Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Yuh-Min Tseng
2018

Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments

Tseng, Y. M., Wu, J. D., Hung, R. W. & Chien, H. Y., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 251-256 6 p. 8517196. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Further analysis of pairing-based traitor tracing schemes for broadcast encryption

Wu, T. Y. & Tseng, Y-M., 2013 Jan 1, In : Security and Communication Networks. 6, 1, p. 28-32 5 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2012

A private online system for executing wills based on a secret sharing mechanism

Chen, C. L., Lee, C. C., Tseng, Y. M. & Chou, T. T., 2012 Jul, In : Security and Communication Networks. 5, 7, p. 725-737 13 p.

Research output: Contribution to journalArticle

2017

Secure certificateless signature resisting to continual leakage attacks

Tseng, Y. M., Huang, S. S. & Wu, J. D., 2017 Jul 21, Proceedings of the 2017 IEEE International Conference on Applied System Innovation: Applied System Innovation for Modern Technology, ICASI 2017. Meen, T-H., Lam, A. D. K-T. & Prior, S. D. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1263-1266 4 p. 7988127. (Proceedings of the 2017 IEEE International Conference on Applied System Innovation: Applied System Innovation for Modern Technology, ICASI 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2018

Some Study of Applying Infra-Red in Agriculture IoT

Chien, H. Y., Tseng, Y. M. & Hung, R. W., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 241-245 5 p. 8517239. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2014

Privacy-preserving multireceiver ID-based encryption with provable security

Tseng, Y. M., Huang, Y. H. & Chang, H. J., 2014 Jul, In : International Journal of Communication Systems. 27, 7, p. 1034-1050 17 p.

Research output: Contribution to journalArticle

27 Citations (Scopus)
2019

An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2019 Dec, In : IEEE Systems Journal. 13, 4, p. 3968-3979 12 p., 8643744.

Research output: Contribution to journalArticle

2011

Improvement of the RFID authentication scheme based on quadratic residues

Yeh, T. C., Wu, C. H. & Tseng, Y. M., 2011 Mar 15, In : Computer Communications. 34, 3, p. 337-341 5 p.

Research output: Contribution to journalArticle

57 Citations (Scopus)
2016

A revocable certificateless short signature scheme and its authentication application

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2016 Jan 1, In : Informatica (Netherlands). 27, 3, p. 549-572 24 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2012

Revocable ID-based signature scheme with batch verifications

Wu, T. Y., Tsai, T. T. & Tseng, Y. M., 2012 Oct 11, Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012. p. 49-54 6 p. 6274399. (Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Efficient revocable ID-based encryption with a public channel

Tseng, Y-M. & Tsai, T. T., 2012 Apr 1, In : Computer Journal. 55, 4, p. 475-486 12 p.

Research output: Contribution to journalArticle

51 Citations (Scopus)

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

Wu, T. Y., Tseng, Y. M. & Tsai, T. T., 2012 Aug 16, In : Computer Networks. 56, 12, p. 2994-3006 13 p.

Research output: Contribution to journalArticle

43 Citations (Scopus)
2019

Finding Longest (s, t)-paths of O-shaped Supergrid Graphs in Linear Time

Hung, R. W., Keshavarz-Kohjerdi, F., Tseng, Y. M. & Qiu, G. H., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923400. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Revocable ID-based signature with short size over lattices

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2017 Jan 1, In : Security and Communication Networks. 2017, 7571201.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2015

Certificateless Signature with Strong Unforgeability in the Standard Model

Hung, Y. H., Huang, S. S., Tseng, Y. M. & Tsai, T. T., 2015 Mar 3, In : Informatica (Netherlands). 26, 4, p. 663-684 22 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
2011

A free-rider aware reputation system for peer-to-peer file-sharing networks

Tseng, Y-M. & Chen, F. G., 2011 Mar 1, In : Expert Systems with Applications. 38, 3, p. 2432-2440 9 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)
2013

Publicly verifiable multi-secret sharing scheme from bilinear pairings

Wu, T. Y. & Tseng, Y-M., 2013 Sep 9, In : IET Information Security. 7, 3, p. 239-246 8 p.

Research output: Contribution to journalArticle

21 Citations (Scopus)
2016

Leakage-resilient ID-based signature scheme in the generic bilinear group model

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2016 Nov 25, In : Security and Communication Networks. 9, 17, p. 3987-4001 15 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2015
9 Citations (Scopus)
2018

Leakage-resilient certificateless signature under continual leakage model

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2018 Jan 1, In : Information Technology and Control. 47, 2, p. 363-386 24 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2012

Towards generalized ID-based user authentication for mobile multi-server environment

Chuang, Y. H. & Tseng, Y-M., 2012 Apr 1, In : International Journal of Communication Systems. 25, 4, p. 447-460 14 p.

Research output: Contribution to journalArticle

46 Citations (Scopus)
2019

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

Wu, J. D., Tseng, Y-M., Huang, S-S. & Tsai, T. T., 2019 Jan 1, In : IEEE Access. 7, p. 19041-19053 13 p., 8630914.

Research output: Contribution to journalArticle

2017

Non-Repudiable Provable Data Possession Scheme with Designated Verifier in Cloud Storage Systems

Wu, T. Y., Tseng, Y-M., Huang, S-S. & Lai, Y. C., 2017 Sep 15, In : IEEE Access. 5, p. 19333-19341 9 p., 8039158.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2015

Enhancement on strongly secure group key agreement

Tseng, Y-M., Tsai, T. T. & Huang, S-S., 2015 Jan 25, In : Security and Communication Networks. 8, 2, p. 126-135 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Efficient revocable certificateless public key encryption with a delegated revocation authority

Tsai, T. T., Tseng, Y-M. & Huang, S-S., 2015 Dec 1, In : Security and Communication Networks. 8, 18, p. 3713-3725 13 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)
2011

A pairing-based publicly verifiable secret sharing scheme

Wu, T. Y. & Tseng, Y-M., 2011 Feb 1, In : Journal of Systems Science and Complexity. 24, 1, p. 186-194 9 p.

Research output: Contribution to journalArticle

26 Citations (Scopus)
2014

Efficient anonymous multi-receiver ID-based encryption with constant decryption cost

Tseng, Y. M., Tsai, T. T., Huang, S. S. & Chien, H. Y., 2014 Nov 5, Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014. Li, S., Cheng, Y., Dai, Y. & Jiang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 131-137 7 p. 6948083. (Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2011

Two-round contributory group key exchange protocol for wireless network environments

Wu, T. Y., Tseng, Y. M. & Yu, C. W., 2011 Dec 1, In : Eurasip Journal on Wireless Communications and Networking. 2011, 1, 12.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2013

Provably secure revocable ID-based signature in the standard model

Tsai, T. T., Tseng, Y-M. & Wu, T. Y., 2013 Jan 1, In : Security and Communication Networks. 6, 10, p. 1250-1260 11 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)
2012

CCA-secure anonymous multi-receiver ID-based encryption

Tseng, Y-M., Huang, Y. H. & Chang, H. J., 2012 May 14, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 177-182 6 p. 6185119. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)
2016

List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures

Tseng, Y-M., Huang, S-S., Tsai, T. T. & Ke, J. H., 2016 Jan 1, In : IEEE Transactions on Emerging Topics in Computing. 4, 1, p. 102-112 11 p., 7017498.

Research output: Contribution to journalArticle

28 Citations (Scopus)
2017

Lattice-based revocable certificateless signature

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2017 Jan 1, In : Symmetry. 9, 10, 242.

Research output: Contribution to journalArticle

Open Access
6 Citations (Scopus)
2012

Towards scalable key management for secure multicast communication

Tseng, Y. M., Yu, C. H. & Wu, T. Y., 2012 Jan 1, In : Information Technology and Control. 41, 2, p. 173-182 10 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2019

Exploration of Fast Edible Oil Classification Using Infrared Spectrum, Machine Learning, and Chemometrics

Chien, H. Y., Shih, A. T. & Tseng, Y. M., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923564. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2014

RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE

Tsai, T. T., Tseng, Y. M. & Wu, T. Y., 2014 Jan 1, In : Informatica (Netherlands). 25, 2, p. 299-326 28 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
2018

Leakage-resilient certificateless key encapsulation scheme

Wu, J. D., Tseng, Y. M., Huang, S. S. & Chou, W. C., 2018 Jan 1, In : Informatica (Netherlands). 29, 1, p. 125-155 31 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2014

Strongly secure revocable ID-based signature without random oracles

Hung, Y. H., Tsai, T. T., Tseng, Y. M. & Huang, S. S., 2014 Jan 1, In : Information Technology and Control. 43, 3, p. 264-276 13 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2017

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices

Tsai, T. T., Huang, S. S. & Tseng, Y. M., 2017 Jan 1, In : Informatica (Netherlands). 28, 1, p. 193-214 22 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2013

Efficient revocable multi-receiver ID-based encryption

Tsai, T. T., Tseng, Y-M. & Wu, T. Y., 2013 Jun 19, In : Information Technology and Control. 42, 2, p. 159-169 11 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2014

Efficient strongly unforgeable ID-based signature without random oracles

Tsai, T. T., Tseng, Y. M. & Huang, S. S., 2014 Jan 1, In : Informatica (Netherlands). 25, 3, p. 505-521 17 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2011

A convinced commitment scheme for bilinear Diffie-Hellman problem

Tseng, Y-M., Wu, T. Y. & Tsai, T. T., 2011 Sep 1, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 156-161 6 p. 5967536

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2012
1 Citation (Scopus)
2011

A secure ID-Based authenticated group key exchange protocol resistant to insider attacks

Wu, T. Y., Tseng, Y. M. & Yu, C. W., 2011 May 1, In : Journal of Information Science and Engineering. 27, 3, p. 915-932 18 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)
2012

A revocable ID-based signcryption scheme

Wu, T. Y., Tsai, T. T. & Tseng, Y-M., 2012 Dec 21, In : Journal of Information Hiding and Multimedia Signal Processing. 3, 3, p. 240-251 12 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

Towards ID-based authenticated group key exchange protocol with identifying malicious participants

Wu, T. Y. & Tseng, Y. M., 2012, In : Informatica (Netherlands). 23, 2, p. 315-334 20 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)
2013

Leakage-free ID-based signature

Tseng, Y. M., Tsai, T. T. & Huang, S. S., 2013 Jan 1, In : Computer Journal. 58, 4, p. 750-757 8 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2012

ID-based key-insulated signature scheme with batch verifications and its novel application

Wu, T. Y., Tseng, Y-M. & Yu, C. W., 2012 Jul 1, In : International Journal of Innovative Computing, Information and Control. 8, 7 A, p. 4797-4810 14 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
2017
7 Citations (Scopus)
2016

A short certificate-based signature scheme with provable security

Hung, Y. H., Huang, S. S. & Tseng, Y. M., 2016 Jan 1, In : Information Technology and Control. 45, 3, p. 243-253 11 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2017

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP

Meshram, C., Tseng, Y. M., Lee, C. C. & Meshram, S. G., 2017 Jan 1, In : Informatica (Netherlands). 28, 3, p. 471-484 14 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)