Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Ting-Yi  Chang
2012
13 Citations (Scopus)
2015

Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion

Liu, C. L., Tsai, W. J., Chang, T. Y., Peng, C. C. & Wong, P. S., 2015 Mar 19, In : Computer Journal. 58, 7, p. 1598-1606 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2017

Password authenticated key exchange and protected password change protocols

Chang, T. Y., Hwang, M. S. & Yang, C. C., 2017 Aug, In : Symmetry. 9, 8, 134.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2013

A new group signature scheme based on RSA assumption

Yang, C. C., Chang, T. Y. & Hwang, M. S., 2013 Mar 25, In : Information Technology and Control. 42, 1, p. 61-66 6 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2018

Ephemeral-secret-leakage secure ID-based three-party Authenticated Key Agreement Protocol for mobile distributed computing environments

Liu, C. L., Tsai, W. J., Chang, T-Y. & Liu, T. M., 2018 Apr 1, In : Symmetry. 10, 4, 84.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2012

Dynamically generate a long-lived private key based on password keystroke features and neural network

Chang, T. Y., 2012 Nov 30, In : Information sciences. 211, p. 36-47 12 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices

Chang, T. Y., Tsai, C. J. & Lin, J. H., 2012 May, In : Journal of Systems and Software. 85, 5, p. 1157-1165 9 p.

Research output: Contribution to journalArticle

79 Citations (Scopus)
2016

A changeable personal identification number-based keystroke dynamics authentication system on smart phones

Chang, T. Y., Tsai, C. J., Tsai, W. J., Peng, C. C. & Wu, H. S., 2016 Oct 1, In : Security and Communication Networks. 9, 15, p. 2674-2685 12 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2011

An improved multi-stage secret sharing scheme based on the factorization problem

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Technology and Control. 40, 3, p. 246-251 6 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2013
17 Citations (Scopus)
2011

A communication-efficient three-party password authenticated key exchange protocol

Chang, T-Y., Hwang, M. S. & Yang, W. P., 2011 Jan 1, In : Information Sciences. 181, 1, p. 217-226 10 p.

Research output: Contribution to journalArticle

77 Citations (Scopus)
2018

Improvements of Threshold Signature and Authenticated Encryption for Group Communications

Hwang, M. S., Chang, T. & Yang, C., 2018 Aug 30, In : Journal of Physics: Conference Series. 1069, 1, 012064.

Research output: Contribution to journalConference article

2015

Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone

Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J. & Zhong, P. K., 2015 Jul 1, In : Journal of Network and Computer Applications. 53, p. 128-139 12 p.

Research output: Contribution to journalArticle

15 Citations (Scopus)
2011

A novel and simple statistical fusion method for user authentication through keystroke features

Cheng, P. C., Chang, T. Y., Tsai, C. J., Li, J. W. & Wu, C. S., 2011 Feb, In : Journal of Convergence Information Technology. 6, 2, p. 347-356 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2012

A simple keystroke dynamics-based authentication system using means and standard deviations

Liu, C. L., Chang, T. Y., Chiang, M. L. & Tsai, C. J., 2012 Jul 18, In : Journal of Internet Technology. 13, 3, p. 439-444 6 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

The batch verifying multiple digital signature scheme: A modified version of Ohta-Okamoto digital signature

Hwang, M. S., Chang, T. Y. & Yang, W. P., 2012 Oct 8, Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012. p. 732-735 4 p. 6268596. (Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simultaneously construct IRT-based parallel tests based on an adapted CLONALG algorithm

Chang, T. Y. & Shiu, Y. F., 2012 Jun 1, In : Applied Intelligence. 36, 4, p. 979-994 16 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
2011
10 Citations (Scopus)
2015

Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones

Tsai, C. J., Peng, C. C., Chiang, M. L., Chang, T. Y., Tsai, W. J. & Wu, H. S., 2015 Mar 3, Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014. Institute of Electrical and Electronics Engineers Inc., p. 353-356 4 p. 7054316. (Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2011

An ID-based multi-signer universal designated multi-verifier signature scheme

Chang, T. Y., 2011 Jul 1, In : Information and Computation. 209, 7, p. 1007-1015 9 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)
2012

Cryptanalysis on an improved version of ElGamal-Like Public-Key Encryption Scheme for encrypting large messages

Chang, T. Y., Hwang, M. S. & Yang, W. P., 2012 Jan 1, In : Informatica (Netherlands). 23, 4, p. 537-562 26 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Improvement of convertible authenticated encryption schemes and its multiple recipients version

Chang, T-Y., Yang, C. C. & Hwang, M. S., 2012 Dec 1, In : International Journal of Security and its Applications. 6, 4, p. 151-162 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2014

Two novel biometric features in keystroke dynamics authentication systems for touch screen devices

Tasia, C. J., Chang, T. Y., Cheng, P. C. & Lin, J. H., 2014 Apr, In : Security and Communication Networks. 7, 4, p. 750-758 9 p.

Research output: Contribution to journalArticle

47 Citations (Scopus)