Chun-I Fan
Orcid: 0000-0002-7512-1291
According to our database1,
Chun-I Fan
authored at least 122 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cryptanalysis of RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.
J. Inf. Sci. Eng., November, 2024
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions.
IEEE Trans. Dependable Secur. Comput., 2024
Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024
Proceedings of the 29th IEEE Asia Pacific Conference on Communications, 2024
2023
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT.
ACM Trans. Sens. Networks, August, 2023
Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack.
Proceedings of the 17th International Conference on Ubiquitous Information Management and Communication, 2023
2022
ACM Trans. Sens. Networks, November, 2022
Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
J. Inf. Secur. Appl., 2022
IEEE Access, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Cross-Network-Slice Authentication Scheme for the 5<sup>th</sup> Generation Mobile Communication System.
IEEE Trans. Netw. Serv. Manag., 2021
Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery.
IEEE Trans. Cloud Comput., 2021
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model.
Secur. Commun. Networks, 2021
J. Inf. Secur. Appl., 2021
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport.
IACR Cryptol. ePrint Arch., 2021
An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments.
Proceedings of the Thirteenth International Conference on Mobile Computing and Ubiquitous Network, 2021
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications.
IEEE Trans. Inf. Forensics Secur., 2020
Int. J. Inf. Sec., 2020
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
IEEE Trans. Netw. Serv. Manag., 2019
IEEE Trans. Ind. Informatics, 2019
IEEE Syst. J., 2019
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption.
J. Univers. Comput. Sci., 2019
Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices.
IEEE Internet Things J., 2019
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation.
Int. J. Found. Comput. Sci., 2019
2018
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers.
IEEE Syst. J., 2018
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption.
J. Inf. Sci. Eng., 2018
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets.
J. Inf. Process., 2018
Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading.
IEEE Internet Things J., 2018
An authenticated re-encryption scheme for secure file transfer in named data networks.
Int. J. Commun. Syst., 2018
ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G.
CoRR, 2018
Proceedings of the New Trends in Computer Technologies and Applications, 2018
Proceedings of the Internet and Distributed Computing Systems, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
CORE: Cooperative Encryption with its Applications to Controllable Security Services.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Proceedings of the 13th Asia Joint Conference on Information Security, 2018
Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
IEEE Trans. Signal Inf. Process. over Networks, 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017
2016
Secur. Commun. Networks, 2016
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016
Proceedings of the 6th International Conference on IT Convergence and Security, 2016
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
2015
Symmetry, 2015
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture.
J. Inf. Sci. Eng., 2015
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
IEEE Trans. Ind. Informatics, 2014
IEEE Trans. Computers, 2014
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
2013
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs.
IEEE Trans. Parallel Distributed Syst., 2013
J. Supercomput., 2013
Math. Comput. Model., 2013
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity.
KSII Trans. Internet Inf. Syst., 2013
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage.
Future Gener. Comput. Syst., 2013
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme.
Secur. Commun. Networks, 2012
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
2011
J. Inf. Sci. Eng., 2011
Int. J. Adapt. Resilient Auton. Syst., 2011
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Provably Secure Integrated On/Off-Line Electronic Cash for Flexible and Efficient Payment.
IEEE Trans. Syst. Man Cybern. Part C, 2010
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications.
IEEE/ACM Trans. Netw., 2010
Comput. Math. Appl., 2010
2009
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics.
IEEE Trans. Inf. Forensics Secur., 2009
Int. J. Ad Hoc Ubiquitous Comput., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Math. Comput. Model., 2008
Int. J. Electron. Commer., 2008
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2007
J. Organ. Comput. Electron. Commer., 2007
Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications.
Proceedings of the Advances in Information and Computer Security, 2007
2006
Ownership-attached unblinding of blind signatures for untraceable electronic cash<sup>, </sup>.
Inf. Sci., 2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2005
IACR Cryptol. ePrint Arch., 2005
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
J. Netw. Comput. Appl., 2002
J. Inf. Sci. Eng., 2002
2001
Int. J. Electron. Commer., 2001
2000
A Randomization Enhanced Scheme for Chaum's Blind Signature.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
An Anonymous Electronic Voting Protocol with the Latest Decision on Voters' Intentions.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
1999
Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999
1997
Proceedings of the 30th Annual Hawaii International Conference on System Sciences (HICSS-30), 1997
1996
Proceedings of the Advances in Cryptology, 1996