Jinn-Ke Jan
Cited by
Cited by
An efficient and practical solution to remote authentication: smart card
HY Chien, JK Jan, YM Tseng
Computers & Security 21 (4), 372-375, 2002
A Practical (t,n) Multi-Secret Sharing Scheme
HY Chien, JK Jan, YM Tseng
IEICE transactions on fundamentals of electronics, communications and …, 2000
A security personal learning tools using a proxy blind signature scheme
WD Lin, JK Jan
Proceedings of International Conference on Chinese Language Computing, 273-277, 2000
A secure EHR system based on hybrid clouds
YY Chen, JC Lu, JK Jan
Journal of medical systems 36 (5), 3375-3384, 2012
RSA-based partially blind signature with low computation
HY Chien, JK Jan, YM Tseng
Proceedings. Eighth International Conference on Parallel and Distributed …, 2001
Improved group signature scheme based on discrete logarithm problem
YM Tseng, JK Jan
Electronics Letters 35 (1), 37-38, 1999
A modified remote login authentication scheme based on geometric approach
HY Chien, JK Jan, YM Tseng
Journal of Systems and Software 55 (3), 287-290, 2001
The design of a secure anonymous internet voting system
YY Chen, JK Jan, CL Chen
Computers & Security 23 (4), 330-337, 2004
Digital signature with message recovery using self-certified public keys and its variants
YM Tseng, JK Jan, HY Chien
Applied Mathematics and Computation 136 (2-3), 203-214, 2003
Towards secure and efficient user authentication scheme using smart card for multi-server environments
TY Chen, CC Lee, MS Hwang, JK Jan
The Journal of Supercomputing 66 (2), 1008-1032, 2013
A novel ID-based group signature
YM Tseng, JK Jan
Information sciences 120 (1-4), 131-141, 1999
“Paramita wisdom” password authentication scheme without verification tables
JK Jan, YY Chen
Journal of Systems and Software 42 (1), 45-57, 1998
A secure electronic voting protocol with IC cards
JK Jan, CC Tai
Journal of Systems and Software 39 (2), 93-101, 1997
Robust and simple authentication protocol
HY Chien, JK Jan
The computer journal 46 (2), 193-201, 2003
New hierarchical assignment without public key cryptography
HY Chien, JK Jan
Computers & Security 22 (6), 523-526, 2003
A novel deployment of smart cold chain system using 2G-RFID-Sys
YY Chen, YJ Wang, JK Jan
Journal of Food Engineering 141, 113-121, 2014
Attacks on threshold signature schemes with traceable signers
YM Tseng, JK Jan
Information Processing Letters 71 (1), 1-4, 1999
A cocktail protocol with the authentication and key agreement on the UMTS
HH Ou, MS Hwang, JK Jan
Journal of Systems and Software 83 (2), 316-325, 2010
ID-based cryptographic schemes using a non-interactive public-key distribution system
YM Tseng, J Jan
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
Authenticated encryption schemes with message linkages for message flows
YM Tseng, JK Jan, HY Chien
Computers & Electrical Engineering 29 (1), 101-109, 2003
The system can't perform the operation now. Try again later.
Articles 1–20