default search action
Yi-Shiung Yeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j25]Chu-Hsing Lin, Chen-Yu Lee, Krishna M. Kavi, Deng-Jyi Chen, Yi-Shiung Yeh:
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms. J. Inf. Sci. Eng. 29(5): 889-905 (2013) - 2011
- [j24]Han-Yu Lin, Tzong-Sun Wu, Yi-Shiung Yeh:
A DL Based Short Strong Designated Verifier Signature Scheme with Low Computation. J. Inf. Sci. Eng. 27(2): 451-463 (2011) - [c10]Chu-Hsing Lin, Yi-Shiung Yeh, Shih-Pei Chien, Chen-Yu Lee, Hung-Sheng Chien:
Generalized secure hash algorithm: SHA-X. EUROCON 2011: 1-4 - 2010
- [j23]Han-Yu Lin, Tzong-Sun Wu, Shih-Kun Huang, Yi-Shiung Yeh:
Efficient proxy signcryption scheme with provable CCA and CMA security. Comput. Math. Appl. 60(7): 1850-1858 (2010)
2000 – 2009
- 2009
- [j22]Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin, Yu-Hao Chang:
A Study on Parallel RSA Factorization. J. Comput. 4(2): 112-118 (2009) - [j21]Yi-Shiung Yeh, Ting-Yu Huang, Han-Yu Lin:
Structural Binary CBC Encryption Mode. J. Inf. Sci. Eng. 25(3): 937-944 (2009) - 2008
- [c9]Han-Yu Lin, Tzong-Sun Wu, Ting-Yu Huang, Yi-Shiung Yeh:
Self-Certified Proxy Convertible Authenticated Encryption Scheme. ISDA (3) 2008: 479-483 - [c8]Min-Chih Kao, Yi-Shiung Yeh, Chuan Chi Wang:
Untraceable Identity Management Framework for Mobile Access. ISDA (2) 2008: 614-620 - 2006
- [j20]I-Te Chen, Ming-Hsin Chang, Yi-Shiung Yeh:
Design of Proxy Signature in the Digital Signature Algorithm (DSA). J. Inf. Sci. Eng. 22(4): 965-973 (2006) - [j19]Lin-Chuan Wu, Yi-Shiung Yeh, Tsann-Shyong Liu:
Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes. J. Syst. Softw. 79(2): 176-179 (2006) - [j18]I-Te Chen, Yi-Shiung Yeh:
Security analysis of transformed-key asymmetric watermarking system. IEEE Signal Process. Lett. 13(4): 213-215 (2006) - [j17]Chin Ching Chiu, Chung-Hsien Hsu, Yi-Shiung Yeh:
A genetic algorithm for reliability-oriented task assignment with k~ duplications in distributed systems. IEEE Trans. Reliab. 55(1): 105-117 (2006) - [c7]Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh:
Forgery attack on the RPC incremental unforgeable encryption scheme. AsiaCCS 2006: 361 - 2005
- [j16]Ming-Hsin Chang, Yi-Shiung Yeh:
Improving Lamport one-time signature scheme. Appl. Math. Comput. 167(1): 118-124 (2005) - [j15]Lin-Chuan Wu, Yi-Shiung Yeh:
Comment on traceability on RSA-based partially signature with low computation. Appl. Math. Comput. 170(2): 1344-1348 (2005) - [c6]Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen:
An Efficient Decryption Method for RSA Cryptosystem. AINA 2005: 585-590 - 2002
- [j14]Jue-Sam Chou, Yi-Shiung Yeh:
Mental poker game based on a bit commitment scheme through network. Comput. Networks 38(2): 247-255 (2002) - [j13]Yi-Shiung Yeh, Wei-Shen Lai, Chung-Jaye Cheng:
Applying lightweight directory access protocol service on session certification authority. Comput. Networks 38(5): 675-692 (2002) - [j12]Chin Ching Chiu, Yi-Shiung Yeh, Jue-Sam Chou:
A fast algorithm for reliability-oriented task assignment in a distributed system. Comput. Commun. 25(17): 1622-1630 (2002) - [j11]Yi-Shiung Yeh, Ching-Hung Hsu:
An Extended DES. J. Inf. Sci. Eng. 18(3): 349-365 (2002) - 2001
- [j10]Yi-Shiung Yeh, Chin Ching Chiu:
A reversing traversal algorithm to predict deleting node for the optimal k-node set reliability with capacity constraint of distributed systems. Comput. Commun. 24(3-4): 422-433 (2001) - [j9]Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen:
Model calculations to estimate the probability of secret reconstruction in computer environments. Inf. Manag. Comput. Secur. 9(1): 13-20 (2001) - 2000
- [j8]Chin Ching Chiu, Yi-Shiung Yeh, Ruey-Shun Chen:
Reduction of the total execution time to achieve the optimal k-node reliability of distributed computing systems using a novel heuristic algorithm. Comput. Commun. 23(1): 84-91 (2000) - [j7]Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
Date attachable electronic cash. Comput. Commun. 23(4): 425-428 (2000) - [j6]Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
Randomization enhanced Chaum's blind signature scheme. Comput. Commun. 23(17): 1677-1680 (2000) - [j5]Yi-Shiung Yeh, Chu-Hsing Lin, Chan-Chi Wang:
Dynamic GOST. J. Inf. Sci. Eng. 16(6): 857-861 (2000) - [c5]Chun-I Fan, Wei-Kuei Chen, Yi-Shiung Yeh:
A Randomization Enhanced Scheme for Chaum's Blind Signature. ICDCS Workshop on Internet 2000: A5-A8
1990 – 1999
- 1999
- [j4]Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku:
A Probability Model for Reconstructing Secret Sharing under the Internet Environment. Inf. Sci. 116(2-4): 109-127 (1999) - [j3]Tsu-Miin Hsieh, Yi-Shiung Yeh, Chu-Hsing Lin, Ssu-Heng Tuan:
One-Way Hash Functions With Changeable Parameters. Inf. Sci. 118(1-4): 223-239 (1999) - [c4]Chun-I Fan, Wei-Kuen Chen, Yi-Shiung Yeh:
Blind Signatures with Double-Hashes Messages for Fair Electronic Elections and Ownership Claimable Digital Cash. ICEIS 1999: 612-618 - 1998
- [j2]Tsu-Miin Hsieh, Yi-Shiung Yeh, Yung-Cheng Hsieh, Chan-Chi Wang:
A Homophonic DES. Inf. Process. Lett. 66(6): 317-320 (1998) - [c3]Ruey-Shun Chen, Chin Ching Chiu, Yi-Shiung Yeh:
A Genetic Algorithm for the Reliability Optimization of a Distributed System. DEXA Workshop 1998: 484-489 - [c2]Ching-Yun Lee, Yi-Shiung Yeh, Deng-Jyi Chen, Kuo-Lung Ku:
A Share Assignment Method to Maximize the Probability of Secret Sharing Reconstruction under the Internet. ICPADS 1998: 469-477 - 1993
- [j1]Tzong-Chen Wu, Yi-Shiung Yeh, Chin-Chen Chang:
Algebraic operations on encryped relational databases. Inf. Syst. 18(1): 55-62 (1993)
1980 – 1989
- 1986
- [i1]George I. Davida, Yi-Shiung Yeh:
Multilevel Cryptosecure Relational Database. EUROCRYPT 1986: 50 - 1982
- [c1]George I. Davida, Yi-Shiung Yeh:
Cryptographic Relational Algebra. S&P 1982: 111-116
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint