Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Ting-Yi  Chang
2011

A communication-efficient three-party password authenticated key exchange protocol

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Sciences. 181, 1, p. 217-226 10 p.

Research output: Contribution to journalArticle

77 Citations (Scopus)

An ID-based multi-signer universal designated multi-verifier signature scheme

Chang, T. Y., 2011 Jul 1, In : Information and Computation. 209, 7, p. 1007-1015 9 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)

An improved multi-stage secret sharing scheme based on the factorization problem

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Technology and Control. 40, 3, p. 246-251 6 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

A novel and simple statistical fusion method for user authentication through keystroke features

Cheng, P. C., Chang, T. Y., Tsai, C. J., Li, J. W. & Wu, C. S., 2011 Feb, In : Journal of Convergence Information Technology. 6, 2, p. 347-356 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
10 Citations (Scopus)
2012

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

Chang, T. Y., Tsai, C. J. & Lin, J. H., 2012 May, In : Journal of Systems and Software. 85, 5, p. 1157-1165 9 p.

Research output: Contribution to journalArticle

79 Citations (Scopus)
13 Citations (Scopus)

A simple keystroke dynamics-based authentication system using means and standard deviations

Liu, C. L., Chang, T. Y., Chiang, M. L. & Tsai, C. J., 2012 Jul 18, In : Journal of Internet Technology. 13, 3, p. 439-444 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Cryptanalysis on an improved version of ElGamal-Like Public-Key Encryption Scheme for encrypting large messages

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2012 Jan 1, In : Informatica (Netherlands). 23, 4, p. 537-562 26 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Dynamically generate a long-lived private key based on password keystroke features and neural network

Chang, T. Y., 2012 Nov 30, In : Information sciences. 211, p. 36-47 12 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Improvement of convertible authenticated encryption schemes and its multiple recipients version

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2012 Dec 1, In : International Journal of Security and its Applications. 6, 4, p. 151-162 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Simultaneously construct IRT-based parallel tests based on an adapted CLONALG algorithm

Chang, T. Y. & Shiu, Y. F., 2012 Jun 1, In : Applied Intelligence. 36, 4, p. 979-994 16 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)

The batch verifying multiple digital signature scheme: A modified version of Ohta-Okamoto digital signature

Hwang, M. S., Chang, T. Y. & Yang, W. P., 2012 Oct 8, Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012. p. 732-735 4 p. 6268596. (Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

A new group signature scheme based on RSA assumption

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2013 Mar 25, In : Information Technology and Control. 42, 1, p. 61-66 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
17 Citations (Scopus)
2014

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

Tasia, C. J., Chang, T. Y., Cheng, P. C. & Lin, J. H., 2014 Apr, In : Security and Communication Networks. 7, 4, p. 750-758 9 p.

Research output: Contribution to journalArticle

47 Citations (Scopus)
2015

Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone

Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J. & Zhong, P. K., 2015 Jul 1, In : Journal of Network and Computer Applications. 53, p. 128-139 12 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion

Liu, C. L., Tsai, W. J., Chang, T. Y., Peng, C. C. & Wong, P. S., 2015 Mar 19, In : Computer Journal. 58, 7, p. 1598-1606 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones

Tsai, C. J., Peng, C. C., Chiang, M. L., Chang, T. Y., Tsai, W. J. & Wu, H. S., 2015 Mar 3, Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014. Institute of Electrical and Electronics Engineers Inc., p. 353-356 4 p. 7054316. (Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2016

A changeable personal identification number-based keystroke dynamics authentication system on smart phones

Chang, T. Y., Tsai, C. J., Tsai, W. J., Peng, C. C. & Wu, H. S., 2016 Oct 1, In : Security and Communication Networks. 9, 15, p. 2674-2685 12 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2017

Password authenticated key exchange and protected password change protocols

Chang, T. Y., Hwang, M. S. & Yang, C. C., 2017 Aug, In : Symmetry. 9, 8, 134.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2018

Ephemeral-secret-leakage secure ID-based three-party Authenticated Key Agreement Protocol for mobile distributed computing environments

Liu, C. L., Tsai, W. J., Chang, T-Y. & Liu, T. M., 2018 Apr 1, In : Symmetry. 10, 4, 84.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Improvements of Threshold Signature and Authenticated Encryption for Group Communications

Hwang, M. S., Chang, T. & Yang, C., 2018 Aug 30, In : Journal of Physics: Conference Series. 1069, 1, 012064.

Research output: Contribution to journalConference article

2020

A fast and noise tolerable binarization method for automatic license plate recognition in the open environment in Taiwan

Peng, C. C., Tsai, C. J., Chang, T. Y., Yeh, J. Y., Dai, H. & Tsai, M. H., 2020 Aug, In : Symmetry. 12, 8, 1374.

Research output: Contribution to journalArticle

Open Access

Analyzing slowdown and meltdowns in the African countries: New evidence using Fourier quantile unit root test

Lee, Y-L., Ranjbar, O., Jahangard, F. & Chang, T., 2020, In : International Review of Economics and Finance. 65, p. 187-198 12 p.

Research output: Contribution to journalArticle

A new approach to generate diversified clusters for small data sets

Peng, C-C., Tsai, C-J., Chang, T-Y., Yeh, J-Y. & Hua, P-W., 2020, In : Applied Soft Computing Journal. 95

Research output: Contribution to journalArticle

New soft biometrics for limited resource in keystroke dynamics authentication

Chang, T-Y., Tsai, C. J., Yeh, J. Y., Peng, C. C. & Chen, P. H., 2020 Jan 1, (Accepted/In press) In : Multimedia Tools and Applications.

Research output: Contribution to journalArticle