default search action
Han-Yu Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j58]Han-Yu Lin, Tung-Tso Tsai, Hsu-Lun Wu:
A Revocable Certificateless Sanitizable Signature Scheme With Batch Verification. IEEE Access 12: 143392-143400 (2024) - [j57]Han-Yu Lin, Pei-Ru Chen:
Revocable and Fog-Enabled Proxy Re-Encryption Scheme for IoT Environments. Sensors 24(19): 6290 (2024) - [c9]Han-Yu Lin, Tung-Tso Tsai, Jing-Yu Hsu:
A Secure Certificateless Multi-signature Scheme for Wireless Sensor Networks. ICMLSC 2024: 116-121 - [i1]Hong-Sheng Huang, Yu-Lei Fu, Han-Yu Lin:
The Variant of Designated Verifier Signature Scheme with Message Recovery. CoRR abs/2403.07820 (2024) - 2023
- [j56]Tung-Tso Tsai, Han-Yu Lin, Cheng-Ye Wu:
CBEET: Constructing Certificate-based Encryption with Equality Test in the CB-PKS. Inf. Technol. Control. 52(4): 935-951 (2023) - [j55]Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting, Yan-Rong Fan:
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation. Sensors 23(5): 2706 (2023) - [c8]Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting, Po-Cheng Chan:
CL-SML: Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments. BDSIC 2023: 9-15 - 2022
- [j54]Tung-Tso Tsai, Han-Yu Lin, Han-Ching Tsai:
Revocable Certificateless Public Key Encryption with Equality Test. Inf. Technol. Control. 51(4): 638-660 (2022) - [j53]Tung-Tso Tsai, Han-Yu Lin, Hsiao-Chieh Chang:
An Efficient Revocable Identity-Based Encryption with Equality Test Scheme for the Wireless Body Area Network. J. Sensors 2022: 1-18 (2022) - [j52]Han-Yu Lin, Tung-Tso Tsai, Pei-Yih Ting, Ching-Chung Chen:
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments. Sensors 22(11): 4223 (2022) - 2021
- [j51]Han-Yu Lin:
Time-constrained strong multi-designated verifier signature suitable for Internet of things-based collaborative fog computing systems. Int. J. Distributed Sens. Networks 17(3): 155014772110017 (2021) - [j50]Han-Yu Lin, Yao-Min Hung:
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds. Sensors 21(1): 67 (2021)
2010 – 2019
- 2019
- [j49]Han-Yu Lin:
A Novel CCA-Secure Verifiable Authenticated Encryption Scheme Using BSDH and q-SDH Assumptions. Inf. Technol. Control. 48(4): 579-589 (2019) - [j48]Han-Yu Lin:
Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments. IEEE Syst. J. 13(2): 1608-1617 (2019) - [j47]Han-Yu Lin:
A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets. Symmetry 11(5): 605 (2019) - 2018
- [j46]Han-Yu Lin:
A New Certificateless Strong Designated Verifier Signature Scheme: Non-Delegatable and SSA-KCA Secure. IEEE Access 6: 50765-50775 (2018) - [j45]Shyh-Wei Chen, Dai-Lun Chiang, Tzer-Shyong Chen, Han-Yu Lin, Yu-Fang Chung, Feipei Lai:
An Implementation of Interactive Healthy Eating Index and Healthcare System on Mobile Platform in College Student Samples. IEEE Access 6: 71651-71661 (2018) - [j44]Han-Yu Lin:
Dynamic ID authentication scheme using chaotic map. Wirel. Networks 24(3): 769-776 (2018) - [c7]Han-Yu Lin, Chia-Hung Wu, Yan-Ru Jiang:
On Delegatability of a Certificateless Strong Designated Verifier Signature Scheme. ICS 2018: 550-558 - 2017
- [j43]Han-Yu Lin, Tzong-Sun Wu:
Toward Secure CB-Signcryption for Wireless Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 36(1-4): 1-20 (2017) - [j42]Han-Yu Lin:
Efficient mobile dynamic ID authentication and key agreement scheme without trusted servers. Int. J. Commun. Syst. 30(1) (2017) - [j41]Han-Yu Lin:
PCMAE: A Proxy Convertible Multi-AE Scheme and Its Variant. Inf. Technol. Control. 46(4): 530-545 (2017) - [j40]Han-Yu Lin, Leo-Fan Yang, Yaomin Hu:
A Lightweight ID-Based Strong Designated Verifier Signature Scheme against Key-Compromise Attacks. J. Softw. 12(8): 649-659 (2017) - [c6]Han-Yu Lin, Pei-Yih Ting, Leo-Fan Yang:
On the security of a provably secure certificateless strong designated verifier signature scheme based on bilinear pairings. ICTCE 2017: 61-65 - 2016
- [j39]Han-Yu Lin:
Efficient dynamic authentication for mobile satellite communication systems without verification table. Int. J. Satell. Commun. Netw. 34(1): 3-10 (2016) - [j38]Han-Yu Lin:
Secure Certificateless Two-Party Key Agreement with Short Message. Inf. Technol. Control. 45(1): 71-76 (2016) - 2015
- [j37]Han-Yu Lin:
Improved chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear Sci. Numer. Simul. 20(2): 482-488 (2015) - [j36]Tzong-Chen Wu, Tzuoh-Yi Lin, Tzong-Sun Wu, Han-Yu Lin:
Efficient english auction scheme without a secure channel. Int. Arab J. Inf. Technol. 12(3): 246-252 (2015) - [j35]Han-Yu Lin:
RPCAE: a novel revocable proxy convertible authenticated encryption scheme. Int. J. Inf. Sec. 14(5): 431-441 (2015) - [j34]Han-Yu Lin:
Location-based data encryption for wireless sensor network using dynamic keys. Wirel. Networks 21(8): 2649-2656 (2015) - [j33]Han-Yu Lin:
Secure Content Distribution Using Multi-hop Proxy Re-encryption. Wirel. Pers. Commun. 82(3): 1449-1459 (2015) - [c5]Pei-Yih Ting, Shao-Da Huang, Tzong-Sun Wu, Han-Yu Lin:
A Provable Watermark-Based Copyright Protection Scheme. AsiaJCIS 2015: 124-129 - 2014
- [j32]Han-Yu Lin:
Toward secure strong designated verifier signature scheme from identity-based system. Int. Arab J. Inf. Technol. 11(4): 315-321 (2014) - [j31]Chien-Lung Hsu, Han-Yu Lin:
Universal forgery attack on a strong designated verifier signature scheme. Int. Arab J. Inf. Technol. 11(5): 425-428 (2014) - [j30]Tzong-Sun Wu, Ming-Lun Lee, Han-Yu Lin, Chao-Yuan Wang:
Shoulder-surfing-proof graphical password authentication scheme. Int. J. Inf. Sec. 13(3): 245-254 (2014) - [j29]Tzong-Sun Wu, Han-Yu Lin:
Provably secure proxy convertible authenticated encryption scheme based on RSA. Inf. Sci. 278: 577-587 (2014) - [j28]Han-Yu Lin:
Group-Oriented Data Access Structure Using Threshold-CAE Scheme and Its Extension. Inf. Technol. Control. 43(3): 252-263 (2014) - [j27]Tzong-Sun Wu, Yih-Sen Chen, Han-Yu Lin:
Toward Efficient Convertible Authenticated Encryption Schemes Using Self-Certified Public Key System. KSII Trans. Internet Inf. Syst. 8(3): 1157-1177 (2014) - [j26]Han-Yu Lin:
Chaotic map-based three-party authenticated key agreement. Secur. Commun. Networks 7(12): 2469-2474 (2014) - [j25]Han-Yu Lin:
Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme. Wirel. Pers. Commun. 78(2): 1487-1494 (2014) - 2013
- [j24]Han-Yu Lin:
Secure Universal Designated Verifier Signature and its Variant for Privacy Protection. Inf. Technol. Control. 42(3): 268-276 (2013) - [j23]Chien-Lung Hsu, Han-Yu Lin:
An Identity-Based Key-Insulated Encryption with Message Linkages for Peer-to-Peer Communication Network. KSII Trans. Internet Inf. Syst. 7(11): 2928-2940 (2013) - [j22]Han-Yu Lin:
On the Security of A Dynamic ID-based Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(2): 9929 (2013) - [j21]Tzong-Sun Wu, Han-Yu Lin:
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network. Mob. Networks Appl. 18(5): 594-599 (2013) - [j20]Tzong-Sun Wu, Han-Yu Lin:
A novel probabilistic signature based on bilinear square Diffie-Hellman problem and its extension. Secur. Commun. Networks 6(6): 757-764 (2013) - [c4]Chia-Hui Liu, Fong-Qi Lin, Dai-Lun Chiang, Tzer-Long Chen, Chin-Sheng Chen, Han-Yu Lin, Yu-Fang Chung, Tzer-Shyong Chen:
Secure PHR Access Control Scheme for Healthcare Application Clouds. ICPP 2013: 1067-1076 - 2012
- [j19]Tzong-Sun Wu, Han-Yu Lin, Pei-Yih Ting:
A publicly verifiable PCAE scheme for confidential applications with proxy delegation. Trans. Emerg. Telecommun. Technol. 23(2): 172-185 (2012) - [j18]Chung-Fu Lu, Chien-Lung Hsu, Han-Yu Lin:
Provably convertible multi-authenticated encryption scheme for generalized group communications. Inf. Sci. 199: 154-166 (2012) - [j17]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
Certificate-Based Secure Three-Party Signcryption Scheme with Low Costs. J. Inf. Sci. Eng. 28(4): 739-753 (2012) - [j16]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang:
An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce. J. Inf. Sci. Eng. 28(4): 771-785 (2012) - [j15]Chien-Lung Hsu, Han-Yu Lin:
Pairing-based strong designated verifier proxy signature scheme with low cost. Secur. Commun. Networks 5(5): 517-522 (2012) - [c3]Han-Yu Lin, Chien-Ming Chen, Yu-Lun Cheng, Ya-Hui Chang, Tun-Wen Pai:
Construction of a Taiwan Biodiversity Genetic Database in Cloud Environments. ISBAST 2012: 108-112 - 2011
- [j14]Tzong-Sun Wu, Han-Yu Lin, Wang-Chieh Hu, Yih-Sen Chen:
Audio watermarking scheme with dynamic adjustment in mute period. Expert Syst. Appl. 38(6): 6787-6792 (2011) - [j13]Han-Yu Lin, Chien-Lung Hsu:
A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme. Int. J. Found. Comput. Sci. 22(3): 739-756 (2011) - [j12]Han-Yu Lin, Chien-Lung Hsu, Shih-Kun Huang:
Improved convertible authenticated encryption scheme with provable security. Inf. Process. Lett. 111(13): 661-666 (2011) - [j11]Tzong-Sun Wu, Han-Yu Lin, Ming-Lun Lee, Won-Yi Chen:
Fast Remote User Authentication Scheme with Smart Card Based on Quadratic Residue. J. Digit. Inf. Manag. 9(2): 51-54 (2011) - [j10]Han-Yu Lin, Tzong-Sun Wu, Yi-Shiung Yeh:
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation. J. Inf. Sci. Eng. 27(2): 451-463 (2011) - [j9]Chien-Lung Hsu, Han-Yu Lin:
New identity-based key-insulated convertible multi-authenticated encryption scheme. J. Netw. Comput. Appl. 34(5): 1724-1731 (2011) - 2010
- [j8]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang, Yi-Shiung Yeh:
Efficient proxy signcryption scheme with provable CCA and CMA security. Comput. Math. Appl. 60(7): 1850-1858 (2010)
2000 – 2009
- 2009
- [j7]Tzong-Sun Wu, Han-Yu Lin:
Secure Convertible Authenticated Encryption Scheme Based on RSA. Informatica (Slovenia) 33(4): 481-486 (2009) - [j6]Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin, Yu-Hao Chang:
A Study on Parallel RSA Factorization. J. Comput. 4(2): 112-118 (2009) - [j5]Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin:
Structural Binary CBC Encryption Mode. J. Inf. Sci. Eng. 25(3): 937-944 (2009) - [j4]Tzong-Sun Wu, Han-Yu Lin:
Efficient self-certified proxy CAE scheme and its variants. J. Syst. Softw. 82(6): 974-980 (2009) - 2008
- [j3]Tzong-Sun Wu, Chien-Lung Hsu, Kuo-Yu Tsai, Han-Yu Lin, Tzong-Chen Wu:
Convertible multi-authenticated encryption scheme. Inf. Sci. 178(1): 256-263 (2008) - [c2]Han-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh:
Self-Certified Proxy Convertible Authenticated Encryption Scheme. ISDA (3) 2008: 479-483 - [c1]Han-Yu Lin, Shih-Cheng Chen, Ding-Bing Lin, Hsin-Piao Lin:
Multidimensional Scaling Algorithm for Mobile Location Based on Hybrid SADOA/TOA Measurement. WCNC 2008: 3015-3020 - 2004
- [j2]Tzong-Sun Wu, Han-Yu Lin:
Robust key authentication scheme resistant to public key substitution attacks. Appl. Math. Comput. 157(3): 825-833 (2004) - 2003
- [j1]Tzong-Sun Wu, Chien-Lung Hsu, Han-Yu Lin, Po-Sheng Huang:
Improvement of the Miyazaki-Takaragi threshold digital signature scheme. Inf. Process. Lett. 88(4): 183-186 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint