Jinn-ke Jan
Affiliations:- National Chung Hsing University, Taichung, Taiwan
According to our database1,
Jinn-ke Jan
authored at least 88 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact.
Symmetry, 2024
2019
Signal Process. Image Commun., 2019
Int. Arab J. Inf. Technol., 2019
2018
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy.
J. Netw. Intell., 2018
2016
Proceedings of the 12th International Conference on Natural Computation, 2016
2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
J. Syst. Softw., 2014
2013
Towards secure and efficient user authentication scheme using smart card for multi-server environments.
J. Supercomput., 2013
J. Medical Syst., 2013
Int. J. Comput. Math., 2013
2012
J. Medical Syst., 2012
KSII Trans. Internet Inf. Syst., 2012
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
2011
A tagged-product ownership transfer mechanism used in retailer and second-hand transaction.
Int. J. Radio Freq. Identif. Technol. Appl., 2011
A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping
CoRR, 2011
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response.
Comput. Commun., 2011
Proceedings of the Second International Conference on Innovations in Bio-inspired Computing and Applications, 2011
Proceedings of EUROCON 2011, 2011
A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping.
Proceedings of the 2011 International Conference on Broadband, 2011
2010
J. Syst. Softw., 2010
Proceedings of the CISIS 2010, 2010
Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Int. J. Netw. Manag., 2009
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns.
Fundam. Informaticae, 2009
EURASIP J. Wirel. Commun. Netw., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2007
J. High Speed Networks, 2007
Electron. Commer. Res. Appl., 2007
Appl. Math. Comput., 2007
Proceedings of the Network-Based Information Systems, First International Conference, 2007
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
Enhancement of digital signature with message recovery using self-certified public keys and its variants.
ACM SIGOPS Oper. Syst. Rev., 2005
Comput. Stand. Interfaces, 2005
2004
IEEE Trans. Consumer Electron., 2004
Solving the invalid signer-verified signature problem and comments on Xia-You group signature.
J. Syst. Softw., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Improved authenticated multiple-key agreement protocol without using conventional one-way function.
Appl. Math. Comput., 2004
An Efficient Group Signature Based on the Discrete Logarithm Problem.
Proceedings of the iiWAS'2004, 2004
A Secure Scheme for Restrictive Partially Blind Signatures.
Proceedings of the iiWAS'2004, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003
IEEE Trans. Consumer Electron., 2003
Comput. Electr. Eng., 2003
Digital signature with message recovery using self-certified public keys and its variants.
Appl. Math. Comput., 2003
2002
Forgery attacks on "Multisignature schemes for authenticating mobile code delegates".
IEEE Trans. Veh. Technol., 2002
An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs.
J. Inf. Sci. Eng., 2002
A secure anonymous voting protocol with a complete supervision.
Comput. Syst. Sci. Eng., 2002
Comput. Secur., 2002
2001
J. Syst. Softw., 2001
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols.
Inf. Process. Lett., 2001
Generalized group-oriented cryptosystem with authenticated sender.
Comput. Syst. Sci. Eng., 2001
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001
1999
Inf. Process. Lett., 1999
Anonymous conference key distribution systems based on the discrete logarithm problem.
Comput. Commun., 1999
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
J. Syst. Softw., 1998
Inf. Sci., 1998
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
Cryptologia, 1997
1996
1995
1994
Comput. Secur., 1994
1993
BIT, 1993
1991
1990
Inf. Sci., 1990