Find Research Outputs

Search in all content

Filters for Research Output

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Yuh-Min Tseng
2012

A fully secure revocable ID-based encryption in the standard model

Tsai, T. T., Tseng, Y. M. & Wu, T. Y., 2012, In : Informatica (Netherlands). 23, 3, p. 487-505 19 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
2019

Exploration of Fast Edible Oil Classification Using Infrared Spectrum, Machine Learning, and Chemometrics

Chien, H. Y., Shih, A. T. & Tseng, Y. M., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923564. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2013

Efficient revocable multi-receiver ID-based encryption

Tsai, T. T., Tseng, Y-M. & Wu, T. Y., 2013 Jun 19, In : Information Technology and Control. 42, 2, p. 159-169 11 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2018

Some Study of Applying Infra-Red in Agriculture IoT

Chien, H. Y., Tseng, Y. M. & Hung, R. W., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 241-245 5 p. 8517239. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2012

Towards ID-based authenticated group key exchange protocol with identifying malicious participants

Wu, T. Y. & Tseng, Y. M., 2012, In : Informatica (Netherlands). 23, 2, p. 315-334 20 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants

Wu, T. Y., Tseng, Y. M. & Tsai, T. T., 2012 Aug 16, In : Computer Networks. 56, 12, p. 2994-3006 13 p.

Research output: Contribution to journalArticle

43 Citations (Scopus)
2011

A pairing-based publicly verifiable secret sharing scheme

Wu, T. Y. & Tseng, Y-M., 2011 Feb 1, In : Journal of Systems Science and Complexity. 24, 1, p. 186-194 9 p.

Research output: Contribution to journalArticle

27 Citations (Scopus)
2012

Towards generalized ID-based user authentication for mobile multi-server environment

Chuang, Y. H. & Tseng, Y. M., 2012 Apr 1, In : International Journal of Communication Systems. 25, 4, p. 447-460 14 p.

Research output: Contribution to journalArticle

47 Citations (Scopus)
2015

Revocable certificateless public key encryption

Tsai, T. T. & Tseng, Y. M., 2015 Sep 1, In : IEEE Systems Journal. 9, 3, p. 824-833 10 p., 6671357.

Research output: Contribution to journalArticle

22 Citations (Scopus)
2014

Efficient searchable ID-based encryption with a designated server

Wu, T. Y., Tsai, T. T. & Tseng, Y. M., 2014 Aug, In : Annales des Telecommunications/Annals of Telecommunications. 69, 7-8, p. 391-402 12 p.

Research output: Contribution to journalArticle

42 Citations (Scopus)
2018

Leakage-Resilient Certificate-based Encryption Scheme for IoT Environments

Tseng, Y. M., Wu, J. D., Hung, R. W. & Chien, H. Y., 2018 Oct 31, 2018 9th International Conference on Awareness Science and Technology, iCAST 2018. Institute of Electrical and Electronics Engineers Inc., p. 251-256 6 p. 8517196. (2018 9th International Conference on Awareness Science and Technology, iCAST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2014

Strongly secure revocable ID-based signature without random oracles

Hung, Y. H., Tsai, T. T., Tseng, Y. M. & Huang, S. S., 2014 Jan 1, In : Information Technology and Control. 43, 3, p. 264-276 13 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2016

List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures

Tseng, Y-M., Huang, S-S., Tsai, T. T. & Ke, J. H., 2016 Jan 1, In : IEEE Transactions on Emerging Topics in Computing. 4, 1, p. 102-112 11 p., 7017498.

Research output: Contribution to journalArticle

30 Citations (Scopus)
2018

Leakage-resilient certificateless key encapsulation scheme

Wu, J. D., Tseng, Y. M., Huang, S. S. & Chou, W. C., 2018 Jan 1, In : Informatica (Netherlands). 29, 1, p. 125-155 31 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2013

Leakage-free ID-based signature

Tseng, Y. M., Tsai, T. T. & Huang, S. S., 2013 Jan 1, In : Computer Journal. 58, 4, p. 750-757 8 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2014

Efficient strongly unforgeable ID-based signature without random oracles

Tsai, T. T., Tseng, Y. M. & Huang, S. S., 2014 Jan 1, In : Informatica (Netherlands). 25, 3, p. 505-521 17 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2017

Non-Repudiable Provable Data Possession Scheme with Designated Verifier in Cloud Storage Systems

Wu, T. Y., Tseng, Y-M., Huang, S-S. & Lai, Y. C., 2017 Sep 15, In : IEEE Access. 5, p. 19333-19341 9 p., 8039158.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage

Tsai, T. T., Tseng, Y. M., Hung, Y. H. & Huang, S. S., 2017 Aug 10, Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016. Tsai, P-W., Watada, J. & Kubota, N. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 56-59 4 p. 8008639. (Proceedings - 2016 3rd International Conference on Computing Measurement Control and Sensor Network, CMCSN 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2019

An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2019 Dec, In : IEEE Systems Journal. 13, 4, p. 3968-3979 12 p., 8643744.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2014

Efficient anonymous multi-receiver ID-based encryption with constant decryption cost

Tseng, Y. M., Tsai, T. T., Huang, S. S. & Chien, H. Y., 2014 Nov 5, Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014. Li, S., Cheng, Y., Dai, Y. & Jiang, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 131-137 7 p. 6948083. (Proceedings - 2014 International Conference on Information Science, Electronics and Electrical Engineering, ISEEE 2014; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2020

A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks

Hsieh, T. C., Tseng, Y. M. & Huang, S. S., 2020, In : IEEE Access. 8, p. 121795-121810 16 p., 9133077.

Research output: Contribution to journalArticle

Open Access
2012

A private online system for executing wills based on a secret sharing mechanism

Chen, C. L., Lee, C. C., Tseng, Y. M. & Chou, T. T., 2012 Jul, In : Security and Communication Networks. 5, 7, p. 725-737 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2017

An IND-ID-CPA Secure ID-Based Cryptographic Protocol using GDLP and IFP

Meshram, C., Tseng, Y. M., Lee, C. C. & Meshram, S. G., 2017 Jan 1, In : Informatica (Netherlands). 28, 3, p. 471-484 14 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2019

Finding Longest (s, t)-paths of O-shaped Supergrid Graphs in Linear Time

Hung, R. W., Keshavarz-Kohjerdi, F., Tseng, Y. M. & Qiu, G. H., 2019 Oct, 2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8923400. (2019 IEEE 10th International Conference on Awareness Science and Technology, iCAST 2019 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

A secure ID-Based authenticated group key exchange protocol resistant to insider attacks

Wu, T. Y., Tseng, Y. M. & Yu, C. W., 2011 May 1, In : Journal of Information Science and Engineering. 27, 3, p. 915-932 18 p.

Research output: Contribution to journalArticle

18 Citations (Scopus)
2012

A revocable ID-based signcryption scheme

Wu, T. Y., Tsai, T. T. & Tseng, Y-M., 2012 Dec 21, In : Journal of Information Hiding and Multimedia Signal Processing. 3, 3, p. 240-251 12 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

ID-based key-insulated signature scheme with batch verifications and its novel application

Wu, T. Y., Tseng, Y-M. & Yu, C. W., 2012 Jul 1, In : International Journal of Innovative Computing, Information and Control. 8, 7 A, p. 4797-4810 14 p.

Research output: Contribution to journalArticle

13 Citations (Scopus)
1 Citation (Scopus)
2013

Provably secure revocable ID-based signature in the standard model

Tsai, T. T., Tseng, Y-M. & Wu, T. Y., 2013 Jan 1, In : Security and Communication Networks. 6, 10, p. 1250-1260 11 p.

Research output: Contribution to journalArticle

24 Citations (Scopus)
2012

Revocable ID-based signature scheme with batch verifications

Wu, T. Y., Tsai, T. T. & Tseng, Y. M., 2012, Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012. p. 49-54 6 p. 6274399. (Proceedings of the 2012 8th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)
2015

Enhancement on strongly secure group key agreement

Tseng, Y. M., Tsai, T. T. & Huang, S. S., 2015 Jan 25, In : Security and Communication Networks. 8, 2, p. 126-135 10 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Certificateless Signature with Strong Unforgeability in the Standard Model

Hung, Y. H., Huang, S. S., Tseng, Y. M. & Tsai, T. T., 2015 Mar 3, In : Informatica (Netherlands). 26, 4, p. 663-684 22 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
10 Citations (Scopus)
2017

Revocable ID-based signature with short size over lattices

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2017, In : Security and Communication Networks. 2017, 7571201.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2015

Efficient revocable certificateless public key encryption with a delegated revocation authority

Tsai, T. T., Tseng, Y-M. & Huang, S-S., 2015 Dec 1, In : Security and Communication Networks. 8, 18, p. 3713-3725 13 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)
2018

Identity-based encryption with cloud revocation authority and its applications

Tseng, Y. M., Tsai, T. T., Huang, S. S. & Huang, C. P., 2018 Oct 1, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1041-1053 13 p., 7430324.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2016

A short certificate-based signature scheme with provable security

Hung, Y. H., Huang, S. S. & Tseng, Y. M., 2016 Jan 1, In : Information Technology and Control. 45, 3, p. 243-253 11 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2017

Lattice-based revocable certificateless signature

Hung, Y. H., Tseng, Y. M. & Huang, S. S., 2017, In : Symmetry. 9, 10, 242.

Research output: Contribution to journalArticle

Open Access
6 Citations (Scopus)

SIBSC: Separable Identity-Based Signcryption for Resource-Constrained Devices

Tsai, T. T., Huang, S. S. & Tseng, Y. M., 2017 Jan 1, In : Informatica (Netherlands). 28, 1, p. 193-214 22 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2018

Leakage-resilient certificateless signature under continual leakage model

Wu, J. D., Tseng, Y. M. & Huang, S. S., 2018, In : Information Technology and Control. 47, 2, p. 363-386 24 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2011

A free-rider aware reputation system for peer-to-peer file-sharing networks

Tseng, Y-M. & Chen, F. G., 2011 Mar 1, In : Expert Systems with Applications. 38, 3, p. 2432-2440 9 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)
2014

RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE

Tsai, T. T., Tseng, Y. M. & Wu, T. Y., 2014 Jan 1, In : Informatica (Netherlands). 25, 2, p. 299-326 28 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
2012

Towards scalable key management for secure multicast communication

Tseng, Y. M., Yu, C. H. & Wu, T. Y., 2012, In : Information Technology and Control. 41, 2, p. 173-182 10 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2011

A convinced commitment scheme for bilinear Diffie-Hellman problem

Tseng, Y-M., Wu, T. Y. & Tsai, T. T., 2011 Sep 1, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 156-161 6 p. 5967536

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2012

Efficient revocable ID-based encryption with a public channel

Tseng, Y-M. & Tsai, T. T., 2012 Apr 1, In : Computer Journal. 55, 4, p. 475-486 12 p.

Research output: Contribution to journalArticle

51 Citations (Scopus)

CCA-secure anonymous multi-receiver ID-based encryption

Tseng, Y-M., Huang, Y. H. & Chang, H. J., 2012 May 14, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 177-182 6 p. 6185119. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)
2013

Further analysis of pairing-based traitor tracing schemes for broadcast encryption

Wu, T. Y. & Tseng, Y-M., 2013 Jan 1, In : Security and Communication Networks. 6, 1, p. 28-32 5 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2014

A provably secure revocable id-based authenticated group key exchange protocol with identifying malicious participants

Wu, T. Y., Tsai, T. T. & Tseng, Y. M., 2014, In : Scientific World Journal. 2014, 367264.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Privacy-preserving multireceiver ID-based encryption with provable security

Tseng, Y. M., Huang, Y. H. & Chang, H. J., 2014 Jul, In : International Journal of Communication Systems. 27, 7, p. 1034-1050 17 p.

Research output: Contribution to journalArticle

27 Citations (Scopus)
2011

Two-round contributory group key exchange protocol for wireless network environments

Wu, T. Y., Tseng, Y. M. & Yu, C. W., 2011 Dec 1, In : Eurasip Journal on Wireless Communications and Networking. 2011, 1, 12.

Research output: Contribution to journalArticle

6 Citations (Scopus)