Obserwuj
Fuw-Yi Yang, 楊伏夷
Fuw-Yi Yang, 楊伏夷
Computer Science and Information Engineering, Chaoyang University of Technology, Taiwan
Zweryfikowany adres z cyut.edu.tw - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A secure control protocol for USB mass storage devices
FY Yang, TD Wu, SH Chiu
IEEE Transactions on Consumer Electronics 56 (4), 2239-2343, 2010
402010
Improvement on a Trapdoor Hash Function.
FY Yang
Int. J. Netw. Secur. 9 (1), 17-21, 2009
232009
A novel e-cash payment protocol using trapdoor hash function on smart mobile devices
JS Wang, FY Yang, I Paik
International Journal of Computer Science and Network Security 11 (6), 12-19, 2011
222011
A provably secure and efficient strong designated verifier signature scheme
FY Yang, CM Liao
International Journal of Network Security 10 (3), 220-224, 2010
222010
Mobile Banking Payment System.
FY Yang, ZW Liu, SH Chiu
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 85-95, 2011
112011
Cryptanalysis of log-in authentication based on circle property
FY Yang, JK Jan
IEEE Transactions on Consumer Electronics 50 (2), 625-628, 2004
112004
Improving an efficient ID-based RSA multisignature
FY Yang, JH Lo, CM Liao
Journal of Ambient Intelligence and Humanized Computing 4, 249-254, 2013
92013
Improvement of an efficient ID-based RSA multisignature
FY Yang, JH Lo, CM Liao
2010 International Conference on Complex, Intelligent and Software Intensive …, 2010
92010
Efficient trapdoor hash function for digital signatures
FY Yang
Chaoyang Journal 12, 351-357, 2007
92007
An enhanced and secure protocol for authenticated key exchange
FY Yang, JK Jan
Cryptology ePrint Archive, 2004
92004
A proxy partially blind signature scheme with proxy revocation
FY Yang, LR Liang
Journal of Ambient Intelligence and Humanized Computing 4, 255-263, 2013
82013
Password authentication scheme preserving identity privacy
FY Yang, CW Hsu, SH Chiu
2014 Sixth International Conference on Measuring Technology and Mechatronics …, 2014
72014
Cryptanalysis of a threshold proxy signature scheme with known signers
FY Yang, JK Jan, WJ Jeng
7
A Provably Secure Scheme for Restrictive Partially Blind Signatures.
FY Yang, JK Jan
IACR Cryptol. ePrint Arch. 2004, 37, 2004
62004
Improvements in Dynamic ID-based Remote User Authentication Schemes
FY Yang, Y Li, SH Chiu, CS Jiang
International Journal of Advancements in Computing Technology 4 (9), 240-247, 2012
52012
An electronic check system with efficient online computational ability
FY Yang, ZW Liu, SH Chiu
Journal of Convergence Information Technology (JCIT) 6 (12), 210-219, 2011
52011
A novel mutual authentication scheme for USB storage devices
FY Yang, TD Wu, SH Chiu
Proceedings of the 11th International Conference on Information Integration …, 2009
52009
Security analysis Zhang-Wang signature scheme without using one-way hash functions
FY Yang, MH Hsu
International Conference on Accounting and Information Technology, 2008
52008
A provable secure scheme for partially blind signatures
FY Yang, JK Jan
Cryptology ePrint Archive, 2004
52004
A Secure Scheme for Restrictive Partially Blind Signatures.
FY Yang, JK Jan
iiWAS, 2004
52004
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20