default search action
Chun-I Fan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j67]Chun-I Fan, Arijit Karati, Shou-Li Wu:
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions. IEEE Trans. Dependable Secur. Comput. 21(4): 2766-2778 (2024) - 2023
- [j66]Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, Arijit Karati:
A Secure Cloud Gaming System. J. Inf. Sci. Eng. 39(3): 473-487 (2023) - [j65]Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang:
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT. ACM Trans. Sens. Networks 19(3): 61:1-61:21 (2023) - [c49]Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie, Yu-Lung Tsai:
Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack. IMCOM 2023: 1-8 - 2022
- [j64]Er-Shuo Zhuang, Chun-I Fan, I-Hua Kuo:
Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices. IEEE Access 10: 58254-58267 (2022) - [j63]Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu:
Fast keyword search over encrypted data with short ciphertext in clouds. J. Inf. Secur. Appl. 70: 103320 (2022) - [j62]Arijit Karati, Chun-I Fan, Er-Shuo Zhuang:
Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(6): 3661-3669 (2022) - [j61]Chun-I Fan, Ya-Wen Hsu, Cheng-Han Shie, Yi-Fan Tseng:
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning. ACM Trans. Sens. Networks 18(4): 55:1-55:25 (2022) - [c48]Dingyi Pei, Koji Nakao, Heung Youl Youm, Chun-I Fan:
Message from the General Co-Chairs: AsiaJCIS 2022. AsiaJCIS 2022: vii - [c47]Chun-I Fan, Yen-Lin Lai, Cheng-Han Shie:
Clustering-Based Network Intrusion Detection System. DSC 2022: 1-8 - [c46]Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi:
IoT Botnet Detection Based on the Behaviors of DNS Queries. DSC 2022: 1-7 - 2021
- [j60]Chun-I Fan, Arijit Karati, Pei-Shan Yang:
Reliable file transfer protocol with producer anonymity for Named Data Networking. J. Inf. Secur. Appl. 59: 102851 (2021) - [j59]Yi-Fan Tseng, Chun-I Fan:
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model. Secur. Commun. Networks 2021: 5519721:1-5519721:11 (2021) - [j58]Chun-I Fan, Jheng-Jia Huang, Shang-Wei Tseng, I-Te Chen:
Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery. IEEE Trans. Cloud Comput. 9(2): 546-561 (2021) - [j57]Chun-I Fan, Yu-Tse Shih, Jheng-Jia Huang, Wan-Ru Chiu:
Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. IEEE Trans. Netw. Serv. Manag. 18(1): 701-712 (2021) - [c45]Chun-I Fan, Yi-Fan Tseng, Cheng-Chun Feng:
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model. DSC 2021: 1-8 - [c44]Chun-I Fan, Kai-Yuan Zheng, Yu-Tse Shih, Er-Shuo Zhuang, Jheng-Jia Huang:
An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments. ICMU 2021: 1-7 - [e2]Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 [contents] - [i5]Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu:
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds. IACR Cryptol. ePrint Arch. 2021: 974 (2021) - [i4]Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang:
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport. IACR Cryptol. ePrint Arch. 2021: 1057 (2021) - 2020
- [j56]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. Int. J. Inf. Sec. 19(3): 245-255 (2020) - [j55]Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, Jemin Lee:
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications. IEEE Trans. Inf. Forensics Secur. 15: 927-942 (2020) - [c43]Chun-I Fan, Yi-Fan Tseng, Yen-Lin Huang:
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map. AsiaJCIS 2020: 9-15 - [c42]Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu, Shang-Wei Kao:
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing. AsiaJCIS 2020: 128-136 - [c41]Jheng-Jia Huang, Chun-I Fan, Yu-Chen Hsu, Arijit Karati:
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments. SSCC 2020: 92-106
2010 – 2019
- 2019
- [j54]Yi-Fan Tseng, Chun-I Fan, Cheng-Wei Sung:
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation. Int. J. Found. Comput. Sci. 30(4): 493-509 (2019) - [j53]Arijit Karati, Chun-I Fan, Ruei-Hau Hsu:
Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices. IEEE Internet Things J. 6(6): 10431-10440 (2019) - [j52]Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin:
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption. J. Univers. Comput. Sci. 25(3): 182-202 (2019) - [j51]Yi-Fan Tseng, Chun-I Fan, Ching-Wen Chen:
Top-Level Secure Certificateless Signature Scheme in the Standard Model. IEEE Syst. J. 13(3): 2763-2774 (2019) - [j50]Yi-Ning Liu, Wei Guo, Chun-I Fan, Liang Chang, Chi Cheng:
A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid. IEEE Trans. Ind. Informatics 15(3): 1767-1774 (2019) - [j49]Yi-Fan Tseng, Chun-I Fan, Chin-Yu Wu:
FGAC-NDN: Fine-Grained Access Control for Named Data Networks. IEEE Trans. Netw. Serv. Manag. 16(1): 143-152 (2019) - 2018
- [j48]Yu-Lun Chuang, Chun-I Fan, Yi-Fan Tseng:
An Efficient Algorithm for the Shortest Vector Problem. IEEE Access 6: 61478-61487 (2018) - [j47]Yi-Fan Tseng, Chun-I Fan, Yan-Fu Cho:
An authenticated re-encryption scheme for secure file transfer in named data networks. Int. J. Commun. Syst. 31(11) (2018) - [j46]Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi:
Probably Secure Efficient Anonymous Credential Scheme. Int. J. Softw. Innov. 6(3): 18-35 (2018) - [j45]Yi-Hui Lin, Jheng-Jia Huang, Chun-I Fan, Wen-Tsuen Chen:
Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading. IEEE Internet Things J. 5(4): 3209-3219 (2018) - [j44]Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan:
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets. J. Inf. Process. 26: 638-647 (2018) - [j43]Yi-Fan Tseng, Chun-I Fan:
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption. J. Inf. Sci. Eng. 34(6): 1517-1541 (2018) - [j42]Chun-I Fan, I-Te Chen, Chen-Kai Cheng, Jheng-Jia Huang, Wen-Tsuen Chen:
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers. IEEE Syst. J. 12(1): 473-484 (2018) - [c40]Xuping Huang, Hiroaki Kikuchi, Chun-I Fan:
Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation. AINA 2018: 793-800 - [c39]Chun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, Jheng-Jia Huang:
Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem. AsiaJCIS 2018: 35-41 - [c38]Wei-Hao Chen, Chun-I Fan, Yi-Fan Tseng:
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds. DSC 2018: 1-4 - [c37]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. DSC 2018: 1-8 - [c36]Ruei-Hau Hsu, Chun-I Fan, Tony Q. S. Quek, Jemin Lee:
CORE: Cooperative Encryption with its Applications to Controllable Security Services. DSC 2018: 1-8 - [c35]Kodai Nagata, Hiroaki Kikuchi, Chun-I Fan:
Risk of Bitcoin Addresses to be Identified from Features of Output Addresses. DSC 2018: 1-6 - [c34]Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Yen-Hao Chen, Hsin-Nan Kuo:
Verifiable Privacy-Preserving Payment Mechanism for Smart Grids. IDCS 2018: 52-63 - [c33]Arijit Karati, Chun-I Fan, Ruei-Hau Hsu:
Enhancement of FTP-NDN Supporting Nondesignated Receivers. ICS 2018: 590-598 - [i3]Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, Jemin Lee:
ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G. CoRR abs/1806.03406 (2018) - 2017
- [j41]Huige Li, Fangguo Zhang, Chun-I Fan:
Deniable Searchable Symmetric Encryption. Inf. Sci. 402: 233-243 (2017) - [j40]Chun-I Fan, Jun-Cheng Chen, Shi-Yuan Huang, Jheng-Jia Huang, Wen-Tsuen Chen:
Provably Secure Timed-Release Proxy Conditional Reencryption. IEEE Syst. J. 11(4): 2291-2302 (2017) - [j39]Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi:
Multireceiver Predicate Encryption for Online Social Networks. IEEE Trans. Signal Inf. Process. over Networks 3(2): 388-403 (2017) - [c32]Yi-Fan Tseng, Chun-I Fan, Ting-Chuan Kung, Jheng-Jia Huang, Hsin-Nan Kuo:
Homomorphic encryption supporting logical operations. ICTCE 2017: 66-69 - [i2]Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin:
Attribute-Based Encryption from Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2017: 219 (2017) - 2016
- [j38]Shi-Yuan Huang, Chun-I Fan, Yi-Fan Tseng:
Enabled/disabled predicate encryption in clouds. Future Gener. Comput. Syst. 62: 148-160 (2016) - [j37]Chun-I Fan, Yu-Kuang Liang, Chien-Nan Wu:
Privacy enhancement for fair PayWord-based micropayment. Secur. Commun. Networks 9(5): 380-388 (2016) - [c31]Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, Chun-I Fan:
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares. AsiaJCIS 2016: 48-54 - [c30]Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi:
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments. ICITCS 2016: 1-5 - [c29]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi:
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments. MobiQuitous (Adjunct Proceedings) 2016: 88-93 - 2015
- [j36]Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. J. Inf. Sci. Eng. 31(1): 297-314 (2015) - [j35]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. J. Inf. Sci. Eng. 31(6): 1975-1992 (2015) - [j34]Chun-I Fan, Yi-Fan Tseng:
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security. Symmetry 7(4): 1856-1881 (2015) - [c28]Chun-I Fan, Shi-Yuan Huang, Wen-Che Hsu:
Encrypted Data Deduplication in Cloud Storage. AsiaJCIS 2015: 18-25 - [c27]Chun-I Fan, Chien-Nan Wu, Chun-Hung Chen, Yi-Fan Tseng, Cheng-Chun Feng:
Attribute-Based Proxy Re-encryption with Dynamic Membership. AsiaJCIS 2015: 26-32 - [c26]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments. AsiaJCIS 2015: 91-96 - [c25]Chun-I Fan, Han-Wei Hsiao, Chun-Han Chou, Yi-Fan Tseng:
Malware Detection Systems Based on API Log Data Mining. COMPSAC Workshops 2015: 255-260 - 2014
- [j33]Chun-I Fan, Vincent Shi-Ming Huang, He-Ming Ruan:
Arbitrary-State Attribute-Based Encryption with Dynamic Membership. IEEE Trans. Computers 63(8): 1951-1961 (2014) - [j32]Chun-I Fan, Ming-Te Chen, Yu-Kuang Liang, Long-Sian Chen:
Truly Anonymous Paper Submission and Review Scheme. Trans. Data Priv. 7(3): 283-308 (2014) - [j31]Chun-I Fan, Shi-Yuan Huang, Yih-Loong Lai:
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid. IEEE Trans. Ind. Informatics 10(1): 666-675 (2014) - [c24]Chun-I Fan, Wei-Zhe Sun, Shih-Wei Huang, Wen-Shenq Juang, Jheng-Jia Huang:
Strongly Privacy-Preserving Communication Protocol for VANETs. AsiaJCIS 2014: 119-126 - [c23]Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen:
Anonymous Credential Scheme Supporting Active Revocation. AsiaJCIS 2014: 127-132 - [c22]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
An Efficient Authentication and Service Key Agreement Scheme in IOT Environments. ICS 2014: 715-723 - 2013
- [j30]Chun-I Fan, Shi-Yuan Huang:
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Gener. Comput. Syst. 29(7): 1716-1724 (2013) - [j29]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Internet Inf. Syst. 7(1): 119-131 (2013) - [j28]Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun, Wei-Kuei Chen:
Multi-recastable e-bidding game with dual-blindness. Math. Comput. Model. 58(1-2): 68-78 (2013) - [j27]Chun-I Fan, Vincent Shi-Ming Huang, Yao-Chun Yu:
User efficient recoverable off-line e-cash scheme with fast anonymity revoking. Math. Comput. Model. 58(1-2): 227-237 (2013) - [j26]Chun-I Fan, Shi-Yuan Huang, William Artan:
Design and implementation of privacy preserving billing protocol for smart grid. J. Supercomput. 66(2): 841-862 (2013) - [j25]Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu:
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs. IEEE Trans. Parallel Distributed Syst. 24(4): 672-680 (2013) - [c21]Chun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, Yi-Fan Tseng:
Secure Certificateless Signature Scheme Supporting Batch Verification. AsiaJCIS 2013: 8-11 - [c20]Chi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, Hung-Min Sun:
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality. AsiaJCIS 2013: 102-107 - [c19]Chun-I Fan, Pei-Jen Tsai, Jheng-Jia Huang, Wen-Tsuen Chen:
Anonymous Multi-receiver Certificate-Based Encryption. CyberC 2013: 19-26 - [c18]Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin:
Active One-Time Password Mechanism for User Authentication. GPC 2013: 464-471 - [e1]Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martínez Pérez:
Security in Computing and Communications - International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings. Communications in Computer and Information Science 377, Springer 2013, ISBN 978-3-642-40575-4 [contents] - 2012
- [j24]Chun-I Fan, Chien-Nan Wu, Wei-Kuei Chen, Wei-Zhe Sun:
Attribute-based strong designated-verifier signature scheme. J. Syst. Softw. 85(4): 944-959 (2012) - [j23]Chun-I Fan, Ruei-Hau Hsu, Wei-Kuei Chen:
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme. Secur. Commun. Networks 5(5): 462-478 (2012) - [c17]Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. ICUIMC 2012: 17:1-17:7 - 2011
- [j22]Chi-Yuan Chen, Han-Chieh Chao, Tin Yu Wu, Chun-I Fan, Jiann-Liang Chen, Yuh-Shyan Chen, Jenq-Muh Hsu:
IoT-IMS Communication Platform for Future Internet. Int. J. Adapt. Resilient Auton. Syst. 2(4): 74-94 (2011) - [j21]Chun-I Fan, Ruei-Hau Hsu, Pei-Hsiu Ho:
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. J. Inf. Sci. Eng. 27(3): 969-982 (2011) - [c16]Chun-I Fan, Ruei-Hau Hsu, Mark Manulis:
Group Signature with Constant Revocation Costs for Signers and Verifiers. CANS 2011: 214-233 - [c15]Chun-I Fan, Shi-Yuan Huang:
Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage. CyberC 2011: 269-273 - 2010
- [j20]Chun-I Fan, Wei-Zhe Sun, Vincent Shi-Ming Huang:
Provably secure randomized blind signature scheme based on bilinear pairing. Comput. Math. Appl. 60(2): 285-293 (2010) - [j19]Chun-I Fan, Ling-Ying Huang, Pei-Hsiu Ho:
Anonymous Multireceiver Identity-Based Encryption. IEEE Trans. Computers 59(9): 1239-1249 (2010) - [j18]Chun-I Fan, Pei-Hsiu Ho, Ruei-Hau Hsu:
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. IEEE/ACM Trans. Netw. 18(3): 996-1009 (2010) - [j17]Chun-I Fan, Vincent Shi-Ming Huang:
Provably Secure Integrated On/Off-Line Electronic Cash for Flexible and Efficient Payment. IEEE Trans. Syst. Man Cybern. Part C 40(5): 567-579 (2010)
2000 – 2009
- 2009
- [j16]Chun-I Fan, D. J. Guan, Chih-I Wang, Dai-Rui Lin:
Cryptanalysis of Lee-Hwang-Yang blind signature scheme. Comput. Stand. Interfaces 31(2): 319-320 (2009) - [j15]Chun-I Fan, Ming-Te Chen, Wei-Zhe Sun:
Buyer-seller watermarking protocols with off-line trusted third parties. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 36-43 (2009) - [j14]Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, Chin-Laung Lei:
Fair anonymous rewarding based on electronic cash. J. Syst. Softw. 82(7): 1168-1176 (2009) - [j13]Chun-I Fan, Yi-Hui Lin:
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Forensics Secur. 4(4): 933-945 (2009) - [c14]Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen:
Truly Anonymous Paper Submission and Review Scheme. ARES 2009: 960-965 - 2008
- [j12]Chun-I Fan, Yu-Kuang Liang:
Anonymous Fair Transaction Protocols Based on Electronic Cash. Int. J. Electron. Commer. 13(1): 131-151 (2008) - [j11]Chun-I Fan, Wei-Zhe Sun:
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Math. Comput. Model. 48(9-10): 1611-1627 (2008) - [c13]Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun:
Multi-recastable E-Bidding Scheme. ISDA (3) 2008: 462-466 - [c12]Chun-I Fan, Ruei-Hau Hsu, Chun-Hao Tseng:
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. Mobility Conference 2008: 82 - 2007
- [j10]Chun-I Fan, Bo-Wei Lin, Vincent Shi-Ming Huang:
Customer Efficient Electronic Cash Protocols. J. Organ. Comput. Electron. Commer. 17(3): 259-281 (2007) - [c11]Chun-I Fan, Vincent Shi-Ming Huang:
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. IWSEC 2007: 412-427 - [c10]Chun-I Fan, Ming-Te Chen, Wei-Zhe Sun:
Buyer-Seller Watermarking Protocols with Off-line Trusted Parties. MUE 2007: 1035-1040 - [c9]Chun-I Fan, Pei-Hsiu Ho, Hsin-Yu Chen:
Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications. WCNC 2007: 2714-2719 - 2006
- [j9]Chun-I Fan:
Ownership-attached unblinding of blind signatures for untraceable electronic cash, . Inf. Sci. 176(3): 263-284 (2006) - [c8]Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu:
Remote Password Authentication Scheme with Smart Cards and Biometrics. GLOBECOM 2006 - [c7]Chun-I Fan, Wei-Zhe Sun:
Uncoercible Anonymous Electronic Voting. JCIS 2006 - [c6]Chun-I Fan, Yu-Kuang Liang, Bo-Wei Lin:
Fair Transaction Protocols Based on Electronic Cash. PDCAT 2006: 383-388 - 2005
- [j8]Chun-I Fan, Yung-Cheng Chan, Zhi-Kai Zhang:
Robust remote authentication scheme with smart cards. Comput. Secur. 24(8): 619-628 (2005) - [i1]Chih-I Wang, Chun-I Fan, D. J. Guan:
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol. IACR Cryptol. ePrint Arch. 2005: 182 (2005) - 2003
- [j7]Chun-I Fan:
Improved low-computation partially blind signatures. Appl. Math. Comput. 145(2-3): 853-867 (2003) - [j6]Chun-I Fan:
Comments on Hwang-Lee-Lai Attack upon Fan-Lei Partially Blind Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(7): 1900-1901 (2003) - 2002
- [j5]