Follow
Jinn-Ke Jan
Title
Cited by
Cited by
Year
An efficient and practical solution to remote authentication: smart card
HY Chien, JK Jan, YM Tseng
Computers & Security 21 (4), 372-375, 2002
6722002
A Practical (t,n) Multi-Secret Sharing Scheme
HY Chien, JK Jan, YM Tseng
IEICE transactions on fundamentals of electronics, communications and …, 2000
2512000
A security personal learning tools using a proxy blind signature scheme
WD Lin, JK Jan
Proceedings of International Conference on Chinese Language Computing, 273-277, 2000
2112000
A secure EHR system based on hybrid clouds
YY Chen, JC Lu, JK Jan
Journal of medical systems 36, 3375-3384, 2012
1662012
RSA-based partially blind signature with low computation
HY Chien, JK Jan, YM Tseng
Proceedings. Eighth International Conference on Parallel and Distributed …, 2001
1172001
A novel deployment of smart cold chain system using 2G-RFID-Sys
YY Chen, YJ Wang, JK Jan
Journal of Food Engineering 141, 113-121, 2014
832014
A modified remote login authentication scheme based on geometric approach
HY Chien, JK Jan, YM Tseng
Journal of Systems and Software 55 (3), 287-290, 2001
802001
Improved group signature scheme based on discrete logarithm problem
YM Tseng, JK Jan
Electronics Letters 35 (1), 37-38, 1999
801999
The design of a secure anonymous internet voting system
YY Chen, JK Jan, CL Chen
Computers & Security 23 (4), 330-337, 2004
772004
Digital signature with message recovery using self-certified public keys and its variants
YM Tseng, JK Jan, HY Chien
Applied Mathematics and Computation 136 (2-3), 203-214, 2003
772003
A novel ID-based group signature
YM Tseng, JK Jan
Information sciences 120 (1-4), 131-141, 1999
751999
Towards secure and efficient user authentication scheme using smart card for multi-server environments
TY Chen, CC Lee, MS Hwang, JK Jan
The Journal of Supercomputing 66, 1008-1032, 2013
732013
“Paramita wisdom” password authentication scheme without verification tables
JK Jan, YY Chen
Journal of Systems and Software 42 (1), 45-57, 1998
681998
A secure electronic voting protocol with IC cards
JK Jan, CC Tai
Journal of Systems and Software 39 (2), 93-101, 1997
611997
Attacks on threshold signature schemes with traceable signers
YM Tseng, JK Jan
Information Processing Letters 71 (1), 1-4, 1999
571999
New hierarchical assignment without public key cryptography
HY Chien, JK Jan
Computers & Security 22 (6), 523-526, 2003
562003
Robust and simple authentication protocol
HY Chien, JK Jan
The computer journal 46 (2), 193-201, 2003
562003
The design of protocol for e-voting on the Internet
JK Jan, YY Chen, Y Lin
Proceedings IEEE 35th Annual 2001 International Carnahan Conference on …, 2001
512001
A cocktail protocol with the authentication and key agreement on the UMTS
HH Ou, MS Hwang, JK Jan
Journal of Systems and Software 83 (2), 316-325, 2010
502010
ID-based cryptographic schemes using a non-interactive public-key distribution system
YM Tseng, JK Jan
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
481998
The system can't perform the operation now. Try again later.
Articles 1–20