Tseng, Yi-Fan
5276  results:
Search for persons X
?
 
?
2

Predicate encryption with selective-opening security for re..:

Tseng, Yi-Fan ; Liu, Zi-Yuan ; Tso, Raylin
Designs, Codes and Cryptography.  92 (2024)  6 - p. 1477-1500 , 2024
 
?
3

Cryptanalysis and Improvement to Two Key-Policy Attribute-B..:

, In: Frontier Computing on Industrial Applications Volume 4; Lecture Notes in Electrical Engineering,
Tseng, Yi-Fan ; Chen, Pin-Hao - p. 137-146 , 2024
 
?
 
?
5

Attribute hiding subset predicate encryption: Quantum-resis..:

Tseng, Yi-Fan
Computer Standards & Interfaces.  88 (2024)  - p. 103796 , 2024
 
?
6

An Efficient Data Protection Scheme Based on Hierarchical I..:

Fan, Chun-I ; Shie, Cheng-Han ; Tseng, Yi-Fan.
ACM Transactions on Sensor Networks.  19 (2023)  3 - p. 1-21 , 2023
 
?
7

Public Key Encryption with Hierarchical Authorized Keyword ..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
Liu, Zi-Yuan ; Chien, Chu-Chieh ; Tseng, Yi-Fan.. - p. 147-170 , 2023
 
?
8

Anonymous and Unlinkable Identity Scheme in Open Data Envir..:

, In: 2023 18th Asia Joint Conference on Information Security (AsiaJCIS),
 
?
9

A Novel Ciphertext-Policy Attribute-Based Encryption Suppor..:

, In: 2023 18th Asia Joint Conference on Information Security (AsiaJCIS),
Tseng, Yi-Fan ; Huang, Jheng-Jia ; Chen, Guan-Yu... - p. 25-31 , 2023
 
?
 
?
11

Cryptanalysis to Ming et al.'s Revocable Multi-Authority At..:

, In: 2022 17th Asia Joint Conference on Information Security (AsiaJCIS),
Tseng, Yi-Fan ; Yang, Hao-Yu ; Wu, Chieh-Han... - p. 29-32 , 2022
 
?
12

Lightweight and Efficient Source Authentication Scheme Base..:

, In: 2021 International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications; Smart Innovation, Systems and Technologies,
Huang, Jheng-Jia ; Tseng, Yi-Fan ; Lo, Nai-Wei.. - p. 358-367 , 2022
 
?
13

Blockchain-Based Confidential Payment System with Controlla..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Liao, Yu-Chen ; Tso, Raylin ; Liu, Zi-Yuan. - p. 39-56 , 2022
 
?
14

Blockchain-Based Self-Sovereign Identity System with Attrib..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Lee, Yi-Hsiu ; Liu, Zi-Yuan ; Tso, Raylin. - p. 21-38 , 2022
 
?
15

Public-key Authenticated Encryption with Keyword Search ..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
Liu, Zi-Yuan ; Tseng, Yi-Fan ; Tso, Raylin.. - p. 423-436 , 2022
 
1-15