Name
Affiliation
Papers
YA-FEN CHANG
Department of Computer Science and Information Engineering, Chung Cheng University, 160 San-Hsing, Min-Hsiung, Chiayi 621 Taiwan, R.O.C.
51
Collaborators
Citations 
PageRank 
50
509
27.66
Referers 
Referees 
References 
865
691
442
Search Limit
100865
Title
Citations
PageRank
Year
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.00.342019
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography.20.372018
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.60.452017
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity.20.382017
An intelligent context-aware communication system for one single autonomic region to realize smart living10.362015
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.00.342015
Developing a Smart Shopping Automation System: Ambient Intelligence in Practice.10.362014
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards00.342014
Untraceable Dynamic-Identity-Based Remote User Authentication Scheme With Verifiable Password Update140.602014
A high capacity data hiding scheme for binary images based on block patterns.70.472014
A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.880.722013
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices20.422013
An Efficient Authenticated Encryption Scheme Based On Ecc And Its Application For Electronic Payment70.462013
A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.1291.492013
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN00.342013
A critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).00.342012
Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards10.372012
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating20.362012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.10.352012
A Verifiable Proxy Signature Scheme Based On Bilinear Pairings With Identity-Based Cryptographic Approaches00.342012
A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation20.382012
Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme10.352011
A Location-Privacy-Protected RFID Authentication Scheme20.402011
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks311.042010
Further Remarks on Identity-Based RSA Multi-signature20.372009
Performance Evaluation of Mobility Management in Cellular IP00.342009
Security of Dynamic ID-Based Remote User Authentication Scheme30.422009
Security of Indirect-Authenticated Key Exchange Protocol10.362009
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme20.412008
Visual secret sharing for multiple secrets611.952008
The Essential Design Principles of Verifiable Non-interactive OT Protocols10.352008
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys10.352007
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy10.372007
Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem20.382007
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys00.342006
A secure and efficient authentication scheme for mobile users50.532006
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mechanism80.802006
An improvement on strong-password authentication protocols00.342005
An efficient authentication protocol for mobile satellite communication systems170.972005
An extendable-message-passing protocol with signatures based on two hard problems and its applications00.342005
Password-authenticated 3PEKE with round efficiency without server's public key20.372005
Digital signature with message recovery using self-certified public keys without trustworthy system authority160.932005
Schemes for Digital Gift Certificates with Low Computation Complexity00.342005
Authentication schemes with no verification table20.412005
An efficient password authenticated key exchange protocol for imbalanced wireless networks20.432005
Efficient authentication protocols of GSM271.522005
A novel three-party encrypted key exchange protocol502.082004
The Security Flaw of an Untraceable Signature Scheme00.342004
A secure and efficient strong-password authentication protocol40.452004
Yet another attack on a QR-based password authentication system00.342004
  • 1
  • 2