default search action
Yalin Chen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c8]Lili Li, Bin Jiang, Yalin Chen:
Asynchronous Finite-time Output Regulation for Switched Systems with Unstable Switching Dynamics via Hybrid Adaptive Event-triggered Mechanism under Mixed Data Injection Attacks. ASCC 2022: 1920-1925 - 2021
- [j12]Hongyan Gu, Cancan Jin, Huayan Yuan, Yalin Chen:
Design and Implementation of Attitude and Heading Reference System with Extended Kalman Filter Based on MEMS Multi-Sensor Fusion. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 29(Suppl-1): 157-180 (2021) - [j11]Jamie Campbell, Yalin Chen, Maham Azhar:
Not toeing the number line for simple arithmetic: Two large-n conceptual replications of Mathieu et al. (Cognition, 2016, Experiment 1). J. Numer. Cogn. 7(3): 248-258 (2021) - 2020
- [c7]Yalin Chen, Zhijun Li, Bin Dong, Shuangyang Zuo:
Sliding Mode Control of Truss Bridge Structure with GMMAs. CIS 2020: 126-130
2010 – 2019
- 2019
- [i38]Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou:
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography. IACR Cryptol. ePrint Arch. 2019: 24 (2019) - [i37]Yalin Chen, Jue-Sam Chou, Liangchun Wang, Yu-Yuan Chou:
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography. IACR Cryptol. ePrint Arch. 2019: 785 (2019) - [i36]Yalin Chen, Chang Hsiang, Liangchun Wang, Yu-Yuan Chou, Jue-Sam Chou:
A Diffie-Hellman quantum session key establishment protocol without entanglement. IACR Cryptol. ePrint Arch. 2019: 1118 (2019) - 2018
- [j10]Josh Neudorf, Yalin Chen, Jamie Campbell:
Retrieval Priming in Product Verification: Evidence From Retrieval-Induced Forgetting. J. Numer. Cogn. 4(3): 572-589 (2018) - [c6]Yalin Chen, Zhiyang Li, Jia Shi, Zhaobin Liu, Wenyu Qu:
Stacked K-Means Hashing Quantization for Nearest Neighbor Search. BigMM 2018: 1-4 - 2017
- [c5]Jamie Campbell, Yalin Chen:
No Tranfer of Training in Simple Addition. CogSci 2017 - 2016
- [j9]Jingrui Zhang, Qinghui Tang, Po Li, Daxiang Deng, Yalin Chen:
A modified MOEA/D approach to the solution of multi-objective optimal power flow problem. Appl. Soft Comput. 47: 494-514 (2016) - [i35]Yalin Chen, Jue-Sam Chou, Hung-Shen Wu:
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. IACR Cryptol. ePrint Arch. 2016: 1 (2016) - [i34]Yalin Chen, Jue-Sam Chou, I-Ching Liao:
Improved on an improved remote user authentication scheme with key agreement. IACR Cryptol. ePrint Arch. 2016: 23 (2016) - 2015
- [j8]Yalin Chen, Jue-Sam Chou:
ECC-based untraceable authentication for large-scale active-tag RFID systems. Electron. Commer. Res. 15(1): 97-120 (2015) - [j7]Yalin Chen, Jue-Sam Chou:
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking". Int. J. Netw. Secur. 17(6): 708-711 (2015) - 2014
- [i33]Yalin Chen, Jue-Sam Chou:
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks. IACR Cryptol. ePrint Arch. 2014: 1 (2014) - [i32]Yalin Chen, Jue-Sam Chou:
Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking". IACR Cryptol. ePrint Arch. 2014: 46 (2014) - [i31]Yalin Chen, Jue-Sam Chou:
Cryptanalysis on "Secure untraceable off-line electronic cash system". IACR Cryptol. ePrint Arch. 2014: 63 (2014) - [i30]Yalin Chen, Jue-Sam Chou:
Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage". IACR Cryptol. ePrint Arch. 2014: 723 (2014) - 2013
- [i29]Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai:
Comments on Three Multi-Server Authentication Protocols. IACR Cryptol. ePrint Arch. 2013: 380 (2013) - [i28]Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen:
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card. IACR Cryptol. ePrint Arch. 2013: 402 (2013) - [i27]Yalin Chen, Jue-Sam Chou:
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier. IACR Cryptol. ePrint Arch. 2013: 783 (2013) - 2012
- [j6]Yalin Chen, Jue-Sam Chou, Hung-Min Sun, Ming-Sun Cho:
A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011). Electron. Commer. Res. Appl. 11(4): 443-444 (2012) - [j5]Chun-Hui Huang, Jue-Sam Chou, Yalin Chen, Siang Yu Wun:
Improved multi-server authentication protocol. Secur. Commun. Networks 5(3): 331-341 (2012) - [i26]Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang:
Comments on four multi-server authentication protocols using smart card. IACR Cryptol. ePrint Arch. 2012: 406 (2012) - 2011
- [j4]Yalin Chen, Jue-Sam Chou, Hung-Min Sun, Ming-Hsun Cho:
A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron. Commer. Res. Appl. 10(6): 673-682 (2011) - [j3]Yalin Chen, Kwai-Sang Chin, Xianjia Wang:
Internal pricing strategies design and simulation in virtual enterprise formation. Expert Syst. Appl. 38(11): 13580-13587 (2011) - [i25]Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen:
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing. IACR Cryptol. ePrint Arch. 2011: 150 (2011) - [i24]Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin:
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach. IACR Cryptol. ePrint Arch. 2011: 167 (2011) - [i23]Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu:
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem. IACR Cryptol. ePrint Arch. 2011: 381 (2011) - [i22]Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin:
An efficient RFID mutual authentication scheme based on ECC. IACR Cryptol. ePrint Arch. 2011: 418 (2011) - [i21]Jue-Sam Chou, Shih-Che Hung, Yalin Chen:
An Efficient Secure Anonymous Proxy Signature Scheme. IACR Cryptol. ePrint Arch. 2011: 498 (2011) - 2010
- [i20]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comments on Five Smart Card Based Password Authentication Protocols. CoRR abs/1007.0057 (2010) - [i19]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Cryptanalysis on Four Two-Party Authentication Protocols. CoRR abs/1007.0060 (2010) - [i18]Yalin Chen, Jue-Sam Chou, Xian-Wu Hou:
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings. IACR Cryptol. ePrint Arch. 2010: 27 (2010) - [i17]Jue-Sam Chou, Yalin Chen:
A secure anonymous communication scheme in vehicular ad hoc networks from pairings. IACR Cryptol. ePrint Arch. 2010: 28 (2010) - [i16]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comments on five smart card based password authentication protocols. IACR Cryptol. ePrint Arch. 2010: 148 (2010) - [i15]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comment on four two-party authentication protocols. IACR Cryptol. ePrint Arch. 2010: 165 (2010) - [i14]Jue-Sam Chou, Yalin Chen, Chun-Hui Huang:
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment. IACR Cryptol. ePrint Arch. 2010: 393 (2010) - [i13]Yalin Chen, Jue-Sam Chou, Chi-Fong Lin:
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem. IACR Cryptol. ePrint Arch. 2010: 549 (2010)
2000 – 2009
- 2009
- [i12]Yalin Chen, Chun-Hui Huang, Jue-Sam Chou:
A novel multi-server authentication protocol. IACR Cryptol. ePrint Arch. 2009: 176 (2009) - [i11]Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun:
A Novel ID-based Electronic Cash System from Pairings. IACR Cryptol. ePrint Arch. 2009: 339 (2009) - [i10]Hung-Min Sun, Yalin Chen, Jue-Sam Chou:
An Efficient Secure Oblivious Transfer. IACR Cryptol. ePrint Arch. 2009: 521 (2009) - [i9]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Improvements on two password-based authentication protocols. IACR Cryptol. ePrint Arch. 2009: 561 (2009) - 2008
- [j2]Yalin Chen, Jue-Sam Chou, Hung-Min Sun:
A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput. Networks 52(12): 2373-2380 (2008) - [j1]Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen:
An efficient session key generation for NTDR networks based on bilinear paring. Comput. Commun. 31(14): 3113-3123 (2008) - [i8]Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou:
Comments on two password based protocols. IACR Cryptol. ePrint Arch. 2008: 400 (2008) - [i7]Yalin Chen, Chun-Hui Huang, Jue-Sam Chou:
Comments on two multi-server authentication protocols. IACR Cryptol. ePrint Arch. 2008: 544 (2008) - 2007
- [i6]Jue-Sam Chou, Yalin Chen, Chung-Ju Chan:
Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking. IACR Cryptol. ePrint Arch. 2007: 4 (2007) - [i5]Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen:
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring. IACR Cryptol. ePrint Arch. 2007: 180 (2007) - 2006
- [c4]Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin:
An improvement of an efficient user identification scheme based on ID-based cryptosystem. SUTC (1) 2006: 558-561 - [i4]Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A ID-Based Deniable Authentication Protocol on pairings. IACR Cryptol. ePrint Arch. 2006: 335 (2006) - [i3]Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings. IACR Cryptol. ePrint Arch. 2006: 342 (2006) - 2005
- [c3]Yalin Chen, Xianjia Wang, Guangmin Wang:
How the Enterprise Choosing Strategic Action: Modeling, Algorithm and Simulation. PDCAT 2005: 461-465 - [c2]Yalin Chen, Xianjia Wang, Ye Chun, Wenqi Zhu:
How to build bargaining agents in the e-commerce modeling and analysis. PDCAT 2005: 558-562 - [c1]Xianjia Wang, Yalin Chen, Wenqi Zhu:
The Pricing Strategies for Agents in Real E-commerce. WINE 2005: 887-894 - [i2]Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin:
Improvement of Manik et al.¡¦s remote user authentication scheme. IACR Cryptol. ePrint Arch. 2005: 450 (2005) - [i1]Jue-Sam Chou, Yalin Chen, Ming-De Yang:
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. IACR Cryptol. ePrint Arch. 2005: 451 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint