Han-Yu Lin

Orcid: 0000-0003-3657-3241

According to our database1, Han-Yu Lin authored at least 68 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments.
Sensors, October, 2024

The Variant of Designated Verifier Signature Scheme with Message Recovery.
CoRR, 2024

A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification.
IEEE Access, 2024

A Secure Certificateless Multi-signature Scheme for Wireless Sensor Networks.
Proceedings of the 8th International Conference on Machine Learning and Soft Computing, 2024

2023
CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKS.
Inf. Technol. Control., December, 2023

Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
Sensors, March, 2023

CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments.
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023

2022
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments.
Sensors, 2022

An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network.
J. Sensors, 2022

Revocable Certificateless Public Key Encryption with Equality Test.
Inf. Technol. Control., 2022

2021
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds.
Sensors, 2021

Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systems.
Int. J. Distributed Sens. Networks, 2021

2019
A Novel CCA-Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions.
Inf. Technol. Control., December, 2019

A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets.
Symmetry, 2019

Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments.
IEEE Syst. J., 2019

2018
Dynamic ID authentication scheme using chaotic map.
Wirel. Networks, 2018

A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure.
IEEE Access, 2018

An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples.
IEEE Access, 2018

On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

2017
A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks.
J. Softw., 2017

PCMAE: A Proxy Convertible Multi-AE Scheme and Its Variant.
Inf. Technol. Control., 2017

Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers.
Int. J. Commun. Syst., 2017

Toward Secure CB-Signcryption for Wireless Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2017

On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017

2016
Secure Certificateless Two-Party Key Agreement with Short Message.
Inf. Technol. Control., 2016

Efficient dynamic authentication for mobile satellite communication systems without verification table.
Int. J. Satell. Commun. Netw., 2016

2015
Secure Content Distribution Using Multi-hop Proxy Re-encryption.
Wirel. Pers. Commun., 2015

Location-based data encryption for wireless sensor network using dynamic keys.
Wirel. Networks, 2015

RPCAE: a novel revocable proxy convertible authenticated encryption scheme.
Int. J. Inf. Sec., 2015

Efficient english auction scheme without a secure channel.
Int. Arab J. Inf. Technol., 2015

Improved chaotic maps-based password-authenticated key agreement using smart cards.
Commun. Nonlinear Sci. Numer. Simul., 2015

A Provable Watermark-Based Copyright Protection Scheme.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

2014
Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme.
Wirel. Pers. Commun., 2014

Chaotic map-based three-party authenticated key agreement.
Secur. Commun. Networks, 2014

Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System.
KSII Trans. Internet Inf. Syst., 2014

Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension.
Inf. Technol. Control., 2014

Provably secure proxy convertible authenticated encryption scheme based on RSA.
Inf. Sci., 2014

Shoulder-surfing-proof graphical password authentication scheme.
Int. J. Inf. Sec., 2014

Toward secure strong designated verifier signature scheme from identity-based system.
Int. Arab J. Inf. Technol., 2014

Universal forgery attack on a strong designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2014

2013
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.
Secur. Commun. Networks, 2013

Non-Interactive Authenticated Key Agreement over the Mobile Communication Network.
Mob. Networks Appl., 2013

On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.
KSII Trans. Internet Inf. Syst., 2013

Secure Universal Designated Verifier Signature and its Variant for Privacy Protection.
Inf. Technol. Control., 2013

Secure PHR Access Control Scheme for Healthcare Application Clouds.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

2012
Pairing-based strong designated verifier proxy signature scheme with low cost.
Secur. Commun. Networks, 2012

An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.
J. Inf. Sci. Eng., 2012

Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs.
J. Inf. Sci. Eng., 2012

Provably convertible multi-authenticated encryption scheme for generalized group communications.
Inf. Sci., 2012

A publicly verifiable PCAE scheme for confidential applications with proxy delegation.
Trans. Emerg. Telecommun. Technol., 2012

Construction of a Taiwan Biodiversity Genetic Database in Cloud Environments.
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012

2011
New identity-based key-insulated convertible multi-authenticated encryption scheme.
J. Netw. Comput. Appl., 2011

A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.
J. Inf. Sci. Eng., 2011

Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue.
J. Digit. Inf. Manag., 2011

Improved convertible authenticated encryption scheme with provable security.
Inf. Process. Lett., 2011

A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme.
Int. J. Found. Comput. Sci., 2011

Audio watermarking scheme with dynamic adjustment in mute period.
Expert Syst. Appl., 2011

2010
Efficient proxy signcryption scheme with provable CCA and CMA security.
Comput. Math. Appl., 2010

2009
Efficient self-certified proxy CAE scheme and its variants.
J. Syst. Softw., 2009

Structural Binary CBC Encryption Mode.
J. Inf. Sci. Eng., 2009

A Study on Parallel RSA Factorization.
J. Comput., 2009

Secure Convertible Authenticated Encryption Scheme Based on RSA.
Informatica (Slovenia), 2009

2008
Convertible multi-authenticated encryption scheme.
Inf. Sci., 2008

Multidimensional Scaling Algorithm for Mobile Location Based on Hybrid SADOA/TOA Measurement.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2004
Robust key authentication scheme resistant to public key substitution attacks.
Appl. Math. Comput., 2004

2003
Improvement of the Miyazaki-Takaragi threshold digital signature scheme.
Inf. Process. Lett., 2003


  Loading...