Han-Yu Lin
Orcid: 0000-0003-3657-3241
According to our database1,
Han-Yu Lin
authored at least 68 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Sensors, October, 2024
CoRR, 2024
IEEE Access, 2024
Proceedings of the 8th International Conference on Machine Learning and Soft Computing, 2024
2023
Inf. Technol. Control., December, 2023
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
Sensors, March, 2023
CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments.
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023
2022
Sensors, 2022
An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network.
J. Sensors, 2022
Inf. Technol. Control., 2022
2021
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds.
Sensors, 2021
Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systems.
Int. J. Distributed Sens. Networks, 2021
2019
A Novel CCA-Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions.
Inf. Technol. Control., December, 2019
Symmetry, 2019
Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments.
IEEE Syst. J., 2019
2018
A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure.
IEEE Access, 2018
An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples.
IEEE Access, 2018
Proceedings of the New Trends in Computer Technologies and Applications, 2018
2017
A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks.
J. Softw., 2017
Inf. Technol. Control., 2017
Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers.
Int. J. Commun. Syst., 2017
Ad Hoc Sens. Wirel. Networks, 2017
On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings.
Proceedings of the 2017 International Conference on Telecommunications and Communication Engineering, 2017
2016
Inf. Technol. Control., 2016
Efficient dynamic authentication for mobile satellite communication systems without verification table.
Int. J. Satell. Commun. Netw., 2016
2015
Wirel. Pers. Commun., 2015
Wirel. Networks, 2015
Int. J. Inf. Sec., 2015
Int. Arab J. Inf. Technol., 2015
Commun. Nonlinear Sci. Numer. Simul., 2015
Proceedings of the 10th Asia Joint Conference on Information Security, 2015
2014
Wirel. Pers. Commun., 2014
Secur. Commun. Networks, 2014
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System.
KSII Trans. Internet Inf. Syst., 2014
Inf. Technol. Control., 2014
Inf. Sci., 2014
Int. J. Inf. Sec., 2014
Toward secure strong designated verifier signature scheme from identity-based system.
Int. Arab J. Inf. Technol., 2014
Int. Arab J. Inf. Technol., 2014
2013
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension.
Secur. Commun. Networks, 2013
Mob. Networks Appl., 2013
On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013
An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network.
KSII Trans. Internet Inf. Syst., 2013
Secure Universal Designated Verifier Signature and its Variant for Privacy Protection.
Inf. Technol. Control., 2013
Proceedings of the 42nd International Conference on Parallel Processing, 2013
2012
Secur. Commun. Networks, 2012
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce.
J. Inf. Sci. Eng., 2012
J. Inf. Sci. Eng., 2012
Provably convertible multi-authenticated encryption scheme for generalized group communications.
Inf. Sci., 2012
A publicly verifiable PCAE scheme for confidential applications with proxy delegation.
Trans. Emerg. Telecommun. Technol., 2012
Proceedings of the 2012 International Symposium on Biometrics and Security Technologies, 2012
2011
J. Netw. Comput. Appl., 2011
J. Inf. Sci. Eng., 2011
Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue.
J. Digit. Inf. Manag., 2011
Inf. Process. Lett., 2011
Int. J. Found. Comput. Sci., 2011
Expert Syst. Appl., 2011
2010
Comput. Math. Appl., 2010
2009
Informatica (Slovenia), 2009
2008
Multidimensional Scaling Algorithm for Mobile Location Based on Hybrid SADOA/TOA Measurement.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2004
Appl. Math. Comput., 2004
2003
Inf. Process. Lett., 2003