Narn-Yih Lee
According to our database1,
Narn-Yih Lee
authored at least 40 papers
between 1993 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IEEE Access, 2023
2017
Proceedings of the 6th IIAI International Congress on Advanced Applied Informatics, 2017
2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
2011
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011
2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
2008
Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings.
Comput. Electr. Eng., 2008
2007
Security Flaw in Simple Generalized Group-Oriented Cryptosystem Using ElGamal Cryptosystem.
Informatica, 2007
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007
2005
IEICE Trans. Commun., 2005
Comput. Stand. Interfaces, 2005
Appl. Math. Comput., 2005
The security of a strong proxy signature scheme with proxy signer privacy protection.
Appl. Math. Comput., 2005
2004
ACM SIGOPS Oper. Syst. Rev., 2004
Appl. Math. Comput., 2004
2003
IEEE Trans. Consumer Electron., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
The Security of the Improvement on the Generalization of Threshold Signature and Authenticated Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2001
J. Inf. Sci. Eng., 2001
2000
(T, N) Threshold-Multisignature Scheme and Generalized-Multisignature Scheme Where suspected Forgery Implies Traceability of Adversarial Shareholders.
Cryptologia, 2000
1999
The Security of Two ID-Based Multisignature Protocols for Sequential and Broadcasting Architectures.
Inf. Process. Lett., 1999
Comput. Commun., 1999
Comput. Commun., 1999
Comments on "Dynamic Key Management Schemes for Access control in a Hierarchy".
Comput. Commun., 1999
Proceedings of the Information Security, Second International Workshop, 1999
Proceedings of the Information Security, Second International Workshop, 1999
1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1996
On the security of Park et al.'s key distribution protocol for digital mobile communications.
Proceedings of the 7th IEEE International Symposium on Personal, 1996
1995
Inf. Process. Lett., 1995
Comput. Commun., 1995
1994
J. Inf. Sci. Eng., 1994
Threshold-Multisignature Schemes where Suspected Forgery Implies Traceability of Adversarial Shareholders.
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Advances in Cryptology, 1993