2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC)
Te-Yu Chen, Min-Shiang Hwang, Cheng-Chi Lee, Jinn-Ke Jan
Conference
(2009),
p. 725
2009 International Conference on Availability, Reliability and Security
Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu
Conference
(2009),
p. 935
2009 International Conference on Management of e-Commerce and e-Government
Conference
(2009),
p. 435
2010 IEEE International Conference on Wireless Information Technology and Systems
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
Majid Bayat, Mohammad Sabzinejad, Amirvala Movahed
Conference
(2010),
p. 578
2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
2020 IEEE 3rd International Conference on Electronic Information and Communication Technology (ICEICT)
Conference
(2020),
p. 579
A Lightweight Certificateless User Authentication Scheme for Mobile Environment
Alzubair Hassan, Rafik Hamza, Vittor Gift Mawutor, Akash Suresh Patil, Fagen Li
Book
Lecture Notes in Computer Science (Machine Learning for Cyber Security)
Volume 11806
(2019),
p. 112
A Provably Secure Certificateless User Authentication Protocol for Mobile Client-Server Environment
Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li
Book
Lecture Notes on Data Engineering and Communications Technologies (Advances in Internetworking, Data & Web Technologies)
Volume 6
(2018),
p. 592
A Secure User Authentication Protocol for Heterogeneous Mobile Environments
Alzubair Hassan, Rafik Hamza, Fagen Li, Awad Ali, Mohammed Bakri Bashir, Samar M. Alqhtani, Tawfeeg Mohmmed Tawfeeg, Adil Yousif
Journal
IEEE Access
Volume 10
(2022),
p. 69757
A more secure and privacy‐aware anonymous user authentication scheme for distributed mobile cloud computing environments
Ruhul Amin, SK Hafizul Islam, G.P. Biswas, Debasis Giri, Muhammad Khurram Khan, Neeraj Kumar
Journal
Security and Communication Networks
Volume 9,
Issue 17
(2016),
p. 4650
A novel multi-server remote user authentication scheme using self-certified public keys for mobile clients
Yi-Pin Liao, Chih-Ming Hsiao
Journal
Future Generation Computer Systems
Volume 29,
Issue 3
(2013),
p. 886
A pairing-based publicly verifiable secret sharing scheme
Tsu-Yang Wu, Yuh-Min Tseng
Journal
Journal of Systems Science and Complexity
Volume 24,
Issue 1
(2011),
p. 186
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
Tsu-Yang Wu, Yuh-Min Tseng, Tung-Tso Tsai
Journal
Computer Networks
Volume 56,
Issue 12
(2012),
p. 2994
An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang, G. A. Gravvanis, G. Wei
Journal
The Scientific World Journal
Volume 2013,
Issue 1
(2013)
An Authentication and Key Agreement Mechanism for Multi-Domain Wireless Networks using Bilinear Pairings
Ming Luo, Qi-jun Yan, Guo-qiang Jiang, Jian-feng Xu
Journal
Procedia Engineering
Volume 29
(2012),
p. 2649
An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography
Journal
Wireless Personal Communications
Volume 81,
Issue 2
(2015),
p. 779
An Efficient ID-Based Mutual Authentication and Key Agreement Protocol for Mobile Multi-server Environment Without a Trusted Registration Center and ESL Attack
Wei Li, Xue-lian Li, Jun-tao Gao, Hai-yu Wang
Book
Communications in Computer and Information Science (Trusted Computing and Information Security)
Volume 704
(2017),
p. 348
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
He Debiao, Chen Jianhua, Hu Jin
Journal
Information Fusion
Volume 13,
Issue 3
(2012),
p. 223
An efficient anonymous authentication protocol in multiple server communication networks (EAAM)
An Braeken, Pardeep Kumar, Madhusanka Liyanage, Ta Thi Kim Hue
Journal
The Journal of Supercomputing
Volume 74,
Issue 4
(2018),
p. 1695
An efficient certificateless user authentication and key exchange protocol for client-server environment
Alzubair Hassan, Nabeil Eltayieb, Rashad Elhabob, Fagen Li
Journal
Journal of Ambient Intelligence and Humanized Computing
Volume 9,
Issue 6
(2018),
p. 1713
An efficient dynamic ID-based remote user authentication scheme using self-certified public keys for multi-server environments
Shudong Li, Xiaobo Wu, Dawei Zhao, Aiping Li, Zhihong Tian, Xiaodong Yang, Hua Wang
Journal
PLOS ONE
Volume 13,
Issue 10
(2018),
p. e0202657
An efficient remote user authentication and key agreement protocol for mobile client–server environment from pairings
Journal
Ad Hoc Networks
Volume 10,
Issue 6
(2012),
p. 1009
An efficient user authentication and key exchange protocol for mobile client–server environment
Tsu-Yang Wu, Yuh-Min Tseng
Journal
Computer Networks
Volume 54,
Issue 9
(2010),
p. 1520
Analysis and improvement of a key exchange and authentication protocol in client-server environment
Yuting Li, Qingfeng Cheng, Xinghua Li
Journal
Journal of Ambient Intelligence and Humanized Computing
Volume 11,
Issue 9
(2020),
p. 3787
Comments on ID-Based Client Authentication with Key Agreement Protocol on ECC for Mobile Client-Server Environment
S. K. Hafizul Islam, G. P. Biswas
Book
Communications in Computer and Information Science (Advances in Computing and Communications)
Volume 191
(2011),
p. 628
Design and Analysis of Bilinear Pairing Based Mutual Authentication and Key Agreement Protocol Usable in Multi-server Environment
Journal
Wireless Personal Communications
Volume 84,
Issue 1
(2015),
p. 439
DoS-resistant ID-based password authentication scheme using smart cards
Min-Shiang Hwang, Song-Kong Chong, Te-Yu Chen
Journal
Journal of Systems and Software
Volume 83,
Issue 1
(2010),
p. 163
Efficient searchable ID-based encryption with a designated server
Tsu-Yang Wu, Tung-Tso Tsai, Yuh-Min Tseng
Journal
annals of telecommunications - annales des télécommunications
Volume 69,
Issue 7-8
(2014),
p. 391
Enhanced and secured random number generation for eUASBP
Sangeetha Rajaram, Satyanarayana Vollala, N. Ramasubramanian, J. Kokila
Journal
International Journal of System Assurance Engineering and Management
Volume 13,
Issue 3
(2022),
p. 1135
Further analysis of pairing‐based traitor tracing schemes for broadcast encryption
Tsu‐Yang Wu, Yuh‐Min Tseng
Journal
Security and Communication Networks
Volume 6,
Issue 1
(2013),
p. 28
Eun-Jun Yoon, Kee-Young Yoo
Conference
(2011),
p. 547
Identity-Based Encryption with Cloud Revocation Authority and Its Applications
Yuh-Min Tseng, Tung-Tso Tsai, Sen-Shan Huang, Chung-Peng Huang
Journal
IEEE Transactions on Cloud Computing
Volume 6,
Issue 4
(2018),
p. 1041
List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures
Yuh-Min Tseng, Sen-Shan Huang, Tung-Tso Tsai, Jia-Hua Ke
Journal
IEEE Transactions on Emerging Topics in Computing
Volume 4,
Issue 1
(2016),
p. 102
Mutual authentication scheme for multimedia medical information systems
Journal
Multimedia Tools and Applications
Volume 76,
Issue 8
(2017),
p. 10741
Provably secure and efficient anonymous ID-based authentication protocol for mobile devices using bilinear pairings
Journal
Wireless Personal Communications
Volume 83,
Issue 2
(2015),
p. 1273
Provably secure revocable ID‐based signature in the standard model
Tung‐Tso Tsai, Yuh‐Min Tseng, Tsu‐Yang Wu
Journal
Security and Communication Networks
Volume 6,
Issue 10
(2013),
p. 1250
Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment
Santanu Chatterjee, Sandip Roy, Ashok Kumar Das, Samiran Chattopadhyay, Neeraj Kumar, Athanasios V. Vasilakos
Journal
IEEE Transactions on Dependable and Secure Computing
Volume 15,
Issue 5
(2018),
p. 824
Towards generalized ID‐based user authentication for mobile multi‐server environment
Yun‐Hsin Chuang, Yuh‐Min Tseng
Journal
International Journal of Communication Systems
Volume 25,
Issue 4
(2012),
p. 447
Towards secure and efficient user authentication scheme using smart card for multi-server environments
Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan
Journal
The Journal of Supercomputing
Volume 66,
Issue 2
(2013),
p. 1008
User authentication scheme preserving anonymity for ubiquitous devices
Benchaa Djellali, Kheira Belarbi, Abdallah Chouarfia, Pascal Lorenz
Journal
Security and Communication Networks
Volume 8,
Issue 17
(2015),
p. 3131
eUASBP: enhanced user authentication scheme based on bilinear pairing
Sangeetha Rajaram, Tanmoy Maitra, Satyanarayana Vollala, N. Ramasubramanian, Ruhul Amin
Journal
Journal of Ambient Intelligence and Humanized Computing
Volume 11,
Issue 7
(2020),
p. 2827