Ya-Fen Chang
According to our database1,
Ya-Fen Chang
authored at least 72 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A Feasible Solution for eHealth with an A nonymous Patient Monitoring System and a Privacy Ensured Telecare Medical Information System.
J. Inf. Sci. Eng., November, 2024
2022
Symmetry, 2022
2021
A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments.
Symmetry, 2021
Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks.
Proceedings of the 22nd IEEE/ACIS International Conference on Software Engineering, 2021
2020
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing.
Int. J. Netw. Secur., 2020
2019
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.
Int. J. Netw. Secur., 2019
2018
Symmetry, 2018
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy.
J. Netw. Intell., 2018
2017
Symmetry, 2017
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.
J. Inf. Secur. Appl., 2017
Int. J. Netw. Secur., 2017
2016
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems.
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
2015
Secur. Commun. Networks, 2015
J. Inf. Hiding Multim. Signal Process., 2015
Flexible Access Control over Verifiable Cloud Computing Services with Provable Security.
Informatica, 2015
An intelligent context-aware communication system for one single autonomic region to realize smart living.
Inf. Fusion, 2015
2014
J. Syst. Softw., 2014
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update.
Int. J. Commun. Syst., 2014
Ad Hoc Sens. Wirel. Networks, 2014
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2013
A Robust and Novel Dynamic-ID-based Authentication Scheme for Care Team Collaboration with Smart Cards.
J. Medical Syst., 2013
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment.
Inf. Technol. Control., 2013
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices.
Informatica, 2013
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013
Proceedings of the 9th International Conference on Information, 2013
A random increasing sequence hash chain and smart card-based remote user authentication scheme.
Proceedings of the 9th International Conference on Information, 2013
2012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.
KSII Trans. Internet Inf. Syst., 2012
A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches.
Inf. Technol. Control., 2012
A critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
Electron. Commer. Res. Appl., 2012
A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards.
Proceedings of the 2012 Sixth International Conference on Genetic and Evolutionary Computing, 2012
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010
2009
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications.
Proceedings of the The Forth International Conference on Availability, 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008
2007
Informatica, 2007
Int. J. Inf. Comput. Secur., 2007
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy.
Fundam. Informaticae, 2007
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007
2006
Int. J. Mob. Commun., 2006
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006
Comments on Distributed Sign-and-Encryption Schemes.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, 2006
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
ACM SIGOPS Oper. Syst. Rev., 2005
Informatica, 2005
An efficient password authenticated key exchange protocol for imbalanced wireless networks.
Comput. Stand. Interfaces, 2005
Digital signature with message recovery using self-certified public keys without trustworthy system authority.
Appl. Math. Comput., 2005
Proceedings of the Embedded Software and Systems, Second International Conference, 2005
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications.
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
Proceedings of the 4th International Conference on Cyberworlds (CW 2005), 2005
2004
A secure one-time password authentication scheme using smart cards without limiting login times.
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
ACM SIGOPS Oper. Syst. Rev., 2004
Signing a digital signature without using one-way hash functions and message redundancy schemes.
IEEE Commun. Lett., 2004
The Security Flaw of an Untraceable Signature Scheme.
Proceedings of the Fourth International Conference on Electronic Business, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
2003