• 982 Citations
  • 16 h-Index
20022018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 982 Citations
  • 16 h-Index
  • 46 Article
  • 5 Conference contribution
  • 1 Conference article
  • 1 Letter
Filter
Article
2018

Ephemeral-secret-leakage secure ID-based three-party Authenticated Key Agreement Protocol for mobile distributed computing environments

Liu, C. L., Tsai, W. J., Chang, T-Y. & Liu, T. M., 2018 Apr 1, In : Symmetry. 10, 4, 84.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2017

Password authenticated key exchange and protected password change protocols

Chang, T. Y., Hwang, M. S. & Yang, C. C., 2017 Aug, In : Symmetry. 9, 8, 134.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2016

A changeable personal identification number-based keystroke dynamics authentication system on smart phones

Chang, T-Y., Tsai, C. J., Tsai, W. J., Peng, C. C. & Wu, H. S., 2016 Oct 1, In : Security and Communication Networks. 9, 15, p. 2674-2685 12 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2015

Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone

Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J. & Zhong, P. K., 2015 Jul 1, In : Journal of Network and Computer Applications. 53, p. 128-139 12 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion

Liu, C. L., Tsai, W. J., Chang, T. Y., Peng, C. C. & Wong, P. S., 2015 Mar 19, In : Computer Journal. 58, 7, p. 1598-1606 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2014

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

Tasia, C. J., Chang, T-Y., Cheng, P. C. & Lin, J. H., 2014 Jan 1, In : Security and Communication Networks. 7, 4, p. 750-758 9 p.

Research output: Contribution to journalArticle

44 Citations (Scopus)
2013

A new group signature scheme based on RSA assumption

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2013 Mar 25, In : Information Technology and Control. 42, 1, p. 61-66 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
14 Citations (Scopus)
2012

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

Chang, T. Y., Tsai, C. J. & Lin, J. H., 2012 May, In : Journal of Systems and Software. 85, 5, p. 1157-1165 9 p.

Research output: Contribution to journalArticle

74 Citations (Scopus)
12 Citations (Scopus)

A simple keystroke dynamics-based authentication system using means and standard deviations

Liu, C. L., Chang, T. Y., Chiang, M. L. & Tsai, C. J., 2012 Jul 18, In : Journal of Internet Technology. 13, 3, p. 439-444 6 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Cryptanalysis on an improved version of ElGamal-Like Public-Key Encryption Scheme for encrypting large messages

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2012 Jan 1, In : Informatica (Netherlands). 23, 4, p. 537-562 26 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Dynamically generate a long-lived private key based on password keystroke features and neural network

Chang, T. Y., 2012 Nov 30, In : Information sciences. 211, p. 36-47 12 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Improvement of convertible authenticated encryption schemes and its multiple recipients version

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2012 Dec 1, In : International Journal of Security and its Applications. 6, 4, p. 151-162 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Simultaneously construct IRT-based parallel tests based on an adapted CLONALG algorithm

Chang, T. Y. & Shiu, Y. F., 2012 Jun 1, In : Applied Intelligence. 36, 4, p. 979-994 16 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
2011

A communication-efficient three-party password authenticated key exchange protocol

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Sciences. 181, 1, p. 217-226 10 p.

Research output: Contribution to journalArticle

75 Citations (Scopus)

An ID-based multi-signer universal designated multi-verifier signature scheme

Chang, T. Y., 2011 Jul 1, In : Information and Computation. 209, 7, p. 1007-1015 9 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

An improved multi-stage secret sharing scheme based on the factorization problem

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Technology and Control. 40, 3, p. 246-251 6 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

A novel and simple statistical fusion method for user authentication through keystroke features

Cheng, P. C., Chang, T. Y., Tsai, C. J., Li, J. W. & Wu, C. S., 2011 Feb 1, In : Journal of Convergence Information Technology. 6, 2, p. 347-356 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
10 Citations (Scopus)
2010

An computation-efficient generalized group-oriented cryptosystem

Chang, T. Y., 2010, In : Informatica. 21, 3, p. 307-319 13 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A personalized rhythm click-based authentication system

Chang, T. Y. & Yang, Y. J., 2010 Jun 8, In : Information Management & Computer Security. 18, 2, p. 72-85 14 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
2009

An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks

Chang, T. Y., 2009 Nov 15, In : Computer Communications. 32, 17, p. 1829-1836 8 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Attack and improve the Zhao-Liu authenticated encryption scheme

Chang, T. Y. & Chiang, M. L., 2009 Oct 1, In : International Journal of Innovative Computing, Information and Control. 5, 10, p. 3025-3030 6 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Cooperative learning in E-learning: A peer assessment of student-centered using consistent fuzzy preference

Chang, T-Y. & Chen, Y. T., 2009 May 1, In : Expert Systems with Applications. 36, 4, p. 8342-8349 8 p.

Research output: Contribution to journalArticle

39 Citations (Scopus)
2008

A Convertible Multi-Authenticated Encryption scheme for group communications

Chang, T. Y., 2008 Sep 1, In : Information Sciences. 178, 17, p. 3426-3434 9 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)
2005

A new multi-stage secret sharing scheme using one-way function

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2005 Dec 1, In : Operating Systems Review (ACM). 39, 1, p. 48-55 8 p.

Research output: Contribution to journalArticle

38 Citations (Scopus)

An improvement of the Yang-Shieh password authentication schemes

Yang, C. C., Wang, R. C. & Chang, T. Y., 2005 Mar 25, In : Applied Mathematics and Computation. 162, 3, p. 1391-1396 6 p.

Research output: Contribution to journalArticle

41 Citations (Scopus)

An improvement on the Lin-Wu (t,n) threshold verifiable multi-secret sharing scheme

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2005 Apr 5, In : Applied Mathematics and Computation. 163, 1, p. 169-178 10 p.

Research output: Contribution to journalArticle

43 Citations (Scopus)

A simple broadcasting cryptosystem in computer networks using eXclusive-OR

Lee, C. C., Chang, T. Y. & Hwang, M. S., 2005 Nov 11, In : International Journal of Computer Applications in Technology. 24, 3, p. 180-183 4 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Cryptanalysis of the improved authenticated key agreement protocol

Chang, T. Y., Yang, C. C. & Yang, Y. W., 2005 Dec 15, In : Applied Mathematics and Computation. 171, 2, p. 771-774 4 p.

Research output: Contribution to journalArticle

Mobile IP assistance in ad hoc routing security using geometric properties of lines

Chang, T. Y., Yang, C. C. & Chen, C. M., 2005 Jun, In : IEICE Transactions on Communications. E88-B, 6, p. 2557-2565 9 p.

Research output: Contribution to journalArticle

Simple authenticated key agreement and protected password change protocol

Chang, T. Y., Yang, W. P. & Hwang, M. S., 2005 Apr 1, In : Computers and Mathematics with Applications. 49, 5-6, p. 703-714 12 p.

Research output: Contribution to journalArticle

40 Citations (Scopus)

Threshold signatures: Current status and key issues

Hwang, M. S. & Chang, T-Y., 2005 Dec 1, In : International Journal of Network Security. 1, 3, p. 123-137 15 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)
2004

A (t,n) multi-secret sharing scheme

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2004 Apr 5, In : Applied Mathematics and Computation. 151, 2, p. 483-490 8 p.

Research output: Contribution to journalArticle

161 Citations (Scopus)

A threshold signature scheme for group communications without a shared distribution center

Chang, T. Y., Yang, C. C. & Hwang, M. S., 2004 Aug, In : Future Generation Computer Systems. 20, 6 SPEC. ISS., p. 1013-1021 9 p.

Research output: Contribution to journalArticle

51 Citations (Scopus)

Cryptanalysis of publicly verifiable authenticated encryption

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2004 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 6, p. 1645-1646 2 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Cryptanalysis of simple authenticated key agreement protocols

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2004 Aug, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 8, p. 2174-2176 3 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)

Improvement on Pretty-Simple password authenticated key-exchange protocol for wireless networks

Chang, T. Y., Yang, C. C. & Chen, C. M., 2004 Jan 1, In : Informatica. 15, 2, p. 161-170 10 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Threshold untraceable signature for group communications

Chang, T. Y., Yang, C. C. & Hwang, M. S., 2004 Apr 1, In : IEE Proceedings: Communications. 151, 2, p. 179-184 6 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)
2003

A new anonymous conference key distribution system based on the elliptic curve discrete logarithm problem

Yang, C. C., Chang, T-Y. & Hwang, M. S., 2003 May 1, In : Computer Standards and Interfaces. 25, 2, p. 141-145 5 p.

Research output: Contribution to journalArticle

23 Citations (Scopus)

A solution to mobile IP registration for AAA

Yang, C. C., Hwang, M. S., Li, J. W. & Chang, T. Y., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2524, p. 329-337 9 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Security Enhancement for Protecting Password Transmission

Yang, C. C., Chang, T. Y., Li, J. W. & Hwang, M. S., 2003 Jul, In : IEICE Transactions on Communications. E86-B, 7, p. 2178-2181 4 p.

Research output: Contribution to journalArticle

22 Citations (Scopus)

Security of Improvement on Methods for Protecting Password Transmission

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2003 Jan 1, In : Informatica. 14, 4, p. 551-558 8 p.

Research output: Contribution to journalArticle

28 Citations (Scopus)

Simple Generalized Group-Oriented Cryptosystems Using ElGamal Cryptosystem

Yang, C. C., Chang, T. Y., Li, J. W. & Hwang, M. S., 2003 Jan 1, In : Informatica. 14, 1, p. 111-120 10 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2002

Broadcasting cryptosystem in computer networks using geometric properties of lines

Hwang, M. S., Lee, C. C. & Chang, T. Y., 2002 May 1, In : Journal of Information Science and Engineering. 18, 3, p. 373-379 7 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)