Chun-I Fan

Orcid: 0000-0002-7512-1291

According to our database1, Chun-I Fan authored at least 122 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cryptanalysis of RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.
J. Inf. Sci. Eng., November, 2024

A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions.
IEEE Trans. Dependable Secur. Comput., 2024

CCA-Secure Key-Aggregate Proxy Re-Encryption for Secure Cloud Storage.
CoRR, 2024

Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

PISTON: PUF-Integrated Secure, Throughput-Optimized Network Protocol for IoV.
Proceedings of the 29th IEEE Asia Pacific Conference on Communications, 2024

2023
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT.
ACM Trans. Sens. Networks, August, 2023

A Secure Cloud Gaming System.
J. Inf. Sci. Eng., May, 2023

Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023

2022
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning.
ACM Trans. Sens. Networks, November, 2022

Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Fast keyword search over encrypted data with short ciphertext in clouds.
J. Inf. Secur. Appl., 2022

Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices.
IEEE Access, 2022

IoT Botnet Detection Based on the Behaviors of DNS Queries.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Clustering-Based Network Intrusion Detection System.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Message from the General Co-Chairs: AsiaJCIS 2022.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Cross-Network-Slice Authentication Scheme for the 5<sup>th</sup> Generation Mobile Communication System.
IEEE Trans. Netw. Serv. Manag., 2021

Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery.
IEEE Trans. Cloud Comput., 2021

Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model.
Secur. Commun. Networks, 2021

Reliable file transfer protocol with producer anonymity for Named Data Networking.
J. Inf. Secur. Appl., 2021

An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport.
IACR Cryptol. ePrint Arch., 2021

An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments.
Proceedings of the Thirteenth International Conference on Mobile Computing and Ubiquitous Network, 2021

CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications.
IEEE Trans. Inf. Forensics Secur., 2020

Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks.
Int. J. Inf. Sec., 2020

A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
FGAC-NDN: Fine-Grained Access Control for Named Data Networks.
IEEE Trans. Netw. Serv. Manag., 2019

A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid.
IEEE Trans. Ind. Informatics, 2019

Top-Level Secure Certificateless Signature Scheme in the Standard Model.
IEEE Syst. J., 2019

Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption.
J. Univers. Comput. Sci., 2019

Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices.
IEEE Internet Things J., 2019

On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.
Int. J. Found. Comput. Sci., 2019

2018
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.
IEEE Syst. J., 2018

Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption.
J. Inf. Sci. Eng., 2018

Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
J. Inf. Process., 2018

Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading.
IEEE Internet Things J., 2018

Probably Secure Efficient Anonymous Credential Scheme.
Int. J. Softw. Innov., 2018

An authenticated re-encryption scheme for secure file transfer in named data networks.
Int. J. Commun. Syst., 2018

ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G.
CoRR, 2018

An Efficient Algorithm for the Shortest Vector Problem.
IEEE Access, 2018

Enhancement of FTP-NDN Supporting Nondesignated Receivers.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

Verifiable Privacy-Preserving Payment Mechanism for Smart Grids.
Proceedings of the Internet and Distributed Computing Systems, 2018

Risk of Bitcoin Addresses to be Identified from Features of Output Addresses.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

CORE: Cooperative Encryption with its Applications to Controllable Security Services.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem.
Proceedings of the 13th Asia Joint Conference on Information Security, 2018

Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Multireceiver Predicate Encryption for Online Social Networks.
IEEE Trans. Signal Inf. Process. over Networks, 2017

Provably Secure Timed-Release Proxy Conditional Reencryption.
IEEE Syst. J., 2017

Deniable Searchable Symmetric Encryption.
Inf. Sci., 2017

Attribute-Based Encryption from Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

Homomorphic encryption supporting logical operations.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

2016
Privacy enhancement for fair PayWord-based micropayment.
Secur. Commun. Networks, 2016

Enabled/disabled predicate encryption in clouds.
Future Gener. Comput. Syst., 2016

Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments.
Proceedings of the 6th International Conference on IT Convergence and Security, 2016

Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security.
Symmetry, 2015

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015

Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015

Malware Detection Systems Based on API Log Data Mining.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Attribute-Based Proxy Re-encryption with Dynamic Membership.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Encrypted Data Deduplication in Cloud Storage.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid.
IEEE Trans. Ind. Informatics, 2014

Truly Anonymous Paper Submission and Review Scheme.
Trans. Data Priv., 2014

Arbitrary-State Attribute-Based Encryption with Dynamic Membership.
IEEE Trans. Computers, 2014

An Efficient Authentication and Service Key Agreement Scheme in IOT Environments.
Proceedings of the Intelligent Systems and Applications, 2014

Anonymous Credential Scheme Supporting Active Revocation.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

Strongly Privacy-Preserving Communication Protocol for VANETs.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs.
IEEE Trans. Parallel Distributed Syst., 2013

Design and implementation of privacy preserving billing protocol for smart grid.
J. Supercomput., 2013

Multi-recastable e-bidding game with dual-blindness.
Math. Comput. Model., 2013

User efficient recoverable off-line e-cash scheme with fast anonymity revoking.
Math. Comput. Model., 2013

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013

Controllable privacy preserving search based on symmetric predicate encryption in cloud storage.
Future Gener. Comput. Syst., 2013

Active One-Time Password Mechanism for User Authentication.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Anonymous Multi-receiver Certificate-Based Encryption.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

Secure Certificateless Signature Scheme Supporting Batch Verification.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme.
Secur. Commun. Networks, 2012

Attribute-based strong designated-verifier signature scheme.
J. Syst. Softw., 2012

Predictive pixel differencing expansion in data reversibility scheme.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

2011
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings.
J. Inf. Sci. Eng., 2011

IoT-IMS Communication Platform for Future Internet.
Int. J. Adapt. Resilient Auton. Syst., 2011

Group Signature with Constant Revocation Costs for Signers and Verifiers.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Provably Secure Integrated On/Off-Line Electronic Cash for Flexible and Efficient Payment.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.
IEEE/ACM Trans. Netw., 2010

Anonymous Multireceiver Identity-Based Encryption.
IEEE Trans. Computers, 2010

Provably secure randomized blind signature scheme based on bilinear pairing.
Comput. Math. Appl., 2010

2009
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics.
IEEE Trans. Inf. Forensics Secur., 2009

Fair anonymous rewarding based on electronic cash.
J. Syst. Softw., 2009

Buyer-seller watermarking protocols with off-line trusted third parties.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Cryptanalysis of Lee-Hwang-Yang blind signature scheme.
Comput. Stand. Interfaces, 2009

Truly Anonymous Paper Submission and Review Scheme.
Proceedings of the The Forth International Conference on Availability, 2009

2008
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting.
Math. Comput. Model., 2008

Anonymous Fair Transaction Protocols Based on Electronic Cash.
Int. J. Electron. Commer., 2008

Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Multi-recastable E-Bidding Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
Customer Efficient Electronic Cash Protocols.
J. Organ. Comput. Electron. Commer., 2007

Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Buyer-Seller Watermarking Protocols with Off-line Trusted Parties.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.
Proceedings of the Advances in Information and Computer Security, 2007

2006
Ownership-attached unblinding of blind signatures for untraceable electronic cash<sup>, </sup>.
Inf. Sci., 2006

Fair Transaction Protocols Based on Electronic Cash.
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006

Uncoercible Anonymous Electronic Voting.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Remote Password Authentication Scheme with Smart Cards and Biometrics.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol.
IACR Cryptol. ePrint Arch., 2005

Robust remote authentication scheme with smart cards.
Comput. Secur., 2005

2003
Comments on Hwang-Lee-Lai Attack upon Fan-Lei Partially Blind Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Improved low-computation partially blind signatures.
Appl. Math. Comput., 2003

2002
An unlinkably divisible and intention attachable ticket scheme for runoff elections.
J. Netw. Comput. Appl., 2002

A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash.
J. Inf. Sci. Eng., 2002

2001
An Efficient Blind Signature Scheme for Information Hiding.
Int. J. Electron. Commer., 2001

2000
Randomization enhanced Chaum's blind signature scheme.
Comput. Commun., 2000

Date attachable electronic cash.
Comput. Commun., 2000

A Randomization Enhanced Scheme for Chaum's Blind Signature.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

An Anonymous Electronic Voting Protocol with the Latest Decision on Voters' Intentions.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999

1997
Secure Rewarding Schemes.
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997

1996
A Multi-Recastable Ticket Scheme for Electronic Elections.
Proceedings of the Advances in Cryptology, 1996


  Loading...