dblp.uni-trier.dewww.uni-trier.de

Yuh-Min Tseng Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
31EEYuh-Min Tseng: USIM-based EAP-TLS authentication protocol for wireless local area networks. Computer Standards & Interfaces 31(1): 128-136 (2009)
2008
30EEYuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu: A Pairing-Based User Authentication Scheme for Wireless Clients with Smart Cards. Informatica, Lith. Acad. Sci. 19(2): 285-302 (2008)
2007
29EEYuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu: A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. COMPSAC (2) 2007: 700-710
28EEYuh-Min Tseng: A secure authenticated group key agreement protocol for resource-limited mobile devices. Comput. J. 50(1): 41-52 (2007)
27EEYuh-Min Tseng: A resource-constrained group key agreement protocol for imbalanced wireless networks. Computers & Security 26(4): 331-337 (2007)
26EEYuh-Min Tseng: An Efficient Two-Party Identity-Based Key Exchange Protocol. Informatica, Lith. Acad. Sci. 18(1): 125-136 (2007)
25EEYuh-Min Tseng: A heterogeneous-network aided public-key management scheme for mobile ad hoc networks. Int. Journal of Network Management 17(1): 3-15 (2007)
24EEYuh-Min Tseng: A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy. Journal of Systems and Software 80(7): 1091-1101 (2007)
2006
23EEYuh-Min Tseng: On the Security of Two Group Key Agreement Protocols for Mobile Devices. MDM 2006: 97
2005
22EEYuh-Min Tseng: A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants. Comput. J. 48(4): 480-487 (2005)
21EEYuh-Min Tseng: An Improved Conference-Key Agreement Protocol with Forward Secrecy. Informatica, Lith. Acad. Sci. 16(2): 275-284 (2005)
20EEYuh-Min Tseng: Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Int. Journal of Network Management 15(3): 193-202 (2005)
2004
19EEYuh-Min Tseng: On the security of an efficient two-pass key agreement protocol. Computer Standards & Interfaces 26(4): 371-374 (2004)
18EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: Solving the invalid signer-verified signature problem and comments on Xia-You group signature. Journal of Systems and Software 73(3): 369-373 (2004)
2003
17EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: Partially Blind Threshold Signature Based on RSA. Informatica, Lith. Acad. Sci. 14(2): 155-166 (2003)
16EEYuh-Min Tseng: A scalable key-management scheme with minimizing key storage for secure group communications. Int. Journal of Network Management 13(6): 419-425 (2003)
2002
15 Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: An Efficient and Practical Solution to Remote Authentication: Smart Card. Computers & Security 21(4): 372-375 (2002)
14EEYuh-Min Tseng: Cryptanalysis and Improvement of Key Distribution System for VSAT Satellite Communications. Informatica, Lith. Acad. Sci. 13(3): 369-376 (2002)
13EEYuh-Min Tseng, Jinn-ke Jan: An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs. J. Inf. Sci. Eng. 18(1): 41-46 (2002)
2001
12 Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: RSA-Based Partially Blind Signature with Low Computation. ICPADS 2001: 385-389
11 Yuh-Min Tseng, Jinn-ke Jan: Generalized group-oriented cryptosystem with authenticated sender. Comput. Syst. Sci. Eng. 16(5): 291-294 (2001)
10EEHung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng: Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. Inf. Process. Lett. 80(2): 113-117 (2001)
9EEYuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien: On the Security of Methods for Protecting Password Transmission. Informatica, Lith. Acad. Sci. 12(3): 469-476 (2001)
8EEHung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng: A modified remote login authentication scheme based on geometric approach. Journal of Systems and Software 55(3): 287-290 (2001)
1999
7EEJinn-ke Jan, Yuh-Min Tseng: New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. ICPP Workshops 1999: 198-203
6EEYuh-Min Tseng, Jinn-ke Jan: Anonymous conference key distribution systems based on the discrete logarithm problem. Computer Communications 22(8): 749-754 (1999)
5EEYuh-Min Tseng, Jinn-ke Jan: Attacks on Threshold Signature Schemes with Traceable Signers. Inf. Process. Lett. 71(1): 1-4 (1999)
4 Yuh-Min Tseng, Jinn-ke Jan: A Novel ID-based Group Signature. Inf. Sci. 120(1-4): 131-141 (1999)
1998
3EEYuh-Min Tseng, Jinn-ke Jan: ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. ACSAC 1998: 237-243
2 Yuh-Min Tseng, Jinn-ke Jan: A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. Inf. Sci. 112(1-4): 199-211 (1998)
1996
1EEJinn-ke Jan, Yuh-Min Tseng: On the Security of Image Encryption Method. Inf. Process. Lett. 60(5): 261-265 (1996)

Coauthor Index

1Hung-Yu Chien [8] [9] [10] [12] [15] [17] [18]
2Jinn-ke Jan [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [15] [17] [18]
3Jui-Di Wu [29] [30]
4Tsu-Yang Wu [29] [30]
5Tzong-Chen Wu [10]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)