Jue-Sam Chou
Orcid: 0000-0002-1503-9739
According to our database1,
Jue-Sam Chou
authored at least 60 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Revisiting the "improving the security of multi-party quantum key agreement with five- qubit Brown states".
IACR Cryptol. ePrint Arch., 2024
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography.
IACR Cryptol. ePrint Arch., 2019
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography.
IACR Cryptol. ePrint Arch., 2019
2016
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking".
Int. J. Netw. Secur., 2015
Electron. Commer. Res., 2015
2014
J. Supercomput., 2014
Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage".
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking".
IACR Cryptol. ePrint Arch., 2014
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks.
IACR Cryptol. ePrint Arch., 2014
Trans. Emerg. Telecommun. Technol., 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electron. Commer. Res. Appl., 2012
Adv. Multim., 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Electron. Commer. Res. Appl., 2011
2010
IACR Cryptol. ePrint Arch., 2010
Cryptanalysis and Improvement of A New Electronic Traveler's Check Scheme Based on One-way Hash Function.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
2009
A provably secure really source hiding designated verifier signature scheme based on random oracle model.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2008
IACR Cryptol. ePrint Arch., 2008
Comput. Commun., 2008
Comput. Networks, 2008
2007
IACR Cryptol. ePrint Arch., 2007
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
An improvement of an efficient user identification scheme based on ID-based cryptosystem.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
2004
Proceedings of the Parallel and Distributed Processing and Applications, 2004
2002
Comput. Commun., 2002
Comput. Networks, 2002