Jinn-Ke Jan
Cited by
Cited by
An efficient and practical solution to remote authentication: smart card
HY Chien, JK Jan, YM Tseng
Computers & Security 21 (4), 372-375, 2002
A Practical (t,n) Multi-Secret Sharing Scheme
HY Chien, JK Jan, YM Tseng
IEICE transactions on fundamentals of electronics, communications and …, 2000
A security personal learning tools using a proxy blind signature scheme
WD Lin, JK Jan
Proceedings of International Conference on Chinese Language Computing, 273-277, 2000
A secure EHR system based on hybrid clouds
YY Chen, JC Lu, JK Jan
Journal of medical systems 36, 3375-3384, 2012
RSA-based partially blind signature with low computation
HY Chien, JK Jan, YM Tseng
Proceedings. Eighth International Conference on Parallel and Distributed …, 2001
A novel deployment of smart cold chain system using 2G-RFID-Sys
YY Chen, YJ Wang, JK Jan
Journal of Food Engineering 141, 113-121, 2014
A modified remote login authentication scheme based on geometric approach
HY Chien, JK Jan, YM Tseng
Journal of Systems and Software 55 (3), 287-290, 2001
Improved group signature scheme based on discrete logarithm problem
YM Tseng, JK Jan
Electronics Letters 35 (1), 37-38, 1999
Digital signature with message recovery using self-certified public keys and its variants
YM Tseng, JK Jan, HY Chien
Applied Mathematics and Computation 136 (2-3), 203-214, 2003
The design of a secure anonymous internet voting system
YY Chen, JK Jan, CL Chen
Computers & Security 23 (4), 330-337, 2004
Towards secure and efficient user authentication scheme using smart card for multi-server environments
TY Chen, CC Lee, MS Hwang, JK Jan
The Journal of Supercomputing 66, 1008-1032, 2013
A novel ID-based group signature
YM Tseng, JK Jan
Information sciences 120 (1-4), 131-141, 1999
“Paramita wisdom” password authentication scheme without verification tables
JK Jan, YY Chen
Journal of Systems and Software 42 (1), 45-57, 1998
A secure electronic voting protocol with IC cards
JK Jan, CC Tai
Journal of Systems and Software 39 (2), 93-101, 1997
Robust and simple authentication protocol
HY Chien, JK Jan
The computer journal 46 (2), 193-201, 2003
Attacks on threshold signature schemes with traceable signers
YM Tseng, JK Jan
Information Processing Letters 71 (1), 1-4, 1999
New hierarchical assignment without public key cryptography
HY Chien, JK Jan
Computers & Security 22 (6), 523-526, 2003
The design of protocol for e-voting on the Internet
JK Jan, YY Chen, Y Lin
Proceedings IEEE 35th Annual 2001 International Carnahan Conference on …, 2001
A cocktail protocol with the authentication and key agreement on the UMTS
HH Ou, MS Hwang, JK Jan
Journal of Systems and Software 83 (2), 316-325, 2010
ID-based cryptographic schemes using a non-interactive public-key distribution system
YM Tseng, JK Jan
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
The system can't perform the operation now. Try again later.
Articles 1–20