Search concepts
|
Selected filters |
Search results
-
Article
A changeable personal identification number-based keystroke dynamics authentication system on smart phones
Chang, T. Y., Tsai, C. J., Tsai, W. J., Peng, C. C. & Wu, H. S., 2016 Oct 1, In: Security and Communication Networks. 9, 15, p. 2674-2685 12 p.Research output: Contribution to journal › Article › peer-review
10 Citations (Scopus) -
A fast and noise tolerable binarization method for automatic license plate recognition in the open environment in Taiwan
Peng, C. C., Tsai, C. J., Chang, T. Y., Yeh, J. Y., Dai, H. & Tsai, M. H., 2020 Aug, In: Symmetry. 12, 8, 1374.Research output: Contribution to journal › Article › peer-review
Open Access -
A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices
Chang, T. Y., Tsai, C. J. & Lin, J. H., 2012 May, In: Journal of Systems and Software. 85, 5, p. 1157-1165 9 p.Research output: Contribution to journal › Article › peer-review
84 Citations (Scopus) -
Analyzing processing quality of machine tools via processed product: Example of ball valve processing machine
Chen, K-S., Chen, D-F., Huang, M-C. & Chang, T-C., 2020, In: Proceedings of the Institution of Mechanical Engineers, Part E: Journal of Process Mechanical Engineering. 234, 4, p. 331-341 11 p.Research output: Contribution to journal › Article › peer-review
3 Citations (Scopus) -
Analyzing slowdown and meltdowns in the African countries: New evidence using Fourier quantile unit root test
Lee, Y-L., Ranjbar, O., Jahangard, F. & Chang, T., 2020, In: International Review of Economics and Finance. 65, p. 187-198 12 p.Research output: Contribution to journal › Article › peer-review
-
An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification
Tsai, C. J., Chang, T. Y., Yang, Y. J., Wu, M. S. & Li, Y. C., 2012 Nov 27, In: International Journal of Innovative Computing, Information and Control. 8, 11, p. 7875-7886 12 p.Research output: Contribution to journal › Article › peer-review
13 Citations (Scopus) -
A new approach to generate diversified clusters for small data sets
Peng, C-C., Tsai, C-J., Chang, T-Y., Yeh, J-Y. & Hua, P-W., 2020, In: Applied Soft Computing Journal. 95Research output: Contribution to journal › Article › peer-review
-
A new group signature scheme based on RSA assumption
Yang, C. C., Chang, T. Y. & Hwang, M. S., 2013, In: Information Technology and Control. 42, 1, p. 61-66 6 p.Research output: Contribution to journal › Article › peer-review
6 Citations (Scopus) -
A personalized e-course composition based on a genetic algorithm with forcing legality in an adaptive learning system
Chang, T. Y. & Ke, Y. R., 2013 Jan 1, In: Journal of Network and Computer Applications. 36, 1, p. 533-542 10 p.Research output: Contribution to journal › Article › peer-review
18 Citations (Scopus) -
A simple keystroke dynamics-based authentication system using means and standard deviations
Liu, C. L., Chang, T. Y., Chiang, M. L. & Tsai, C. J., 2012 Jul 18, In: Journal of Internet Technology. 13, 3, p. 439-444 6 p.Research output: Contribution to journal › Article › peer-review
5 Citations (Scopus) -
Cryptanalysis on an improved version of ElGamal-Like Public-Key Encryption Scheme for encrypting large messages
Chang, T. Y., Hwang, M. S. & Yang, W. P., 2012 Jan 1, In: Informatica (Netherlands). 23, 4, p. 537-562 26 p.Research output: Contribution to journal › Article › peer-review
7 Citations (Scopus) -
Dynamically generate a long-lived private key based on password keystroke features and neural network
Chang, T. Y., 2012 Nov 30, In: Information sciences. 211, p. 36-47 12 p.Research output: Contribution to journal › Article › peer-review
17 Citations (Scopus) -
Ephemeral-secret-leakage secure ID-based three-party Authenticated Key Agreement Protocol for mobile distributed computing environments
Liu, C. L., Tsai, W. J., Chang, T-Y. & Liu, T. M., 2018 Apr 1, In: Symmetry. 10, 4, 84.Research output: Contribution to journal › Article › peer-review
5 Citations (Scopus) -
Implementing multiple biometric features for a recall-based graphical keystroke dynamics authentication system on a smart phone
Liu, C. L., Tsai, C. J., Chang, T. Y., Tsai, W. J. & Zhong, P. K., 2015 Jul 1, In: Journal of Network and Computer Applications. 53, p. 128-139 12 p.Research output: Contribution to journal › Article › peer-review
17 Citations (Scopus) -
Improvement of convertible authenticated encryption schemes and its multiple recipients version
Chang, T-Y., Yang, C. C. & Hwang, M. S., 2012 Dec 1, In: International Journal of Security and its Applications. 6, 4, p. 151-162 12 p.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Meaningful Share Generation for (2, 2)-Multiple Visual Secret Sharing Scheme Without Pixel Expansion
Liu, C. L., Tsai, W. J., Chang, T. Y., Peng, C. C. & Wong, P. S., 2015 Mar 19, In: Computer Journal. 58, 7, p. 1598-1606 9 p.Research output: Contribution to journal › Article › peer-review
3 Citations (Scopus) -
New soft biometrics for limited resource in keystroke dynamics authentication
Chang, T-Y., Tsai, C. J., Yeh, J. Y., Peng, C. C. & Chen, P. H., 2020 Jan 1, (Accepted/In press) In: Multimedia Tools and Applications.Research output: Contribution to journal › Article › peer-review
-
Password authenticated key exchange and protected password change protocols
Chang, T. Y., Hwang, M. S. & Yang, C. C., 2017 Aug, In: Symmetry. 9, 8, 134.Research output: Contribution to journal › Article › peer-review
1 Citation (Scopus) -
Simultaneously construct IRT-based parallel tests based on an adapted CLONALG algorithm
Chang, T. Y. & Shiu, Y. F., 2012 Jun 1, In: Applied Intelligence. 36, 4, p. 979-994 16 p.Research output: Contribution to journal › Article › peer-review
13 Citations (Scopus) -
Conference article
Improvements of Threshold Signature and Authenticated Encryption for Group Communications
Hwang, M. S., Chang, T. & Yang, C., 2018 Aug 30, In: Journal of Physics: Conference Series. 1069, 1, 012064.Research output: Contribution to journal › Conference article › peer-review
-
Conference contribution
The batch verifying multiple digital signature scheme: A modified version of Ohta-Okamoto digital signature
Hwang, M. S., Chang, T. Y. & Yang, W. P., 2012 Oct 8, Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012. p. 732-735 4 p. 6268596. (Proceedings - 2012 8th International Conference on Computing Technology and Information Management, ICCM 2012; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones
Tsai, C. J., Peng, C. C., Chiang, M. L., Chang, T. Y., Tsai, W. J. & Wu, H. S., 2015 Mar 3, Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014. Institute of Electrical and Electronics Engineers Inc., p. 353-356 4 p. 7054316. (Proceedings of the 2014 9th International Conference on Communications and Networking in China, CHINACOM 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus)