Sen-Shan Huang
According to our database1,
Sen-Shan Huang
authored at least 44 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
AHMRE-SCST: Lightweight Anonymous Heterogeneous Multirecipient Encryption With Seamlessly Compatible System Transformation for IoT Devices.
IEEE Internet Things J., September, 2024
Informatica, 2024
Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings.
IEEE Access, 2024
2023
Leakage-Resilient Anonymous Multireceiver Certificateless Encryption Resistant to Side-Channel Attacks.
IEEE Syst. J., June, 2023
Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications.
Informatica, 2023
Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model.
IEEE Access, 2023
Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme.
IEEE Access, 2023
2022
IEEE Open J. Comput. Soc., 2022
Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority.
Informatica, 2022
Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model.
IEEE Access, 2022
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
Equality Test of Ciphertexts in Certificateless Public Key Systems with an Outsourced Revocation Authority.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
2021
An Efficient Leakage-Resilient Authenticated Key Exchange Protocol Suitable for IoT Devices.
IEEE Syst. J., 2021
A Lightweight Leakage-Resilient Identity-Based Mutual Authentication and Key Exchange Protocol for Resource-limited Devices.
Comput. Networks, 2021
A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism.
IEEE Access, 2021
2020
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage.
IEEE Open J. Comput. Soc., 2020
Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server.
Inf. Technol. Control., 2020
Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority.
Informatica, 2020
A Leakage-Resilient Certificateless Authenticated Key Exchange Protocol Withstanding Side-Channel Attacks.
IEEE Access, 2020
2019
An Identity-Based Authenticated Key Exchange Protocol Resilient to Continuous Key Leakage.
IEEE Syst. J., 2019
Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices.
Informatica, 2019
IEEE Access, 2019
2018
IEEE Trans. Cloud Comput., 2018
Inf. Technol. Control., 2018
Efficient Leakage-Resilient Authenticated Key Agreement Protocol in the Continual Leakage eCK Model.
IEEE Access, 2018
2017
Secur. Commun. Networks, 2017
Informatica, 2017
Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments.
Int. J. Commun. Syst., 2017
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems.
IEEE Access, 2017
2016
List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures.
IEEE Trans. Emerg. Top. Comput., 2016
Secur. Commun. Networks, 2016
Inf. Technol. Control., 2016
A Revocable Certificateless Short Signature Scheme and Its Authentication Application.
Informatica, 2016
Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016
2015
Efficient revocable certificateless public key encryption with a delegated revocation authority.
Secur. Commun. Networks, 2015
Informatica, 2015
A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices.
Int. J. Distributed Sens. Networks, 2015
2014
Inf. Technol. Control., 2014
Informatica, 2014