Tsu-Yang Wu
Tsu-Yang Wu
College of Computer Science and Engineering, Shandong University of Science and Technology
Dirección de correo verificada de sdust.edu.cn
Título
Citado por
Citado por
Año
An efficient user authentication and key exchange protocol for mobile client–server environment
TY Wu, YM Tseng
Computer Networks 54 (9), 1520-1530, 2010
1012010
A pairing-based user authentication scheme for wireless clients with smart cards
YM Tseng, TY Wu, JD Wu
Informatica 19 (2), 285-302, 2008
892008
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
772019
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
762019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
722018
An ID-based mutual authentication and key exchange protocol for low-power mobile devices
TY Wu, YM Tseng
The Computer Journal 53 (7), 1062-1070, 2010
642010
Efficient searchable ID-based encryption with a designated server
TY Wu, TT Tsai, YM Tseng
annals of telecommunications-annales des télécommunications 69 (7-8), 391-402, 2014
532014
An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
522017
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
CM Chen, L Xu, TY Wu, CR Li
J. Netw. Intell. 1 (2), 61-66, 2016
512016
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
TY Wu, YM Tseng, TT Tsai
Computer Networks 56 (12), 2994-3006, 2012
482012
A provable authenticated group key agreement protocol for mobile environment
HM Sun, BZ He, CM Chen, TY Wu, CH Lin, H Wang
Information Sciences 321, 224-237, 2015
412015
A secure authentication scheme for Internet of Things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
392017
A scalable transitive human-verifiable authentication protocol for mobile devices
CM Chen, KH Wang, TY Wu, JS Pan, HM Sun
IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013
382013
A pairing-based publicly verifiable secret sharing scheme
TY Wu, YM Tseng
Journal of systems science and complexity 24 (1), 186-194, 2011
352011
Provably secure revocable ID‐based signature in the standard model
TT Tsai, YM Tseng, TY Wu
Security and Communication Networks 6 (10), 1250-1260, 2013
282013
A revocable ID-based signcryption scheme
TY Wu, TT Tsai, YM Tseng
Journal of Information Hiding and Multimedia Signal Processing 3 (3), 240-251, 2012
282012
An efficient and provably secure ID-based signature scheme with batch verifications
YM Tseng, TY Wu, J Di Wu
International Journal of Innovative Computing, Information and Control 5 (11 …, 2009
282009
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
JCW Lin, TY Wu, P Fournier-Viger, G Lin, J Zhan, M Voznak
Engineering Applications of Artificial Intelligence 55, 269-284, 2016
272016
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
CM Chen, W Fang, KH Wang, TY Wu
Nonlinear Dynamics 87 (3), 2073-2075, 2017
262017
Publicly verifiable multi-secret sharing scheme from bilinear pairings
TY Wu, YM Tseng
IET Information Security 7 (3), 239-246, 2013
242013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20