Jinn-Ke Jan
Title
Cited by
Cited by
Year
An efficient and practical solution to remote authentication: smart card
HY Chien, JK Jan, YM Tseng
Computers & Security 21 (4), 372-375, 2002
6092002
A Practical (t,n) Multi-Secret Sharing Scheme
HY Chien, JK Jan, YM Tseng
IEICE transactions on fundamentals of electronics, communications and …, 2000
2192000
A security personal learning tools using a proxy blind signature scheme
WD Lin, JK Jan
Proceedings of International Conference on Chinese Language Computing, 273-277, 2000
1852000
A secure EHR system based on hybrid clouds
YY Chen, JC Lu, JK Jan
Journal of medical systems 36 (5), 3375-3384, 2012
1272012
RSA-based partially blind signature with low computation
HY Chien, JK Jan, YM Tseng
Proceedings. Eighth International Conference on Parallel and Distributed …, 2001
1062001
Improved group signature scheme based on discrete logarithm problem
YM Tseng, JK Jan
Electronics Letters 35 (1), 37-38, 1999
781999
A modified remote login authentication scheme based on geometric approach
HY Chien, JK Jan, YM Tseng
Journal of Systems and Software 55 (3), 287-290, 2001
762001
Digital signature with message recovery using self-certified public keys and its variants
YM Tseng, JK Jan, HY Chien
Applied Mathematics and Computation 136 (2-3), 203-214, 2003
722003
The design of a secure anonymous internet voting system
YY Chen, JK Jan, CL Chen
Computers & Security 23 (4), 330-337, 2004
712004
A novel ID-based group signature
YM Tseng, JK Jan
Information sciences 120 (1-4), 131-141, 1999
651999
“Paramita wisdom” password authentication scheme without verification tables
JK Jan, YY Chen
Journal of Systems and Software 42 (1), 45-57, 1998
651998
Towards secure and efficient user authentication scheme using smart card for multi-server environments
TY Chen, CC Lee, MS Hwang, JK Jan
The Journal of Supercomputing 66 (2), 1008-1032, 2013
612013
Robust and simple authentication protocol
HY Chien, JK Jan
The computer journal 46 (2), 193-201, 2003
532003
A secure electronic voting protocol with IC cards
JK Jan, CC Tai
Journal of Systems and Software 39 (2), 93-101, 1997
521997
Attacks on threshold signature schemes with traceable signers
YM Tseng, JK Jan
Information Processing Letters 71 (1), 1-4, 1999
511999
New hierarchical assignment without public key cryptography
HY Chien, JK Jan
Computers & Security 22 (6), 523-526, 2003
502003
ID-based cryptographic schemes using a non-interactive public-key distribution system
YM Tseng, JK Jan
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
471998
A cocktail protocol with the authentication and key agreement on the UMTS
HH Ou, MS Hwang, JK Jan
Journal of Systems and Software 83 (2), 316-325, 2010
452010
A novel deployment of smart cold chain system using 2G-RFID-Sys
YY Chen, YJ Wang, JK Jan
Journal of Food Engineering 141, 113-121, 2014
442014
Authenticated encryption schemes with message linkages for message flows
YM Tseng, JK Jan, HY Chien
Computers & Electrical Engineering 29 (1), 101-109, 2003
432003
The system can't perform the operation now. Try again later.
Articles 1–20