Yi-Shiung Yeh

According to our database1, Yi-Shiung Yeh authored at least 36 papers between 1982 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms.
J. Inf. Sci. Eng., 2013

2011
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation.
J. Inf. Sci. Eng., 2011

Generalized secure hash algorithm: SHA-X.
Proceedings of EUROCON 2011, 2011

2010
Efficient proxy signcryption scheme with provable CCA and CMA security.
Comput. Math. Appl., 2010

2009
Structural Binary CBC Encryption Mode.
J. Inf. Sci. Eng., 2009

A Study on Parallel RSA Factorization.
J. Comput., 2009

2008
Self-Certified Proxy Convertible Authenticated Encryption Scheme.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

Untraceable Identity Management Framework for Mobile Access.
Proceedings of the Eighth International Conference on Intelligent Systems Design and Applications, 2008

2006
A genetic algorithm for reliability-oriented task assignment with k~ duplications in distributed systems.
IEEE Trans. Reliab., 2006

Security analysis of transformed-key asymmetric watermarking system.
IEEE Signal Process. Lett., 2006

Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes.
J. Syst. Softw., 2006

Design of Proxy Signature in the Digital Signature Algorithm (DSA).
J. Inf. Sci. Eng., 2006

Forgery attack on the RPC incremental unforgeable encryption scheme.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Comment on traceability on RSA-based partially signature with low computation.
Appl. Math. Comput., 2005

Improving Lamport one-time signature scheme.
Appl. Math. Comput., 2005

An Efficient Decryption Method for RSA Cryptosystem.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2002
An Extended DES.
J. Inf. Sci. Eng., 2002

A fast algorithm for reliability-oriented task assignment in a distributed system.
Comput. Commun., 2002

Applying lightweight directory access protocol service on session certification authority.
Comput. Networks, 2002

Mental poker game based on a bit commitment scheme through network.
Comput. Networks, 2002

2001
Model calculations to estimate the probability of secret reconstruction in computer environments.
Inf. Manag. Comput. Secur., 2001

A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems.
Comput. Commun., 2001

2000
Dynamic GOST.
J. Inf. Sci. Eng., 2000

Randomization enhanced Chaum's blind signature scheme.
Comput. Commun., 2000

Date attachable electronic cash.
Comput. Commun., 2000

Reduction of the total execution time to achieve the optimal <i>k</i>-node reliability of distributed computing systems using a novel heuristic algorithm.
Comput. Commun., 2000

A Randomization Enhanced Scheme for Chaum's Blind Signature.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000

1999
A Probability Model for Reconstructing Secret Sharing under the Internet Environment.
Inf. Sci., 1999

One-Way Hash Functions With Changeable Parameters.
Inf. Sci., 1999

Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash.
Proceedings of the 1st International Conference on Enterprise Information Systems, 1999

1998
A Homophonic DES.
Inf. Process. Lett., 1998

A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

A Genetic Algorithm for the Reliability Optimization of a Distributed System.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998

1993
Algebraic operations on encryped relational databases.
Inf. Syst., 1993

1986
Multilevel Cryptosecure Relational Database.
EUROCRYPT, 1986

1982
Cryptographic Relational Algebra.
Proceedings of the 1982 IEEE Symposium on Security and Privacy, 1982


  Loading...