Jinn-Ke Jan
TitleCited byYear
An efficient and practical solution to remote authentication: smart card
HY Chien, JK Jan, YM Tseng
Computers & Security 21 (4), 372-375, 2002
5942002
A Practical (t,n) Multi-Secret Sharing Scheme
HY Chien, JK Jan, YM Tseng
IEICE transactions on fundamentals of electronics, communications and …, 2000
2112000
A security personal learning tools using a proxy blind signature scheme
WD Lin, JK Jan
Proceedings of International Conference on Chinese Language Computing, 273-277, 2000
1832000
A secure EHR system based on hybrid clouds
YY Chen, JC Lu, JK Jan
Journal of medical systems 36 (5), 3375-3384, 2012
1082012
RSA-based partially blind signature with low computation
HY Chien, JK Jan, YM Tseng
Proceedings. Eighth International Conference on Parallel and Distributed …, 2001
1022001
Improved group signature scheme based on discrete logarithm problem
YM Tseng, JK Jan
Electronics Letters 35 (1), 37-38, 1999
781999
A modified remote login authentication scheme based on geometric approach
HY Chien, JK Jan, YM Tseng
Journal of Systems and Software 55 (3), 287-290, 2001
742001
Digital signature with message recovery using self-certified public keys and its variants
YM Tseng, JK Jan, HY Chien
Applied Mathematics and Computation 136 (2-3), 203-214, 2003
732003
The design of a secure anonymous internet voting system
YY Chen, JK Jan, CL Chen
Computers & Security 23 (4), 330-337, 2004
682004
“Paramita wisdom” password authentication scheme without verification tables
JK Jan, YY Chen
Journal of Systems and Software 42 (1), 45-57, 1998
651998
A novel ID-based group signature
YM Tseng, JK Jan
Information sciences 120 (1-4), 131-141, 1999
631999
Towards secure and efficient user authentication scheme using smart card for multi-server environments
TY Chen, CC Lee, MS Hwang, JK Jan
The Journal of Supercomputing 66 (2), 1008-1032, 2013
542013
Robust and simple authentication protocol
HY Chien, JK Jan
The computer journal 46 (2), 193-201, 2003
532003
Attacks on threshold signature schemes with traceable signers
YM Tseng, JK Jan
Information Processing Letters 71 (1), 1-4, 1999
501999
A secure electronic voting protocol with IC cards
JK Jan, CC Tai
Journal of Systems and Software 39 (2), 93-101, 1997
501997
New hierarchical assignment without public key cryptography
HY Chien, JK Jan
Computers & Security 22 (6), 523-526, 2003
482003
ID-based cryptographic schemes using a non-interactive public-key distribution system
YM Tseng, JK Jan
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
461998
A novel deployment of smart cold chain system using 2G-RFID-Sys
YY Chen, YJ Wang, JK Jan
Journal of Food Engineering 141, 113-121, 2014
422014
A cocktail protocol with the authentication and key agreement on the UMTS
HH Ou, MS Hwang, JK Jan
Journal of Systems and Software 83 (2), 316-325, 2010
422010
Authenticated encryption schemes with message linkages for message flows
YM Tseng, JK Jan, HY Chien
Computers & Electrical Engineering 29 (1), 101-109, 2003
422003
The system can't perform the operation now. Try again later.
Articles 1–20