Search concepts
|
Selected filters |
Search results
-
2019
Study of Adaptive Dynamic Replication Mechanism in Mobile Edge Computing Environment
Chiang, M. L., Huang, B. R., Chen, H. W., Hsieh, H. C. & Chang, T. Y., 2019 Oct, Proceedings of the 2019 8th International Conference on Innovation, Communication and Engineering, ICICE 2019. Chang, S-J., Young, S-J., Lam, A. D. K-T., Ji, L-W., Lu, H-Y. & Prior, S. D. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 30-32 3 p. 9117319. (Proceedings of the 2019 8th International Conference on Innovation, Communication and Engineering, ICICE 2019).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2012
Cryptanalysis on an improved version of ElGamal-Like Public-Key Encryption Scheme for encrypting large messages
Chang, T. Y., Hwang, M. S. & Yang, W. P., 2012 Jan 1, In: Informatica (Netherlands). 23, 4, p. 537-562 26 p.Research output: Contribution to journal › Article › peer-review
7 Citations (Scopus) -
Improvement of convertible authenticated encryption schemes and its multiple recipients version
Chang, T-Y., Yang, C. C. & Hwang, M. S., 2012 Dec 1, In: International Journal of Security and its Applications. 6, 4, p. 151-162 12 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
2014
Two novel biometric features in keystroke dynamics authentication systems for touch screen devices
Tasia, C. J., Chang, T. Y., Cheng, P. C. & Lin, J. H., 2014 Apr, In: Security and Communication Networks. 7, 4, p. 750-758 9 p.Research output: Contribution to journal › Article › peer-review
49 Citations (Scopus) -
2017
Password authenticated key exchange and protected password change protocols
Chang, T. Y., Hwang, M. S. & Yang, C. C., 2017 Aug, In: Symmetry. 9, 8, 134.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
2018
Ephemeral-secret-leakage secure ID-based three-party Authenticated Key Agreement Protocol for mobile distributed computing environments
Liu, C. L., Tsai, W. J., Chang, T-Y. & Liu, T. M., 2018 Apr 1, In: Symmetry. 10, 4, 84.Research output: Contribution to journal › Article › peer-review
5 Citations (Scopus) -
2012
An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification
Tsai, C. J., Chang, T. Y., Yang, Y. J., Wu, M. S. & Li, Y. C., 2012 Nov 27, In: International Journal of Innovative Computing, Information and Control. 8, 11, p. 7875-7886 12 p.Research output: Contribution to journal › Article › peer-review
13 Citations (Scopus) -
2015
Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones
Tsai, C. J., Peng, C. C., Chiang, M. L., Chang, T. Y., Tsai, W. J. & Wu, H. S., 2015 Mar 3, Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014. Institute of Electrical and Electronics Engineers Inc., p. 353-356 4 p. 7054316. (Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
2012
The batch verifying multiple digital signature scheme: A modified version of Ohta-Okamoto digital signature
Hwang, M. S., Chang, T. Y. & Yang, W. P., 2012 Oct 8, Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012. p. 732-735 4 p. 6268596. (Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Dynamically generate a long-lived private key based on password keystroke features and neural network
Chang, T. Y., 2012 Nov 30, In: Information sciences. 211, p. 36-47 12 p.Research output: Contribution to journal › Article › peer-review
17 Citations (Scopus) -
2016
A changeable personal identification number-based keystroke dynamics authentication system on smart phones
Chang, T. Y., Tsai, C. J., Tsai, W. J., Peng, C. C. & Wu, H. S., 2016 Oct 1, In: Security and Communication Networks. 9, 15, p. 2674-2685 12 p.Research output: Contribution to journal › Article › peer-review
10 Citations (Scopus) -
2012
Simultaneously construct IRT-based parallel tests based on an adapted CLONALG algorithm
Chang, T. Y. & Shiu, Y. F., 2012 Jun 1, In: Applied Intelligence. 36, 4, p. 979-994 16 p.Research output: Contribution to journal › Article › peer-review
13 Citations (Scopus) -
2015
Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion
Liu, C. L., Tsai, W. J., Chang, T. Y., Peng, C. C. & Wong, P. S., 2015 Mar 19, In: Computer Journal. 58, 7, p. 1598-1606 9 p.Research output: Contribution to journal › Article › peer-review
3 Citations (Scopus) -
2012
A simple keystroke dynamics-based authentication system using means and standard deviations
Liu, C. L., Chang, T. Y., Chiang, M. L. & Tsai, C. J., 2012 Jul 18, In: Journal of Internet Technology. 13, 3, p. 439-444 6 p.Research output: Contribution to journal › Article › peer-review
5 Citations (Scopus) -
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
Chang, T. Y., Tsai, C. J. & Lin, J. H., 2012 May, In: Journal of Systems and Software. 85, 5, p. 1157-1165 9 p.Research output: Contribution to journal › Article › peer-review
79 Citations (Scopus) -
2015
Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone
Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J. & Zhong, P. K., 2015 Jul 1, In: Journal of Network and Computer Applications. 53, p. 128-139 12 p.Research output: Contribution to journal › Article › peer-review
15 Citations (Scopus) -
2018
Improvements of Threshold Signature and Authenticated Encryption for Group Communications
Hwang, M. S., Chang, T. & Yang, C., 2018 Aug 30, In: Journal of Physics: Conference Series. 1069, 1, 012064.Research output: Contribution to journal › Conference article › peer-review