 10 p.

Research output: Contribution to journalArticle

Secret Sharing Scheme
Factorization
Computational complexity
Composite materials
Digit

A simple broadcasting cryptosystem in computer networks using eXclusive-OR

Lee, C. C., Chang, T. Y. & Hwang, M. S., 2005 Nov 11, In : International Journal of Computer Applications in Technology. 24, 3, p. 180-183 4 p.

Research output: Contribution to journalArticle

Computer networks
Broadcasting
Cryptography

Cryptanalysis of the improved authenticated key agreement protocol

Chang, T. Y., Yang, C. C. & Yang, Y. W., 2005 Dec 15, In : Applied Mathematics and Computation. 171, 2, p. 771-774 4 p.

Research output: Contribution to journalArticle

Key Agreement Protocol
Cryptanalysis
Attack
Password
Line

Mobile IP assistance in ad hoc routing security using geometric properties of lines

Chang, T. Y., Yang, C. C. & Chen, C. M., 2005 Jun, In : IEICE Transactions on Communications. E88-B, 6, p. 2557-2565 9 p.

Research output: Contribution to journalArticle

Authentication
Ad hoc networks
Electronic document identification systems
Mobile ad hoc networks
Cryptography
40 Citations (Scopus)

Simple authenticated key agreement and protected password change protocol

Chang, T. Y., Yang, W. P. & Hwang, M. S., 2005 Apr 1, In : Computers and Mathematics with Applications. 49, 5-6, p. 703-714 12 p.

Research output: Contribution to journalArticle

Key Agreement
Password
Sun
Costs
Key Agreement Protocol
16 Citations (Scopus)

Threshold signatures: Current status and key issues

Hwang, M. S. & Chang, T-Y., 2005 Dec 1, In : International Journal of Network Security. 1, 3, p. 123-137 15 p.

Research output: Contribution to journalArticle

2004
158 Citations (Scopus)

A (t,n) multi-secret sharing scheme

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2004 Apr 5, In : Applied Mathematics and Computation. 151, 2, p. 483-490 8 p.

Research output: Contribution to journalArticle

Secret Sharing Scheme
Secret Sharing
Interpolation
Polynomials
Simultaneous equations

A routing authentication mechanism for wireless ad hoc networks

Yang, C. C., Chen, C. M. & Chang, T-Y., 2004 Jun 28, Conference Proceedings - 2004 IEEE International Conference on Networking, Sensing and Control. p. 456-461 6 p. (Conference Proceeding - IEEE International Conference on Networking, Sensing and Control; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Routing protocols
Authentication
Electronic document identification systems
Network protocols
51 Citations (Scopus)

A threshold signature scheme for group communications without a shared distribution center

Chang, T. Y., Yang, C. C. & Hwang, M. S., 2004 Aug, In : Future Generation Computer Systems. 20, 6 SPEC. ISS., p. 1013-1021 9 p.

Research output: Contribution to journalArticle

Cryptography
Computational complexity
Communication
6 Citations (Scopus)

Cryptanalysis of publicly verifiable authenticated encryption

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2004 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 6, p. 1645-1646 2 p.

Research output: Contribution to journalArticle

Authenticated Encryption
Cryptanalysis
Cryptography
Signature
Recovery
16 Citations (Scopus)

Cryptanalysis of simple authenticated key agreement protocols

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2004 Aug, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 8, p. 2174-2176 3 p.

Research output: Contribution to journalArticle

Key Agreement Protocol
Cryptanalysis
Glossaries
Attack
2 Citations (Scopus)

Improvement on Pretty-Simple password authenticated key-exchange protocol for wireless networks

Chang, T. Y., Yang, C. C. & Chen, C. M., 2004 Jan 1, In : Informatica. 15, 2, p. 161-170 10 p.

Research output: Contribution to journalArticle

Authenticated Key Exchange
Password
Wireless Networks
Wireless networks
Network protocols
6 Citations (Scopus)

On the security of an enhanced authentication key exchange protocol

Hwang, M. S., Chang, T. Y., Lin, S. C. & Tsai, C. S., 2004 Jul 7, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 160-163 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Repair
Defects
15 Citations (Scopus)

Threshold untraceable signature for group communications

Chang, T. Y., Yang, C. C. & Hwang, M. S., 2004 Apr 1, In : IEE Proceedings: Communications. 151, 2, p. 179-184 6 p.

Research output: Contribution to journalArticle

Communication
2003
23 Citations (Scopus)

A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem

Yang, C. C., Chang, T-Y. & Hwang, M. S., 2003 May 1, In : Computer Standards and Interfaces. 25, 2, p. 141-145 5 p.

Research output: Contribution to journalArticle

Hash functions
distribution system
anonymity
Polynomials
4 Citations (Scopus)

A novel mobile IP registration scheme for hierarchical mobility management

Yang, C. C., Li, J. W. & Chang, T-Y., 2003 Jan 1, Proceedings - 2003 International Conference on Parallel Processing Workshops, ICPPW 2003. Huang, C-H. & Ramanujam, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 367-374 8 p. 1240391. (Proceedings of the International Conference on Parallel Processing Workshops; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile IP
Mobility Management
Registration
Authentication
One-way Hash Function
12 Citations (Scopus)

A solution to mobile IP registration for AAA

Yang, C. C., Hwang, M. S., Li, J. W. & Chang, T. Y., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2524, p. 329-337 9 p.

Research output: Contribution to journalArticle

Mobile IP
Authorization
Authentication
Registration
Cryptography
22 Citations (Scopus)

Security Enhancement for Protecting Password Transmission

Yang, C. C., Chang, T. Y., Li, J. W. & Hwang, M. S., 2003 Jul, In : IEICE Transactions on Communications. E86-B, 7, p. 2178-2181 4 p.

Research output: Contribution to journalArticle

Servers