• 982 Citations
  • 16 h-Index
20022018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 982 Citations
  • 16 h-Index
  • 46 Article
  • 5 Conference contribution
  • 1 Conference article
  • 1 Letter
2018

Ephemeral-secret-leakage secure ID-based three-party Authenticated Key Agreement Protocol for mobile distributed computing environments

Liu, C. L., Tsai, W. J., Chang, T-Y. & Liu, T. M., 2018 Apr 1, In : Symmetry. 10, 4, 84.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Improvements of Threshold Signature and Authenticated Encryption for Group Communications

Hwang, M. S., Chang, T. & Yang, C., 2018 Aug 30, In : Journal of Physics: Conference Series. 1069, 1, 012064.

Research output: Contribution to journalConference article

2017

Password authenticated key exchange and protected password change protocols

Chang, T. Y., Hwang, M. S. & Yang, C. C., 2017 Aug, In : Symmetry. 9, 8, 134.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2016

A changeable personal identification number-based keystroke dynamics authentication system on smart phones

Chang, T-Y., Tsai, C. J., Tsai, W. J., Peng, C. C. & Wu, H. S., 2016 Oct 1, In : Security and Communication Networks. 9, 15, p. 2674-2685 12 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2015

Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone

Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J. & Zhong, P. K., 2015 Jul 1, In : Journal of Network and Computer Applications. 53, p. 128-139 12 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion

Liu, C. L., Tsai, W. J., Chang, T. Y., Peng, C. C. & Wong, P. S., 2015 Mar 19, In : Computer Journal. 58, 7, p. 1598-1606 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones

Tsai, C. J., Peng, C. C., Chiang, M. L., Chang, T. Y., Tsai, W. J. & Wu, H. S., 2015 Mar 3, Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014. Institute of Electrical and Electronics Engineers Inc., p. 353-356 4 p. 7054316. (Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

Tasia, C. J., Chang, T-Y., Cheng, P. C. & Lin, J. H., 2014 Jan 1, In : Security and Communication Networks. 7, 4, p. 750-758 9 p.

Research output: Contribution to journalArticle

44 Citations (Scopus)
2013

A new group signature scheme based on RSA assumption

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2013 Mar 25, In : Information Technology and Control. 42, 1, p. 61-66 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
14 Citations (Scopus)
2012

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

Chang, T. Y., Tsai, C. J. & Lin, J. H., 2012 May, In : Journal of Systems and Software. 85, 5, p. 1157-1165 9 p.

Research output: Contribution to journalArticle

74 Citations (Scopus)
12 Citations (Scopus)

A simple keystroke dynamics-based authentication system using means and standard deviations

Liu, C. L., Chang, T. Y., Chiang, M. L. & Tsai, C. J., 2012 Jul 18, In : Journal of Internet Technology. 13, 3, p. 439-444 6 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Cryptanalysis on an improved version of ElGamal-Like Public-Key Encryption Scheme for encrypting large messages

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2012 Jan 1, In : Informatica (Netherlands). 23, 4, p. 537-562 26 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Dynamically generate a long-lived private key based on password keystroke features and neural network

Chang, T. Y., 2012 Nov 30, In : Information sciences. 211, p. 36-47 12 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Improvement of convertible authenticated encryption schemes and its multiple recipients version

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2012 Dec 1, In : International Journal of Security and its Applications. 6, 4, p. 151-162 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Simultaneously construct IRT-based parallel tests based on an adapted CLONALG algorithm

Chang, T. Y. & Shiu, Y. F., 2012 Jun 1, In : Applied Intelligence. 36, 4, p. 979-994 16 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

The batch verifying multiple digital signature scheme: A modified version of Ohta-Okamoto digital signature

Hwang, M. S., Chang, T. Y. & Yang, W. P., 2012 Oct 8, Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012. p. 732-735 4 p. 6268596. (Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

A communication-efficient three-party password authenticated key exchange protocol

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Sciences. 181, 1, p. 217-226 10 p.

Research output: Contribution to journalArticle

75 Citations (Scopus)

An ID-based multi-signer universal designated multi-verifier signature scheme

Chang, T. Y., 2011 Jul 1, In : Information and Computation. 209, 7, p. 1007-1015 9 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

An improved multi-stage secret sharing scheme based on the factorization problem

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Technology and Control. 40, 3, p. 246-251 6 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

A novel and simple statistical fusion method for user authentication through keystroke features

Cheng, P. C., Chang, T. Y., Tsai, C. J., Li, J. W. & Wu, C. S., 2011 Feb 1, In : Journal of Convergence Information Technology. 6, 2, p. 347-356 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
10 Citations (Scopus)
2010

An computation-efficient generalized group-oriented cryptosystem

Chang, T. Y., 2010, In : Informatica. 21, 3, p. 307-319 13 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A personalized rhythm click-based authentication system

Chang, T. Y. & Yang, Y. J., 2010 Jun 8, In : Information Management & Computer Security. 18, 2, p. 72-85 14 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Cryptanalysis of security enhancement for a modified authenticated key agreement protocol

Cheng, K. M., Chang, T-Y. & Lo, J. W., 2010 Dec 1, In : International Journal of Network Security. 11, 1, p. 55-57 3 p.

Research output: Contribution to journalLetter

17 Citations (Scopus)
2009

An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks

Chang, T. Y., 2009 Nov 15, In : Computer Communications. 32, 17, p. 1829-1836 8 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Attack and improve the Zhao-Liu authenticated encryption scheme

Chang, T. Y. & Chiang, M. L., 2009 Oct 1, In : International Journal of Innovative Computing, Information and Control. 5, 10, p. 3025-3030 6 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Cooperative learning in E-learning: A peer assessment of student-centered using consistent fuzzy preference

Chang, T-Y. & Chen, Y. T., 2009 May 1, In : Expert Systems with Applications. 36, 4, p. 8342-8349 8 p.

Research output: Contribution to journalArticle

39 Citations (Scopus)
2008

A Convertible Multi-Authenticated Encryption scheme for group communications

Chang, T. Y., 2008 Sep 1, In : Information Sciences. 178, 17, p. 3426-3434 9 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)
2005

A new multi-stage secret sharing scheme using one-way function

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2005 Dec 1, In : Operating Systems Review (ACM). 39, 1, p. 48-55 8 p.

Research output: Contribution to journalArticle

38 Citations (Scopus)

An improvement of the Yang-Shieh password authentication schemes

Yang, C. C., Wang, R. C. & Chang, T. Y., 2005 Mar 25, In : Applied Mathematics and Computation. 162, 3, p. 1391-1396 6 p.

Research output: Contribution to journalArticle

41 Citations (Scopus)

An improvement on the Lin-Wu (t,n) threshold verifiable multi-secret sharing scheme

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2005 Apr 5, In : Applied Mathematics and Computation. 163, 1, p. 169-178 10 p.

Research output: Contribution to journalArticle

43 Citations (Scopus)

A simple broadcasting cryptosystem in computer networks using eXclusive-OR

Lee, C. C., Chang, T. Y. & Hwang, M. S., 2005 Nov 11, In : International Journal of Computer Applications in Technology. 24, 3, p. 180-183 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Cryptanalysis of the improved authenticated key agreement protocol

Chang, T. Y., Yang, C. C. & Yang, Y. W., 2005 Dec 15, In : Applied Mathematics and Computation. 171, 2, p. 771-774 4 p.

Research output: Contribution to journalArticle

Mobile IP assistance in ad hoc routing security using geometric properties of lines

Chang, T. Y., Yang, C. C. & Chen, C. M., 2005 Jun, In : IEICE Transactions on Communications. E88-B, 6, p. 2557-2565 9 p.

Research output: Contribution to journalArticle

Simple authenticated key agreement and protected password change protocol

Chang, T. Y., Yang, W. P. & Hwang, M. S., 2005 Apr 1, In : Computers and Mathematics with Applications. 49, 5-6, p. 703-714 12 p.

Research output: Contribution to journalArticle

40 Citations (Scopus)

Threshold signatures: Current status and key issues

Hwang, M. S. & Chang, T-Y., 2005 Dec 1, In : International Journal of Network Security. 1, 3, p. 123-137 15 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)
2004

A (t,n) multi-secret sharing scheme

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2004 Apr 5, In : Applied Mathematics and Computation. 151, 2, p. 483-490 8 p.

Research output: Contribution to journalArticle

161 Citations (Scopus)

A routing authentication mechanism for wireless ad hoc networks

Yang, C. C., Chen, C. M. & Chang, T-Y., 2004 Jun 28, Conference Proceedings - 2004 IEEE International Conference on Networking, Sensing and Control. p. 456-461 6 p. (Conference Proceeding - IEEE International Conference on Networking, Sensing and Control; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A threshold signature scheme for group communications without a shared distribution center

Chang, T. Y., Yang, C. C. & Hwang, M. S., 2004 Aug, In : Future Generation Computer Systems. 20, 6 SPEC. ISS., p. 1013-1021 9 p.

Research output: Contribution to journalArticle

51 Citations (Scopus)

Cryptanalysis of publicly verifiable authenticated encryption

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2004 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 6, p. 1645-1646 2 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Cryptanalysis of simple authenticated key agreement protocols

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2004 Aug, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 8, p. 2174-2176 3 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Improvement on Pretty-Simple password authenticated key-exchange protocol for wireless networks

Chang, T. Y., Yang, C. C. & Chen, C. M., 2004 Jan 1, In : Informatica. 15, 2, p. 161-170 10 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

On the security of an enhanced authentication key exchange protocol

Hwang, M. S., Chang, T. Y., Lin, S. C. & Tsai, C. S., 2004 Jul 7, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 160-163 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Threshold untraceable signature for group communications

Chang, T. Y., Yang, C. C. & Hwang, M. S., 2004 Apr 1, In : IEE Proceedings: Communications. 151, 2, p. 179-184 6 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)
2003

A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem

Yang, C. C., Chang, T-Y. & Hwang, M. S., 2003 May 1, In : Computer Standards and Interfaces. 25, 2, p. 141-145 5 p.

Research output: Contribution to journalArticle

23 Citations (Scopus)

A novel mobile IP registration scheme for hierarchical mobility management

Yang, C. C., Li, J. W. & Chang, T-Y., 2003 Jan 1, Proceedings - 2003 International Conference on Parallel Processing Workshops, ICPPW 2003. Huang, C-H. & Ramanujam, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 367-374 8 p. 1240391. (Proceedings of the International Conference on Parallel Processing Workshops; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

A solution to mobile IP registration for AAA

Yang, C. C., Hwang, M. S., Li, J. W. & Chang, T. Y., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2524, p. 329-337 9 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Security Enhancement for Protecting Password Transmission

Yang, C. C., Chang, T. Y., Li, J. W. & Hwang, M. S., 2003 Jul, In : IEICE Transactions on Communications. E86-B, 7, p. 2178-2181 4 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)