Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016

Author

  • Yuh-Min Tseng
2018

Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments

Tseng, Y. M., Wu, J. D., Hung, R. W. & Chien, H. Y., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 251-256 6 p. 8517196. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Secure certificateless signature resisting to continual leakage attacks

Tseng, Y. M., Huang, S. S. & Wu, J. D., 2017 Jul 21, Proceedings of the 2017 IEEE International Conference on Applied System Innovation: Applied System Innovation for Modern Technology, ICASI 2017. Meen, T-H., Lam, A. D. K-T. & Prior, S. D. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1263-1266 4 p. 7988127. (Proceedings of the 2017 IEEE International Conference on Applied System Innovation: Applied System Innovation for Modern Technology, ICASI 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2018

Some Study of Applying Infra-Red in Agriculture IoT

Chien, H. Y., Tseng, Y. M. & Hung, R. W., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 241-245 5 p. 8517239. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2019

An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2019 Dec, In : IEEE Systems Journal. 13, 4, p. 3968-3979 12 p., 8643744.

Research output: Contribution to journalArticle

2016

A revocable certificateless short signature scheme and its authentication application

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2016 Jan 1, In : Informatica (Netherlands). 27, 3, p. 549-572 24 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
2019

Finding Longest (s, t)-paths of O-shaped Supergrid Graphs in Linear Time

Hung, R. W., Keshavarz-Kohjerdi, F., Tseng, Y. M. & Qiu, G. H., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923400. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Revocable ID-based signature with short size over lattices

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2017 Jan 1, In : Security and Communication Networks. 2017, 7571201.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2016

Leakage-resilient ID-based signature scheme in the generic bilinear group model

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2016 Nov 25, In : Security and Communication Networks. 9, 17, p. 3987-4001 15 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2018

Leakage-resilient certificateless signature under continual leakage model

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2018 Jan 1, In : Information Technology and Control. 47, 2, p. 363-386 24 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

Leakage-Resilient Certificate-Based Signature Resistant to Side-Channel Attacks

Wu, J. D., Tseng, Y-M., Huang, S-S. & Tsai, T. T., 2019 Jan 1, In : IEEE Access. 7, p. 19041-19053 13 p., 8630914.

Research output: Contribution to journalArticle

2017

Non-Repudiable Provable Data Possession Scheme with Designated Verifier in Cloud Storage Systems

Wu, T. Y., Tseng, Y-M., Huang, S-S. & Lai, Y. C., 2017 Sep 15, In : IEEE Access. 5, p. 19333-19341 9 p., 8039158.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2016

List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures

Tseng, Y-M., Huang, S-S., Tsai, T. T. & Ke, J. H., 2016 Jan 1, In : IEEE Transactions on Emerging Topics in Computing. 4, 1, p. 102-112 11 p., 7017498.

Research output: Contribution to journalArticle

28 Citations (Scopus)
2017

Lattice-based revocable certificateless signature

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2017 Jan 1, In : Symmetry. 9, 10, 242.

Research output: Contribution to journalArticle

Open Access
6 Citations (Scopus)
2019

Exploration of Fast Edible Oil Classification Using Infrared Spectrum, Machine Learning, and Chemometrics

Chien, H. Y., Shih, A. T. & Tseng, Y. M., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923564. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Leakage-resilient certificateless key encapsulation scheme

Wu, J. D., Tseng, Y. M., Huang, S. S. & Chou, W. C., 2018 Jan 1, In : Informatica (Netherlands). 29, 1, p. 125-155 31 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2017

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices

Tsai, T. T., Huang, S. S. & Tseng, Y. M., 2017 Jan 1, In : Informatica (Netherlands). 28, 1, p. 193-214 22 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
7 Citations (Scopus)
2016

A short certificate-based signature scheme with provable security

Hung, Y. H., Huang, S. S. & Tseng, Y. M., 2016 Jan 1, In : Information Technology and Control. 45, 3, p. 243-253 11 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2017

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP

Meshram, C., Tseng, Y. M., Lee, C. C. & Meshram, S. G., 2017 Jan 1, In : Informatica (Netherlands). 28, 3, p. 471-484 14 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage

Tsai, T. T., Tseng, Y. M., Hung, Y. H. & Huang, S. S., 2017 Aug 10, Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. Tsai, P-W., Watada, J. & Kubota, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 56-59 4 p. 8008639. (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2018

Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2018 Jan 26, In : IEEE Access. 6, p. 17130-17142 13 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Identity-based encryption with cloud revocation authority and its applications

Tseng, Y. M., Tsai, T. T., Huang, S. S. & Huang, C. P., 2018 Oct 1, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1041-1053 13 p., 7430324.

Research output: Contribution to journalArticle

6 Citations (Scopus)