Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Claudia Calabrese
Scott J. Pedersen
Hao Mao
Peter Malec
bruce rowlands
Giovanni Venturelli
Chen Ma
Ssu-yun Lai
Radu Timofte
Kuanrui Yin
Home
/
Author
/
YA-FEN CHANG
Author Info
Open Visualization
Name
Affiliation
Papers
YA-FEN CHANG
Department of Computer Science and Information Engineering, Chung Cheng University, 160 San-Hsing, Min-Hsiung, Chiayi 621 Taiwan, R.O.C.
51
Collaborators
Citations
PageRank
50
509
27.66
Referers
Referees
References
865
691
442
Search Limit
100
865
Publications (51 rows)
Collaborators (50 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments.
0
0.34
2019
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography.
2
0.37
2018
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks.
6
0.45
2017
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity.
2
0.38
2017
An intelligent context-aware communication system for one single autonomic region to realize smart living
1
0.36
2015
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.
0
0.34
2015
Developing a Smart Shopping Automation System: Ambient Intelligence in Practice.
1
0.36
2014
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards
0
0.34
2014
Untraceable Dynamic-Identity-Based Remote User Authentication Scheme With Verifiable Password Update
14
0.60
2014
A high capacity data hiding scheme for binary images based on block patterns.
7
0.47
2014
A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.
88
0.72
2013
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices
2
0.42
2013
An Efficient Authenticated Encryption Scheme Based On Ecc And Its Application For Electronic Payment
7
0.46
2013
A uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care.
129
1.49
2013
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN
0
0.34
2013
A critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011).
0
0.34
2012
Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards
1
0.37
2012
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating
2
0.36
2012
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting.
1
0.35
2012
A Verifiable Proxy Signature Scheme Based On Bilinear Pairings With Identity-Based Cryptographic Approaches
0
0.34
2012
A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation
2
0.38
2012
Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme
1
0.35
2011
A Location-Privacy-Protected RFID Authentication Scheme
2
0.40
2011
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks
31
1.04
2010
Further Remarks on Identity-Based RSA Multi-signature
2
0.37
2009
Performance Evaluation of Mobility Management in Cellular IP
0
0.34
2009
Security of Dynamic ID-Based Remote User Authentication Scheme
3
0.42
2009
Security of Indirect-Authenticated Key Exchange Protocol
1
0.36
2009
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme
2
0.41
2008
Visual secret sharing for multiple secrets
61
1.95
2008
The Essential Design Principles of Verifiable Non-interactive OT Protocols
1
0.35
2008
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys
1
0.35
2007
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
1
0.37
2007
Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem
2
0.38
2007
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys
0
0.34
2006
A secure and efficient authentication scheme for mobile users
5
0.53
2006
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mechanism
8
0.80
2006
An improvement on strong-password authentication protocols
0
0.34
2005
An efficient authentication protocol for mobile satellite communication systems
17
0.97
2005
An extendable-message-passing protocol with signatures based on two hard problems and its applications
0
0.34
2005
Password-authenticated 3PEKE with round efficiency without server's public key
2
0.37
2005
Digital signature with message recovery using self-certified public keys without trustworthy system authority
16
0.93
2005
Schemes for Digital Gift Certificates with Low Computation Complexity
0
0.34
2005
Authentication schemes with no verification table
2
0.41
2005
An efficient password authenticated key exchange protocol for imbalanced wireless networks
2
0.43
2005
Efficient authentication protocols of GSM
27
1.52
2005
A novel three-party encrypted key exchange protocol
50
2.08
2004
The Security Flaw of an Untraceable Signature Scheme
0
0.34
2004
A secure and efficient strong-password authentication protocol
4
0.45
2004
Yet another attack on a QR-based password authentication system
0
0.34
2004
1
2
50 / page