A secure control protocol for USB mass storage devices FY Yang, TD Wu, SH Chiu IEEE Transactions on Consumer Electronics 56 (4), 2239-2343, 2010 | 40 | 2010 |
Improvement on a Trapdoor Hash Function. FY Yang Int. J. Netw. Secur. 9 (1), 17-21, 2009 | 23 | 2009 |
A novel e-cash payment protocol using trapdoor hash function on smart mobile devices JS Wang, FY Yang, I Paik International Journal of Computer Science and Network Security 11 (6), 12-19, 2011 | 22 | 2011 |
A provably secure and efficient strong designated verifier signature scheme FY Yang, CM Liao International Journal of Network Security 10 (3), 220-224, 2010 | 22 | 2010 |
Mobile Banking Payment System. FY Yang, ZW Liu, SH Chiu J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2 (3), 85-95, 2011 | 11 | 2011 |
Cryptanalysis of log-in authentication based on circle property FY Yang, JK Jan IEEE Transactions on Consumer Electronics 50 (2), 625-628, 2004 | 11 | 2004 |
Improving an efficient ID-based RSA multisignature FY Yang, JH Lo, CM Liao Journal of Ambient Intelligence and Humanized Computing 4, 249-254, 2013 | 9 | 2013 |
Improvement of an efficient ID-based RSA multisignature FY Yang, JH Lo, CM Liao 2010 International Conference on Complex, Intelligent and Software Intensive …, 2010 | 9 | 2010 |
Efficient trapdoor hash function for digital signatures FY Yang Chaoyang Journal 12, 351-357, 2007 | 9 | 2007 |
An enhanced and secure protocol for authenticated key exchange FY Yang, JK Jan Cryptology ePrint Archive, 2004 | 9 | 2004 |
A proxy partially blind signature scheme with proxy revocation FY Yang, LR Liang Journal of Ambient Intelligence and Humanized Computing 4, 255-263, 2013 | 8 | 2013 |
Password authentication scheme preserving identity privacy FY Yang, CW Hsu, SH Chiu 2014 Sixth International Conference on Measuring Technology and Mechatronics …, 2014 | 7 | 2014 |
Cryptanalysis of a threshold proxy signature scheme with known signers FY Yang, JK Jan, WJ Jeng | 7 | |
A Provably Secure Scheme for Restrictive Partially Blind Signatures. FY Yang, JK Jan IACR Cryptol. ePrint Arch. 2004, 37, 2004 | 6 | 2004 |
Improvements in Dynamic ID-based Remote User Authentication Schemes FY Yang, Y Li, SH Chiu, CS Jiang International Journal of Advancements in Computing Technology 4 (9), 240-247, 2012 | 5 | 2012 |
An electronic check system with efficient online computational ability FY Yang, ZW Liu, SH Chiu Journal of Convergence Information Technology (JCIT) 6 (12), 210-219, 2011 | 5 | 2011 |
A novel mutual authentication scheme for USB storage devices FY Yang, TD Wu, SH Chiu Proceedings of the 11th International Conference on Information Integration …, 2009 | 5 | 2009 |
Security analysis Zhang-Wang signature scheme without using one-way hash functions FY Yang, MH Hsu International Conference on Accounting and Information Technology, 2008 | 5 | 2008 |
A provable secure scheme for partially blind signatures FY Yang, JK Jan Cryptology ePrint Archive, 2004 | 5 | 2004 |
A Secure Scheme for Restrictive Partially Blind Signatures. FY Yang, JK Jan iiWAS, 2004 | 5 | 2004 |