default search action
Chun-I Fan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j67]Chun-I Fan, Arijit Karati, Shou-Li Wu:
A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions. IEEE Trans. Dependable Secur. Comput. 21(4): 2766-2778 (2024) - 2023
- [j66]Chun-I Fan, Hsin-Nan Kuo, Yung-Sheng Tu, Yuan-Chi Chei, Chu-Chia Chuang, Yu-Chun Tseng, Arijit Karati:
A Secure Cloud Gaming System. J. Inf. Sci. Eng. 39(3): 473-487 (2023) - [j65]Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang:
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT. ACM Trans. Sens. Networks 19(3): 61:1-61:21 (2023) - [c49]Chun-I Fan, Jun-Huei Wang, Cheng-Han Shie, Yu-Lung Tsai:
Software-Defined Networking Integrated with Cloud Native and Proxy Mechanism: Detection and Mitigation System for TCP SYN Flooding Attack. IMCOM 2023: 1-8 - 2022
- [j64]Er-Shuo Zhuang, Chun-I Fan, I-Hua Kuo:
Multiauthority Attribute-Based Encryption With Dynamic Membership From Lattices. IEEE Access 10: 58254-58267 (2022) - [j63]Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu:
Fast keyword search over encrypted data with short ciphertext in clouds. J. Inf. Secur. Appl. 70: 103320 (2022) - [j62]Arijit Karati, Chun-I Fan, Er-Shuo Zhuang:
Reliable Data Sharing by Certificateless Encryption Supporting Keyword Search Against Vulnerable KGC in Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(6): 3661-3669 (2022) - [j61]Chun-I Fan, Ya-Wen Hsu, Cheng-Han Shie, Yi-Fan Tseng:
ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning. ACM Trans. Sens. Networks 18(4): 55:1-55:25 (2022) - [c48]Dingyi Pei, Koji Nakao, Heung Youl Youm, Chun-I Fan:
Message from the General Co-Chairs: AsiaJCIS 2022. AsiaJCIS 2022: vii - [c47]Chun-I Fan, Yen-Lin Lai, Cheng-Han Shie:
Clustering-Based Network Intrusion Detection System. DSC 2022: 1-8 - [c46]Chun-I Fan, Cheng-Han Shie, Che-Ming Hsu, Tao Ban, Tomohiro Morikawa, Takeshi Takahashi:
IoT Botnet Detection Based on the Behaviors of DNS Queries. DSC 2022: 1-7 - 2021
- [j60]Chun-I Fan, Arijit Karati, Pei-Shan Yang:
Reliable file transfer protocol with producer anonymity for Named Data Networking. J. Inf. Secur. Appl. 59: 102851 (2021) - [j59]Yi-Fan Tseng, Chun-I Fan:
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model. Secur. Commun. Networks 2021: 5519721:1-5519721:11 (2021) - [j58]Chun-I Fan, Jheng-Jia Huang, Shang-Wei Tseng, I-Te Chen:
Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery. IEEE Trans. Cloud Comput. 9(2): 546-561 (2021) - [j57]Chun-I Fan, Yu-Tse Shih, Jheng-Jia Huang, Wan-Ru Chiu:
Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System. IEEE Trans. Netw. Serv. Manag. 18(1): 701-712 (2021) - [c45]Chun-I Fan, Yi-Fan Tseng, Cheng-Chun Feng:
CCA-Secure Attribute-Based Encryption Supporting Dynamic Membership in the Standard Model. DSC 2021: 1-8 - [c44]Chun-I Fan, Kai-Yuan Zheng, Yu-Tse Shih, Er-Shuo Zhuang, Jheng-Jia Huang:
An Efficient Secure Handover Scheme Supporting Cross-Network Slicing for Multi-Operator Environments. ICMU 2021: 1-7 - [e2]Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 [contents] - [i5]Yi-Fan Tseng, Chun-I Fan, Zi-Cheng Liu:
Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds. IACR Cryptol. ePrint Arch. 2021: 974 (2021) - [i4]Chun-I Fan, Cheng-Han Shie, Yi-Fan Tseng, Hui-Chun Huang:
An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for Message Queueing Telemetry Transport. IACR Cryptol. ePrint Arch. 2021: 1057 (2021) - 2020
- [j56]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks. Int. J. Inf. Sec. 19(3): 245-255 (2020) - [j55]Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, Jemin Lee:
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications. IEEE Trans. Inf. Forensics Secur. 15: 927-942 (2020) - [c43]Chun-I Fan, Yi-Fan Tseng, Yen-Lin Huang:
Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map. AsiaJCIS 2020: 9-15 - [c42]Ruei-Hau Hsu, Yi-Cheng Wang, Chun-I Fan, Bo Sun, Tao Ban, Takeshi Takahashi, Ting-Wei Wu, Shang-Wei Kao:
A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing. AsiaJCIS 2020: 128-136 - [c41]Jheng-Jia Huang, Chun-I Fan, Yu-Chen Hsu, Arijit Karati:
A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments. SSCC 2020: 92-106
2010 – 2019
- 2019
- [j54]Yi-Fan Tseng, Chun-I Fan, Cheng-Wei Sung:
On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki-Okamoto Transformation. Int. J. Found. Comput. Sci. 30(4): 493-509 (2019) - [j53]Arijit Karati, Chun-I Fan, Ruei-Hau Hsu:
Provably Secure and Generalized Signcryption With Public Verifiability for Secure Data Transmission Between Resource-Constrained IoT Devices. IEEE Internet Things J. 6(6): 10431-10440 (2019) - [j52]Yi-Fan Tseng, Chun-I Fan, Chih-Wen Lin:
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption. J. Univers. Comput. Sci. 25(3): 182-202 (2019) - [j51]Yi-Fan Tseng, Chun-I Fan, Ching-Wen Chen:
Top-Level Secure Certificateless Signature Scheme in the Standard Model. IEEE Syst. J. 13(3): 2763-2774 (2019) - [j50]Yi-Ning Liu, Wei Guo, Chun-I Fan, Liang Chang, Chi Cheng:
A Practical Privacy-Preserving Data Aggregation (3PDA) Scheme for Smart Grid. IEEE Trans. Ind. Informatics 15(3): 1767-1774 (2019) - [j49]Yi-Fan Tseng, Chun-I Fan, Chin-Yu Wu:
FGAC-NDN: Fine-Grained Access Control for Named Data Networks. IEEE Trans. Netw. Serv. Manag. 16(1): 143-152 (2019) - 2018
- [j48]Yu-Lun Chuang, Chun-I Fan, Yi-Fan Tseng:
An Efficient Algorithm for the Shortest Vector Problem. IEEE Access 6: 61478-61487 (2018) - [j47]Yi-Fan Tseng, Chun-I Fan, Yan-Fu Cho:
An authenticated re-encryption scheme for secure file transfer in named data networks. Int. J. Commun. Syst. 31(11) (2018) - [j46]Chien-Nan Wu, Chun-I Fan, Jheng-Jia Huang, Yi-Fan Tseng, Hiroaki Kikuchi:
Probably Secure Efficient Anonymous Credential Scheme. Int. J. Softw. Innov. 6(3): 18-35 (2018) - [j45]Yi-Hui Lin, Jheng-Jia Huang, Chun-I Fan, Wen-Tsuen Chen:
Local Authentication and Access Control Scheme in M2M Communications With Computation Offloading. IEEE Internet Things J. 5(4): 3209-3219 (2018) - [j44]Hiroaki Kikuchi, Chika Hamanaga, Hideo Yasunaga, Hiroki Matsui, Hideki Hashimoto, Chun-I Fan:
Privacy-Preserving Multiple Linear Regression of Vertically Partitioned Real Medical Datasets. J. Inf. Process. 26: 638-647 (2018) - [j43]Yi-Fan Tseng, Chun-I Fan:
Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption. J. Inf. Sci. Eng. 34(6): 1517-1541 (2018) - [j42]Chun-I Fan, I-Te Chen, Chen-Kai Cheng, Jheng-Jia Huang, Wen-Tsuen Chen:
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers. IEEE Syst. J. 12(1): 473-484 (2018) - [c40]Xuping Huang, Hiroaki Kikuchi, Chun-I Fan:
Privacy Preserved Spectral Analysis Using IoT mHealth Biomedical Data for Stress Estimation. AINA 2018: 793-800 - [c39]Chun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, Jheng-Jia Huang:
Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem. AsiaJCIS 2018: 35-41 - [c38]Wei-Hao Chen, Chun-I Fan, Yi-Fan Tseng:
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds. DSC 2018: 1-4 - [c37]Chun-I Fan, Yi-Fan Tseng, Hui-Po Su, Ruei-Hau Hsu, Hiroaki Kikuchi:
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks. DSC 2018: 1-8 - [c36]Ruei-Hau Hsu, Chun-I Fan, Tony Q. S. Quek, Jemin Lee:
CORE: Cooperative Encryption with its Applications to Controllable Security Services. DSC 2018: 1-8 - [c35]Kodai Nagata, Hiroaki Kikuchi, Chun-I Fan:
Risk of Bitcoin Addresses to be Identified from Features of Output Addresses. DSC 2018: 1-6 - [c34]Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Yen-Hao Chen, Hsin-Nan Kuo:
Verifiable Privacy-Preserving Payment Mechanism for Smart Grids. IDCS 2018: 52-63 - [c33]Arijit Karati, Chun-I Fan, Ruei-Hau Hsu:
Enhancement of FTP-NDN Supporting Nondesignated Receivers. ICS 2018: 590-598 - [i3]Chun-I Fan, Jheng-Jia Huang, Min-Zhe Zhong, Ruei-Hau Hsu, Wen-Tsuen Chen, Jemin Lee:
ReHand: Secure Region-based Fast Handover with User Anonymity for Small Cell Networks in 5G. CoRR abs/1806.03406 (2018) - 2017
- [j41]Huige Li, Fangguo Zhang, Chun-I Fan:
Deniable Searchable Symmetric Encryption. Inf. Sci. 402: 233-243 (2017) - [j40]Chun-I Fan, Jun-Cheng Chen, Shi-Yuan Huang, Jheng-Jia Huang, Wen-Tsuen Chen:
Provably Secure Timed-Release Proxy Conditional Reencryption. IEEE Syst. J. 11(4): 2291-2302 (2017) - [j39]Chun-I Fan, Yi-Fan Tseng, Jheng-Jia Huang, Shih-Fen Chen, Hiroaki Kikuchi:
Multireceiver Predicate Encryption for Online Social Networks. IEEE Trans. Signal Inf. Process. over Networks 3(2): 388-403 (2017) - [c32]Yi-Fan Tseng, Chun-I Fan, Ting-Chuan Kung, Jheng-Jia Huang, Hsin-Nan Kuo:
Homomorphic encryption supporting logical operations. ICTCE 2017: 66-69 - [i2]Chun-I Fan, Yi-Fan Tseng, Chih-Wen Lin:
Attribute-Based Encryption from Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2017: 219 (2017) - 2016
- [j38]Shi-Yuan Huang, Chun-I Fan, Yi-Fan Tseng:
Enabled/disabled predicate encryption in clouds. Future Gener. Comput. Syst. 62: 148-160 (2016) - [j37]Chun-I Fan, Yu-Kuang Liang, Chien-Nan Wu:
Privacy enhancement for fair PayWord-based micropayment. Secur. Commun. Networks 9(5): 380-388 (2016) - [c31]Hiroaki Kikuchi, Hideo Yasunaga, Hiroki Matsui, Chun-I Fan:
Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares. AsiaJCIS 2016: 48-54 - [c30]Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi:
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments. ICITCS 2016: 1-5 - [c29]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan, Yi-Fan Tseng, Hiroaki Kikuchi:
Lightweight Authentication Scheme with Dynamic Group Members in IoT Environments. MobiQuitous (Adjunct Proceedings) 2016: 88-93 - 2015
- [j36]Yu-Chi Chen, Raylin Tso, Gwoboa Horng, Chun-I Fan, Ruei-Hau Hsu:
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes. J. Inf. Sci. Eng. 31(1): 297-314 (2015) - [j35]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture. J. Inf. Sci. Eng. 31(6): 1975-1992 (2015) - [j34]Chun-I Fan, Yi-Fan Tseng:
Anonymous Multi-Receiver Identity-Based Authenticated Encryption with CCA Security. Symmetry 7(4): 1856-1881 (2015) - [c28]Chun-I Fan, Shi-Yuan Huang, Wen-Che Hsu:
Encrypted Data Deduplication in Cloud Storage. AsiaJCIS 2015: 18-25 - [c27]Chun-I Fan, Chien-Nan Wu, Chun-Hung Chen, Yi-Fan Tseng, Cheng-Chun Feng:
Attribute-Based Proxy Re-encryption with Dynamic Membership. AsiaJCIS 2015: 26-32 - [c26]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments. AsiaJCIS 2015: 91-96 - [c25]Chun-I Fan, Han-Wei Hsiao, Chun-Han Chou, Yi-Fan Tseng:
Malware Detection Systems Based on API Log Data Mining. COMPSAC Workshops 2015: 255-260 - 2014
- [j33]Chun-I Fan, Vincent Shi-Ming Huang, He-Ming Ruan:
Arbitrary-State Attribute-Based Encryption with Dynamic Membership. IEEE Trans. Computers 63(8): 1951-1961 (2014) - [j32]Chun-I Fan, Ming-Te Chen, Yu-Kuang Liang, Long-Sian Chen:
Truly Anonymous Paper Submission and Review Scheme. Trans. Data Priv. 7(3): 283-308 (2014) - [j31]Chun-I Fan, Shi-Yuan Huang, Yih-Loong Lai:
Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid. IEEE Trans. Ind. Informatics 10(1): 666-675 (2014) - [c24]Chun-I Fan, Wei-Zhe Sun, Shih-Wei Huang, Wen-Shenq Juang, Jheng-Jia Huang:
Strongly Privacy-Preserving Communication Protocol for VANETs. AsiaJCIS 2014: 119-126 - [c23]Chun-I Fan, Chien-Nan Wu, Jen-Chun Hsu, Yi-Fan Tseng, Wen-Tsuen Chen:
Anonymous Credential Scheme Supporting Active Revocation. AsiaJCIS 2014: 127-132 - [c22]Jheng-Jia Huang, Wen-Shenq Juang, Chun-I Fan:
An Efficient Authentication and Service Key Agreement Scheme in IOT Environments. ICS 2014: 715-723 - 2013
- [j30]Chun-I Fan, Shi-Yuan Huang:
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage. Future Gener. Comput. Syst. 29(7): 1716-1724 (2013) - [j29]Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng, Chun-I Fan:
An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Trans. Internet Inf. Syst. 7(1): 119-131 (2013) - [j28]Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun, Wei-Kuei Chen:
Multi-recastable e-bidding game with dual-blindness. Math. Comput. Model. 58(1-2): 68-78 (2013) - [j27]Chun-I Fan, Vincent Shi-Ming Huang, Yao-Chun Yu:
User efficient recoverable off-line e-cash scheme with fast anonymity revoking. Math. Comput. Model. 58(1-2): 227-237 (2013) - [j26]Chun-I Fan, Shi-Yuan Huang, William Artan:
Design and implementation of privacy preserving billing protocol for smart grid. J. Supercomput. 66(2): 841-862 (2013) - [j25]Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu:
Complete EAP Method: User Efficient and Forward Secure Authentication Protocol for IEEE 802.11 Wireless LANs. IEEE Trans. Parallel Distributed Syst. 24(4): 672-680 (2013) - [c21]Chun-I Fan, Pei-Hsiu Ho, Jheng-Jia Huang, Yi-Fan Tseng:
Secure Certificateless Signature Scheme Supporting Batch Verification. AsiaJCIS 2013: 8-11 - [c20]Chi-Yao Weng, Cheng-Hsing Yang, Chun-I Fan, Kuan-Liang Liu, Hung-Min Sun:
Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality. AsiaJCIS 2013: 102-107 - [c19]Chun-I Fan, Pei-Jen Tsai, Jheng-Jia Huang, Wen-Tsuen Chen:
Anonymous Multi-receiver Certificate-Based Encryption. CyberC 2013: 19-26 - [c18]Chun-I Fan, Chien-Nan Wu, Chi-Yao Weng, Chung-Yu Lin:
Active One-Time Password Mechanism for User Authentication. GPC 2013: 464-471 - [e1]Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martínez Pérez:
Security in Computing and Communications - International Symposium, SSCC 2013, Mysore, India, August 22-24, 2013. Proceedings. Communications in Computer and Information Science 377, Springer 2013, ISBN 978-3-642-40575-4 [contents] - 2012
- [j24]Chun-I Fan, Chien-Nan Wu, Wei-Kuei Chen, Wei-Zhe Sun:
Attribute-based strong designated-verifier signature scheme. J. Syst. Softw. 85(4): 944-959 (2012) - [j23]Chun-I Fan, Ruei-Hau Hsu, Wei-Kuei Chen:
Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme. Secur. Commun. Networks 5(5): 462-478 (2012) - [c17]Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. ICUIMC 2012: 17:1-17:7 - 2011
- [j22]Chi-Yuan Chen, Han-Chieh Chao, Tin Yu Wu, Chun-I Fan, Jiann-Liang Chen, Yuh-Shyan Chen, Jenq-Muh Hsu:
IoT-IMS Communication Platform for Future Internet. Int. J. Adapt. Resilient Auton. Syst. 2(4): 74-94 (2011) - [j21]Chun-I Fan, Ruei-Hau Hsu, Pei-Hsiu Ho:
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings. J. Inf. Sci. Eng. 27(3): 969-982 (2011) - [c16]Chun-I Fan, Ruei-Hau Hsu, Mark Manulis:
Group Signature with Constant Revocation Costs for Signers and Verifiers. CANS 2011: 214-233 - [c15]Chun-I Fan, Shi-Yuan Huang:
Controllable Privacy Preserving Search Based on Symmetric Predicate Encryption in Cloud Storage. CyberC 2011: 269-273 - 2010
- [j20]Chun-I Fan, Wei-Zhe Sun, Vincent Shi-Ming Huang:
Provably secure randomized blind signature scheme based on bilinear pairing. Comput. Math. Appl. 60(2): 285-293 (2010) - [j19]Chun-I Fan, Ling-Ying Huang, Pei-Hsiu Ho:
Anonymous Multireceiver Identity-Based Encryption. IEEE Trans. Computers 59(9): 1239-1249 (2010) - [j18]Chun-I Fan, Pei-Hsiu Ho, Ruei-Hau Hsu:
Provably Secure Nested One-Time Secret Mechanisms for Fast Mutual Authentication and Key Exchange in Mobile Communications. IEEE/ACM Trans. Netw. 18(3): 996-1009 (2010) - [j17]Chun-I Fan, Vincent Shi-Ming Huang:
Provably Secure Integrated On/Off-Line Electronic Cash for Flexible and Efficient Payment. IEEE Trans. Syst. Man Cybern. Part C 40(5): 567-579 (2010)
2000 – 2009
- 2009
- [j16]Chun-I Fan, D. J. Guan, Chih-I Wang, Dai-Rui Lin:
Cryptanalysis of Lee-Hwang-Yang blind signature scheme. Comput. Stand. Interfaces 31(2): 319-320 (2009) - [j15]Chun-I Fan, Ming-Te Chen, Wei-Zhe Sun:
Buyer-seller watermarking protocols with off-line trusted third parties. Int. J. Ad Hoc Ubiquitous Comput. 4(1): 36-43 (2009) - [j14]Chun-I Fan, Shi-Yuan Huang, Pei-Hsiu Ho, Chin-Laung Lei:
Fair anonymous rewarding based on electronic cash. J. Syst. Softw. 82(7): 1168-1176 (2009) - [j13]Chun-I Fan, Yi-Hui Lin:
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans. Inf. Forensics Secur. 4(4): 933-945 (2009) - [c14]Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen:
Truly Anonymous Paper Submission and Review Scheme. ARES 2009: 960-965 - 2008
- [j12]Chun-I Fan, Yu-Kuang Liang:
Anonymous Fair Transaction Protocols Based on Electronic Cash. Int. J. Electron. Commer. 13(1): 131-151 (2008) - [j11]Chun-I Fan, Wei-Zhe Sun:
An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Math. Comput. Model. 48(9-10): 1611-1627 (2008) - [c13]Chun-I Fan, Chien-Nan Wu, Wei-Zhe Sun:
Multi-recastable E-Bidding Scheme. ISDA (3) 2008: 462-466 - [c12]Chun-I Fan, Ruei-Hau Hsu, Chun-Hao Tseng:
Pairing-based message authentication scheme with privacy protection in vehicular ad hoc networks. Mobility Conference 2008: 82 - 2007
- [j10]Chun-I Fan, Bo-Wei Lin, Vincent Shi-Ming Huang:
Customer Efficient Electronic Cash Protocols. J. Organ. Comput. Electron. Commer. 17(3): 259-281 (2007) - [c11]Chun-I Fan, Vincent Shi-Ming Huang:
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. IWSEC 2007: 412-427 - [c10]Chun-I Fan, Ming-Te Chen, Wei-Zhe Sun:
Buyer-Seller Watermarking Protocols with Off-line Trusted Parties. MUE 2007: 1035-1040 - [c9]Chun-I Fan, Pei-Hsiu Ho, Hsin-Yu Chen:
Nested One-Time Secret Mechanisms for Fast Mutual Authentication in Mobile Communications. WCNC 2007: 2714-2719 - 2006
- [j9]Chun-I Fan:
Ownership-attached unblinding of blind signatures for untraceable electronic cash, . Inf. Sci. 176(3): 263-284 (2006) - [c8]Chun-I Fan, Yi-Hui Lin, Ruei-Hau Hsu:
Remote Password Authentication Scheme with Smart Cards and Biometrics. GLOBECOM 2006 - [c7]Chun-I Fan, Wei-Zhe Sun:
Uncoercible Anonymous Electronic Voting. JCIS 2006 - [c6]Chun-I Fan, Yu-Kuang Liang, Bo-Wei Lin:
Fair Transaction Protocols Based on Electronic Cash. PDCAT 2006: 383-388 - 2005
- [j8]Chun-I Fan, Yung-Cheng Chan, Zhi-Kai Zhang:
Robust remote authentication scheme with smart cards. Comput. Secur. 24(8): 619-628 (2005) - [i1]Chih-I Wang, Chun-I Fan, D. J. Guan:
Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol. IACR Cryptol. ePrint Arch. 2005: 182 (2005) - 2003
- [j7]Chun-I Fan:
Improved low-computation partially blind signatures. Appl. Math. Comput. 145(2-3): 853-867 (2003) - [j6]Chun-I Fan:
Comments on Hwang-Lee-Lai Attack upon Fan-Lei Partially Blind Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(7): 1900-1901 (2003) - 2002
- [j5]Chun-I Fan, Chin-Laung Lei:
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. J. Inf. Sci. Eng. 18(1): 47-58 (2002) - [j4]Chun-I Fan, Chin-Laung Lei:
An unlinkably divisible and intention attachable ticket scheme for runoff elections. J. Netw. Comput. Appl. 25(2): 93-107 (2002) - 2001
- [j3]Chun-I Fan, Wei-Kuei Chen:
An Efficient Blind Signature Scheme for Information Hiding. Int. J. Electron. Commer. 6(1): 93-100 (2001) - 2000
- [j2]Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
Date attachable electronic cash. Comput. Commun. 23(4): 425-428 (2000) - [j1]Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
Randomization enhanced Chaum's blind signature scheme. Comput. Commun. 23(17): 1677-1680 (2000) - [c5]Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
A Randomization Enhanced Scheme for Chaum's Blind Signature. ICDCS Workshop on Internet 2000: A5-A8 - [c4]Chun-I Fan, Wei-Kuei Chen:
An Anonymous Electronic Voting Protocol with the Latest Decision on Voters' Intentions. ICDCS Workshop on Internet 2000: A9-A12
1990 – 1999
- 1999
- [c3]Chun-I Fan, Wei-Kuen Chen, Yi-Shiung Yeh:
Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash. ICEIS 1999: 612-618 - 1997
- [c2]Chun-I Fan, Chin-Laung Lei:
Secure Rewarding Schemes. HICSS (3) 1997: 571-580 - 1996
- [c1]Chun-I Fan, Chin-Laung Lei:
A Multi-Recastable Ticket Scheme for Electronic Elections. ASIACRYPT 1996: 116-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint