Jue-Sam Chou

Orcid: 0000-0002-1503-9739

According to our database1, Jue-Sam Chou authored at least 60 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Revisiting the "improving the security of multi-party quantum key agreement with five- qubit Brown states".
IACR Cryptol. ePrint Arch., 2024

2019
Improved on Identity-based quantum signature based on Bell states.
IACR Cryptol. ePrint Arch., 2019

A Diffie-Hellman quantum session key establishment protocol without entanglement.
IACR Cryptol. ePrint Arch., 2019

A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography.
IACR Cryptol. ePrint Arch., 2019

A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography.
IACR Cryptol. ePrint Arch., 2019

2016
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment.
IACR Cryptol. ePrint Arch., 2016

Improved on an improved remote user authentication scheme with key agreement.
IACR Cryptol. ePrint Arch., 2016

2015
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking".
Int. J. Netw. Secur., 2015

ECC-based untraceable authentication for large-scale active-tag RFID systems.
Electron. Commer. Res., 2015

2014
An efficient mutual authentication RFID scheme based on elliptic curve cryptography.
J. Supercomput., 2014

Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage".
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis on "Secure untraceable off-line electronic cash system".
IACR Cryptol. ePrint Arch., 2014

Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking".
IACR Cryptol. ePrint Arch., 2014

Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks.
IACR Cryptol. ePrint Arch., 2014

A constant-time identifying large-scale RFID tags using lines on a plane.
Trans. Emerg. Telecommun. Technol., 2014

2013
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card.
IACR Cryptol. ePrint Arch., 2013

Comments on Three Multi-Server Authentication Protocols.
IACR Cryptol. ePrint Arch., 2013

ECC-Based Non-Interactive Deniable Authentication with Designated Verifier.
IACR Cryptol. ePrint Arch., 2013

2012
Improved multi-server authentication protocol.
Secur. Commun. Networks, 2012

Comments on four multi-server authentication protocols using smart card.
IACR Cryptol. ePrint Arch., 2012

A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electron. Commer. Res. Appl., 2012

A Novel Anonymous Proxy Signature Scheme.
Adv. Multim., 2012

A Novel <i>k</i>-out-of-<i>n</i> Oblivious Transfer Protocol from Bilinear Pairing.
Adv. Multim., 2012

2011
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2011

An Efficient Secure Anonymous Proxy Signature Scheme.
IACR Cryptol. ePrint Arch., 2011

An efficient RFID mutual authentication scheme based on ECC.
IACR Cryptol. ePrint Arch., 2011

Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach.
IACR Cryptol. ePrint Arch., 2011

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem.
IACR Cryptol. ePrint Arch., 2011

A novel electronic cash system with trustee-based anonymity revocation from pairing.
Electron. Commer. Res. Appl., 2011

2010
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis and Improvement of A New Electronic Traveler's Check Scheme Based on One-way Hash Function.
IACR Cryptol. ePrint Arch., 2010

A secure anonymous communication scheme in vehicular ad hoc networks from pairings.
IACR Cryptol. ePrint Arch., 2010

A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem.
IACR Cryptol. ePrint Arch., 2010

Comment on four two-party authentication protocols.
IACR Cryptol. ePrint Arch., 2010

Comments on five smart card based password authentication protocols.
IACR Cryptol. ePrint Arch., 2010

A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2010

Cryptanalysis on Four Two-Party Authentication Protocols
CoRR, 2010

2009
An Efficient Secure Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2009

A provably secure really source hiding designated verifier signature scheme based on random oracle model.
IACR Cryptol. ePrint Arch., 2009

Security weaknesses in two multi-server password based authentication protocols.
IACR Cryptol. ePrint Arch., 2009

A Novel ID-based Electronic Cash System from Pairings.
IACR Cryptol. ePrint Arch., 2009

A novel multi-server authentication protocol.
IACR Cryptol. ePrint Arch., 2009

Improvements on two password-based authentication protocols.
IACR Cryptol. ePrint Arch., 2009

2008
Comments on two password based protocols.
IACR Cryptol. ePrint Arch., 2008

Comments on two multi-server authentication protocols.
IACR Cryptol. ePrint Arch., 2008

An efficient session key generation for NTDR networks based on bilinear paring.
Comput. Commun., 2008

A novel mutual authentication scheme based on quadratic residues for RFID systems.
Comput. Networks, 2008

2007
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems.
IACR Cryptol. ePrint Arch., 2007

A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking.
IACR Cryptol. ePrint Arch., 2007

2006
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2006

A ID-Based Deniable Authentication Protocol on pairings.
IACR Cryptol. ePrint Arch., 2006

An improvement of an efficient user identification scheme based on ID-based cryptosystem.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
Cryptanalysis of the Yang -Wang's password authentication schemes.
IACR Cryptol. ePrint Arch., 2005

Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol.
IACR Cryptol. ePrint Arch., 2005

Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols.
IACR Cryptol. ePrint Arch., 2005

Improvement of Manik et al.¡¦s remote user authentication scheme.
IACR Cryptol. ePrint Arch., 2005

2004
A Novel Hierarchical Key Management Scheme Based on Quadratic Residues.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

2002
A fast algorithm for reliability-oriented task assignment in a distributed system.
Comput. Commun., 2002

Mental poker game based on a bit commitment scheme through network.
Comput. Networks, 2002


  Loading...