An efficient and practical solution to remote authentication: smart card HY Chien, JK Jan, YM Tseng Computers & Security 21 (4), 372-375, 2002 | 678 | 2002 |
A Practical (t,n) Multi-Secret Sharing Scheme HY Chien, JK Jan, YM Tseng IEICE transactions on fundamentals of electronics, communications and …, 2000 | 258 | 2000 |
A security personal learning tools using a proxy blind signature scheme WD Lin, JK Jan Proceedings of International Conference on Chinese Language Computing, 273-277, 2000 | 211 | 2000 |
A secure EHR system based on hybrid clouds YY Chen, JC Lu, JK Jan Journal of medical systems 36, 3375-3384, 2012 | 168 | 2012 |
RSA-based partially blind signature with low computation HY Chien, JK Jan, YM Tseng Proceedings. Eighth International Conference on Parallel and Distributed …, 2001 | 118 | 2001 |
A novel deployment of smart cold chain system using 2G-RFID-Sys YY Chen, YJ Wang, JK Jan Journal of Food Engineering 141, 113-121, 2014 | 85 | 2014 |
A modified remote login authentication scheme based on geometric approach HY Chien, JK Jan, YM Tseng Journal of Systems and Software 55 (3), 287-290, 2001 | 81 | 2001 |
Improved group signature scheme based on discrete logarithm problem Tseng, Jan Electronics Letters 35 (1), 37-38, 1999 | 80 | 1999 |
Digital signature with message recovery using self-certified public keys and its variants YM Tseng, JK Jan, HY Chien Applied Mathematics and Computation 136 (2-3), 203-214, 2003 | 79 | 2003 |
The design of a secure anonymous internet voting system YY Chen, JK Jan, CL Chen Computers & Security 23 (4), 330-337, 2004 | 76 | 2004 |
Towards secure and efficient user authentication scheme using smart card for multi-server environments TY Chen, CC Lee, MS Hwang, JK Jan The Journal of Supercomputing 66, 1008-1032, 2013 | 75 | 2013 |
A novel ID-based group signature YM Tseng, JK Jan Information sciences 120 (1-4), 131-141, 1999 | 75 | 1999 |
“Paramita wisdom” password authentication scheme without verification tables JK Jan, YY Chen Journal of Systems and Software 42 (1), 45-57, 1998 | 68 | 1998 |
A secure electronic voting protocol with IC cards JK Jan, CC Tai Journal of Systems and Software 39 (2), 93-101, 1997 | 61 | 1997 |
Robust and simple authentication protocol HY Chien, JK Jan The computer journal 46 (2), 193-201, 2003 | 58 | 2003 |
Attacks on threshold signature schemes with traceable signers YM Tseng, JK Jan Information Processing Letters 71 (1), 1-4, 1999 | 57 | 1999 |
New hierarchical assignment without public key cryptography HY Chien, JK Jan Computers & Security 22 (6), 523-526, 2003 | 56 | 2003 |
The design of protocol for e-voting on the Internet JK Jan, YY Chen, Y Lin Proceedings IEEE 35th Annual 2001 International Carnahan Conference on …, 2001 | 51 | 2001 |
A cocktail protocol with the authentication and key agreement on the UMTS HH Ou, MS Hwang, JK Jan Journal of Systems and Software 83 (2), 316-325, 2010 | 50 | 2010 |
ID-based cryptographic schemes using a non-interactive public-key distribution system YM Tseng, JK Jan Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998 | 49 | 1998 |