Jen-Chieh Hsu

According to our database1, Jen-Chieh Hsu authored at least 7 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authenticated Key Exchange Protocol Using Bi-ISIS.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2022
Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption.
Proceedings of the 17th Asia Joint Conference on Information Security, 2022

2021
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.
Secur. Commun. Networks, 2021

Improved Proxy Re-encryption Scheme with Equality Test.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2018
Policy-Controlled Signature from NTRU Lattice.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Oblivious Transfer Protocols Based on Commutative Encryption.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

2016
Implementation and analysis of Hybrid Wireless Indoor Positioning with iBeacon and Wi-Fi.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016


  Loading...