Jen-Ho Yang
Orcid: 0000-0001-7668-497X
According to our database1,
Jen-Ho Yang
authored at least 29 papers
between 2004 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT.
EURASIP J. Inf. Secur., December, 2023
2017
Wirel. Pers. Commun., 2017
Informatica, 2017
Proceedings of the 5th International Workshop on Biometrics and Forensics, 2017
2016
2015
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks.
Int. J. Netw. Secur., 2015
2014
A source authentication scheme based on message recovery digital signature for multicast.
Int. J. Commun. Syst., 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment.
Secur. Commun. Networks, 2013
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment.
Inf. Technol. Control., 2013
An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices.
Informatica (Slovenia), 2013
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies.
Int. J. Netw. Secur., 2013
Proceedings of the 9th International Conference on Information, 2013
2012
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users.
Wirel. Pers. Commun., 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
2010
Expert Syst. Appl., 2010
2009
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments.
J. Syst. Softw., 2009
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem.
Comput. Secur., 2009
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation.
IET Comput. Digit. Tech., 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2006
A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
2005
An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Comput. Stand. Interfaces, 2005
2004
Int. J. Comput. Math., 2004