default search action
Jen-Ho Yang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Jen-Ho Yang:
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT. EURASIP J. Inf. Secur. 2023(1): 2 (2023)
2010 – 2019
- 2017
- [j17]Jen-Ho Yang, Iuon-Chang Lin, Po-Ching Chien:
Data Sharing Scheme for Cloud Storage Service Using the Concept of Message Recovery. Informatica 28(2): 375-386 (2017) - [j16]Jen-Ho Yang:
An Electronic Transaction Mechanism Using Mobile Devices for Cloud Computing. Wirel. Pers. Commun. 94(3): 713-724 (2017) - [c11]Chin-Chen Chang, Jen-Ho Yang, Yu-Wei Lai, Yanjun Liu:
An offline user-verifiable electronic traveler's check system. IWBF 2017: 1-6 - 2016
- [j15]Jen-Ho Yang, Pei-Yu Lin:
A mobile payment mechanism with anonymity for cloud computing. J. Syst. Softw. 116: 69-74 (2016) - 2015
- [j14]Chin-Chen Chang, Jen-Ho Yang, Yu-Ching Wu:
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks. Int. J. Netw. Secur. 17(6): 702-707 (2015) - 2014
- [j13]Jen-Ho Yang, Iuon-Chang Lin:
A source authentication scheme based on message recovery digital signature for multicast. Int. J. Commun. Syst. 27(11): 2616-2627 (2014) - [c10]Jen-Ho Yang, Pei-Yu Lin:
An ID-Based User Authentication Scheme for Cloud Computing. IIH-MSP 2014: 98-101 - 2013
- [j12]Chin-Chen Chang, Jen-Ho Yang:
A Group-oriented Digital Right Management Scheme with Reliable and Flexible Access Policies. Int. J. Netw. Secur. 15(6): 471-477 (2013) - [j11]Jen-Ho Yang, Hung-Ming Sun, Ping-Liang Chen:
An Enterprise Digital Right Management Scheme with Anonymous Trust for Mobile Devices. Informatica (Slovenia) 37(3): 307-313 (2013) - [j10]Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen:
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment. Inf. Technol. Control. 42(4): 315-324 (2013) - [j9]Chin-Chen Chang, Shih-Chang Chang, Jen-Ho Yang:
A practical secure and efficient enterprise digital rights management mechanism suitable for mobile environment. Secur. Commun. Networks 6(8): 972-984 (2013) - [c9]Jen-Ho Yang, Ya-Fen Chang, Chih-Cheng Huang:
A user authentication scheme on multi-server environments for cloud computing. ICICS 2013: 1-4 - 2012
- [j8]Jen-Ho Yang, Chin-Chen Chang:
A Low Computational-Cost Electronic Payment Scheme for Mobile Commerce with Large-Scale Mobile Users. Wirel. Pers. Commun. 63(1): 83-99 (2012) - [c8]Chin-Chen Chang, Jen-Ho Yang, Kai-Jie Chang:
An Efficient and Flexible Mobile Payment Protocol. ICGEC 2012: 63-66 - 2011
- [c7]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme. ICGEC 2011: 180-183 - [c6]Jen-Ho Yang, Chin-Chen Chang, Shih-Yi Lin:
An Efficient Mutual Authentication with Key Agreement Protocol for Mobile Devices. IIH-MSP 2011: 145-148 - 2010
- [j7]Chin-Chen Chang, Jen-Ho Yang, Da-Wei Wang:
An efficient and reliable E-DRM scheme for mobile environments. Expert Syst. Appl. 37(9): 6176-6181 (2010)
2000 – 2009
- 2009
- [j6]Jen-Ho Yang, Chin-Chen Chang:
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. Comput. Secur. 28(3-4): 138-143 (2009) - [j5]Jen-Ho Yang, Chin-Chen Chang:
An efficient three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. J. Syst. Softw. 82(9): 1497-1502 (2009) - [c5]Chin-Chen Chang, Shih-Yi Lin, Jen-Ho Yang:
Efficient User Authentication and Key Establishment Protocols with Perfect Forward Secrecy for Mobile Devices. CIT (2) 2009: 131-135 - 2008
- [j4]Jen-Ho Yang, Chin-Chen Chang:
Efficient residue number system iterative modular multiplication algorithm for fast modular exponentiation. IET Comput. Digit. Tech. 2(1): 1-5 (2008) - [c4]Jen-Ho Yang, Chin-Chen Chang:
Aryabhata Remainder Theorem for Moduli with Common Factors and Its Application in Information Protection Systems. IIH-MSP 2008: 1379-1382 - [c3]Iuon-Chang Lin, Chin-Chen Chang, Jen-Ho Yang:
An Efficient Proxy Signature Scheme for Realizing Generalized Proxy Signing Policy. IIH-MSP 2008: 1537-1540 - [c2]Jen-Ho Yang, Chin-Chen Chang:
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem. ISDA (3) 2008: 3-5 - 2006
- [c1]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. UIC 2006: 998-1007 - 2005
- [j3]Jen-Ho Yang, Chin-Chen Chang, Chih-Hung Wang:
An iterative modular multiplication algorithm in RNS. Appl. Math. Comput. 171(1): 637-645 (2005) - [j2]Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang:
An efficient password authenticated key exchange protocol for imbalanced wireless networks. Comput. Stand. Interfaces 27(3): 313-322 (2005) - 2004
- [j1]Jen-Ho Yang, Chin-Chen Chang, Chien-Yuan Chen:
A high-speed division algorithm in residue number system using parity. Int. J. Comput. Math. 81(6): 775-780 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint