Ya-Fen Chang

According to our database1, Ya-Fen Chang authored at least 72 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Feasible Solution for eHealth with an A nonymous Patient Monitoring System and a Privacy Ensured Telecare Medical Information System.
J. Inf. Sci. Eng., November, 2024

2022
Separable Reversible Watermarking in Encrypted Images for Privacy Preservation.
Symmetry, 2022

Offline User Authentication Ensuring Non-Repudiation and Anonymity.
Sensors, 2022

2021
A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments.
Symmetry, 2021

Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021

2020
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing.
Int. J. Netw. Secur., 2020

2019
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.
Int. J. Netw. Secur., 2019

2018
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography.
Symmetry, 2018

A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy.
J. Netw. Intell., 2018

2017
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity.
Symmetry, 2017

An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.
J. Inf. Secur. Appl., 2017

Comments on a Secure Authentication Scheme for IoT and Cloud Servers.
Int. J. Netw. Secur., 2017

2016
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems.
J. Inf. Hiding Multim. Signal Process., 2016

A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks.
J. Inf. Hiding Multim. Signal Process., 2016

2015
A flexible hierarchical access control mechanism enforcing extension policies.
Secur. Commun. Networks, 2015

A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.
J. Inf. Hiding Multim. Signal Process., 2015

Flexible Access Control over Verifiable Cloud Computing Services with Provable Security.
Informatica, 2015

An intelligent context-aware communication system for one single autonomic region to realize smart living.
Inf. Fusion, 2015

2014
A high capacity data hiding scheme for binary images based on block patterns.
J. Syst. Softw., 2014

Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2014

Developing a Smart Shopping Automation System: Ambient Intelligence in Practice.
Ad Hoc Sens. Wirel. Networks, 2014

Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

2013
A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013

A Robust and Novel Dynamic-ID-based Authentication Scheme for Care Team Collaboration with Smart Cards.
J. Medical Syst., 2013

An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment.
Inf. Technol. Control., 2013

Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices.
Informatica, 2013

A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

A user authentication scheme on multi-server environments for cloud computing.
Proceedings of the 9th International Conference on Information, 2013

A random increasing sequence hash chain and smart card-based remote user authentication scheme.
Proceedings of the 9th International Conference on Information, 2013

2012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.
KSII Trans. Internet Inf. Syst., 2012

A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches.
Inf. Technol. Control., 2012

A critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electron. Commer. Res. Appl., 2012

A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012

A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme.
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011

A Location-Privacy-Protected RFID Authentication Scheme.
Proceedings of IEEE International Conference on Communications, 2011

2010
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

2009
Performance Evaluation of Mobility Management in Cellular IP.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Security of Dynamic ID-Based Remote User Authentication Scheme.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Security of Indirect-Authenticated Key Exchange Protocol.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Further Remarks on Identity-Based RSA Multi-signature.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Visual secret sharing for multiple secrets.
Pattern Recognit., 2008

Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme.
Int. J. Netw. Secur., 2008

The Essential Design Principles of Verifiable Non-interactive OT Protocols.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2007
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys.
Informatica, 2007

An RSA-based (t, n) threshold proxy signature scheme with freewill identities.
Int. J. Inf. Comput. Secur., 2007

Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Informaticae, 2007

Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

2006
A secure and efficient authentication scheme for mobile users.
Int. J. Mob. Commun., 2006

Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006

A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Enhanced Anonymous Auction Protocols with Freewheeling Bids.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
An efficient authentication protocol for mobile satellite communication systems.
ACM SIGOPS Oper. Syst. Rev., 2005

Schemes for Digital Gift Certificates with Low Computation Complexity.
Informatica, 2005

An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Comput. Stand. Interfaces, 2005

Efficient authentication protocols of GSM.
Comput. Commun., 2005

Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Appl. Math. Comput., 2005

Authentication schemes with no verification table.
Appl. Math. Comput., 2005

An Improvement on Strong-Password Authentication Protocols.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

Password-authenticated 3PEKE with Round Efficiency without Server's Public Key.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005

2004
A secure one-time password authentication scheme using smart cards without limiting login times.
ACM SIGOPS Oper. Syst. Rev., 2004

An improvement on a deniable authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2004

A secure and efficient strong-password authentication protocol.
ACM SIGOPS Oper. Syst. Rev., 2004

Signing a digital signature without using one-way hash functions and message redundancy schemes.
IEEE Commun. Lett., 2004

A novel three-party encrypted key exchange protocol.
Comput. Stand. Interfaces, 2004

The Security Flaw of an Untraceable Signature Scheme.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Yet Another Attack on a QR-based Password Authentication System.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

2003
Efficient anonymous auction protocols with freewheeling bids.
Comput. Secur., 2003


  Loading...