Liu, Zi-Yuan
397  results:
?
1

Public Key Encryption with Hierarchical Authorized Keyword ..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
Liu, Zi-Yuan ; Chien, Chu-Chieh ; Tseng, Yi-Fan.. - p. 147-170 , 2023
 
?
2

Quantum-Resistant 1-out-of-N Oblivious Signatures from Latt..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
You, Jing-Shiuan ; Liu, Zi-Yuan ; Tso, Raylin.. - p. 166-186 , 2022
 
?
3

Blockchain-Based Confidential Payment System with Controlla..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Liao, Yu-Chen ; Tso, Raylin ; Liu, Zi-Yuan. - p. 39-56 , 2022
 
?
4

Cryptanalysis to Ming et al.'s Revocable Multi-Authority At..:

, In: 2022 17th Asia Joint Conference on Information Security (AsiaJCIS),
Tseng, Yi-Fan ; Yang, Hao-Yu ; Wu, Chieh-Han... - p. 29-32 , 2022
 
?
5

Public-key Authenticated Encryption with Keyword Search ..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
Liu, Zi-Yuan ; Tseng, Yi-Fan ; Tso, Raylin.. - p. 423-436 , 2022
 
?
6

Blockchain-Based Self-Sovereign Identity System with Attrib..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Lee, Yi-Hsiu ; Liu, Zi-Yuan ; Tso, Raylin. - p. 21-38 , 2022
 
?
7

Improved Proxy Re-encryption Scheme with Equality Test:

, In: 2021 16th Asia Joint Conference on Information Security (AsiaJCIS),
Yang, Chih-Chen ; Tso, Raylin ; Liu, Zi-Yuan.. - p. 37-44 , 2021
 
?
8

Partially Blind ECDSA Scheme and Its Application to Bitcoin:

, In: 2021 IEEE Conference on Dependable and Secure Computing (DSC),
 
?
9

Multi-value Private Information Retrieval using Homomorphic..:

, In: 2020 15th Asia Joint Conference on Information Security (AsiaJCIS),
Hsu, Hsiang-Chen ; Liu, Zi-Yuan ; Tso, Raylin. - p. 82-88 , 2020
 
?
10

Defense against N-pixel Attacks based on Image Reconstructi..:

, In: Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing,
 
?
11

A Generic Construction of Predicate Proxy Key Re-encapsulat..:

, In: 2020 15th Asia Joint Conference on Information Security (AsiaJCIS),
Tseng, Yi-Fan ; Liu, Zi-Yuan ; Tso, Raylin - p. 1-8 , 2020
 
?
12

Design and Analysis of a Novel Primary and Secondary Embedd..:

, In: Mechanisms and Machine Science; Recent Advances in Mechanisms, Transmissions and Applications,
Liu, Zi-Yu ; Hang, Lu-Bin ; Bai, Le-Le... - p. 123-132 , 2019
 
?
13

Weighted Randomly Overlapped Phased Array Design via Two-St..:

, In: 2021 CIE International Conference on Radar (Radar),
Zeng, Hui ; Xu, Zhen Hai ; Yang, Gong Qing... - p. 2701-2704 , 2021
 
?
14

An Adaptive Community Detection Algorithm based on Density ..:

, In: 2023 IEEE Smart World Congress (SWC),
Fan, Xiang ; Shi, Lei-Lei ; Liu, Lu... - p. 1-8 , 2023
 
?
15

Ultra-long Large-Capacity FBG Sensing for Long-Haul Powerli..:

, In: Lecture Notes in Civil Engineering; Experimental Vibration Analysis for Civil Engineering Structures,
Yang, Ze-Yuan ; Liu, Jie ; Han, Bing... - p. 682-688 , 2023
 
1-15