Tung-Tso Tsai
Orcid: 0000-0002-7833-7688
According to our database1,
Tung-Tso Tsai
authored at least 46 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
AHMRE-SCST: Lightweight Anonymous Heterogeneous Multirecipient Encryption With Seamlessly Compatible System Transformation for IoT Devices.
IEEE Internet Things J., September, 2024
Leakage-Resilient Anonymous Heterogeneous Multi-Receiver Hybrid Encryption in Heterogeneous Public-Key System Settings.
IEEE Access, 2024
IEEE Access, 2024
Proceedings of the 8th International Conference on Machine Learning and Soft Computing, 2024
2023
Inf. Technol. Control., December, 2023
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.
Sensors, March, 2023
Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications.
Informatica, 2023
Leakage-Resilient Certificateless Signcryption Scheme Under a Continual Leakage Model.
IEEE Access, 2023
Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme.
IEEE Access, 2023
CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments.
Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, 2023
2022
Sensors, 2022
IEEE Open J. Comput. Soc., 2022
An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network.
J. Sensors, 2022
Inf. Technol. Control., 2022
Leakage-Resilient Revocable Certificateless Encryption with an Outsourced Revocation Authority.
Informatica, 2022
Leakage-Resilient Anonymous Multi-Recipient Signcryption Under a Continual Leakage Model.
IEEE Access, 2022
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
Equality Test of Ciphertexts in Certificateless Public Key Systems with an Outsourced Revocation Authority.
Proceedings of the 11th IEEE Global Conference on Consumer Electronics, 2022
2021
A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism.
IEEE Access, 2021
2020
Leakage-Resilient Certificate-based Key Encapsulation Scheme Resistant to Continual Leakage.
IEEE Open J. Comput. Soc., 2020
Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server.
Inf. Technol. Control., 2020
Leakage-Resilient Revocable Identity-Based Signature with Cloud Revocation Authority.
Informatica, 2020
2019
Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices.
Informatica, 2019
IEEE Access, 2019
2018
IEEE Trans. Cloud Comput., 2018
2017
Informatica, 2017
2016
List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures.
IEEE Trans. Emerg. Top. Comput., 2016
Cryptanalysis and Improvement of a Provable Data Possession Scheme in Public Cloud Storage.
Proceedings of the Third International Conference on Computing Measurement Control and Sensor Network, 2016
2015
Efficient revocable certificateless public key encryption with a delegated revocation authority.
Secur. Commun. Networks, 2015
Informatica, 2015
A Novel ID-Based Authentication and Key Exchange Protocol Resistant to Ephemeral-Secret-Leakage Attacks for Mobile Devices.
Int. J. Distributed Sens. Networks, 2015
2014
Inf. Technol. Control., 2014
Informatica, 2014
Informatica, 2014
Ann. des Télécommunications, 2014
2013
Secur. Commun. Networks, 2013
2012
J. Inf. Hiding Multim. Signal Process., 2012
Informatica, 2012
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants.
Comput. Networks, 2012
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2012