Jen-Ho Yang

Orcid: 0000-0001-7668-497X

According to our database1, Jen-Ho Yang authored at least 29 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT.
EURASIP J. Inf. Secur., December, 2023

2017
An Electronic Transaction Mechanism Using Mobile Devices for Cloud Computing.
Wirel. Pers. Commun., 2017

Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery.
Informatica, 2017

An offline user-verifiable electronic traveler's check system.
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017

2016
A mobile payment mechanism with anonymity for cloud computing.
J. Syst. Softw., 2016

2015
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
Int. J. Netw. Secur., 2015

2014
A source authentication scheme based on message recovery digital signature for multicast.
Int. J. Commun. Syst., 2014

An ID-Based User Authentication Scheme for Cloud Computing.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Secur. Commun. Networks, 2013

An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment.
Inf. Technol. Control., 2013

An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices.
Informatica (Slovenia), 2013

A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.
Int. J. Netw. Secur., 2013

A user authentication scheme on multi-server environments for cloud computing.
Proceedings of the 9th International Conference on Information, 2013

2012
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users.
Wirel. Pers. Commun., 2012

An Efficient and Flexible Mobile Payment Protocol.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

2011
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

2010
An efficient and reliable E-DRM scheme for mobile environments.
Expert Syst. Appl., 2010

2009
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
J. Syst. Softw., 2009

An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Comput. Secur., 2009

Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation.
IET Comput. Digit. Tech., 2008

Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2006
A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

2005
An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Comput. Stand. Interfaces, 2005

An iterative modular multiplication algorithm in RNS.
Appl. Math. Comput., 2005

2004
A high-speed division algorithm in residue number system using parity.
Int. J. Comput. Math., 2004


  Loading...