跳到主要內容區塊
:::

:::
  1. Y.M. Tseng*, J.L. Chen and S.S. Huang, "A lightweight leakage-resilient identity-based mutual authentication and key exchange protocol for resource-limited devices", Computer Networks, Accepted, 2021. (*Corresponding author) (SCI) (MOST 108-2221-E-018-004-MY2).
  2. A.L. Peng, Y.M. Tseng* and S.S. Huang, "An efficient leakage-resilient authenticated key exchange protocol suitable for IoT devices", IEEE Systems Journal, Accepted (DOI: 10.1109/JSYST.2020.3038216), 2021. (*Corresponding author) (SCI) (MOST 108-2221-E-018-004-MY2).  
  3. Y.H. Chuang and Y.M. Tseng*, "CAKE: Compatible authentication and key exchange protocol for a smart city in 5G networks", Symmetry, vol. 13, Article 698, 2021. (*Corresponding author) (SCI) (MOST 108-2221-E-018-004-MY2).
  4. Y.M. Tseng*, J.D. Wu, S.S. Huang and T.T. Tsai, "Leakage-resilient outsourced revocable certificateless signature with a cloud revocation server", Information Technology and Control, vol. 49, no. 4, pp. 464-481, 2020. (*Corresponding author) (SCI) (MOST 108-2221-E-018-004-MY2).  
  5. T.C. Hsieh, Y.M. Tseng*, and S.S. Huang, "A leakage-resilient certificateless authenticated key exchange protocol withstanding side-channel attacks", IEEE Access, vol. 8, pp.121795-121810, 2020. (*Corresponding author) (SCI) (MOST 108-2221-E-018-004-MY2).  
  6. J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai, "Leakage-resilient certificate-based key encapsulation scheme resistant to continual leakage", IEEE Open Journal of the Computer Society, vol. 1, pp.131-144, 2020. (*Corresponding author) (MOST 108-2221-E-018-004-MY2).  
  7. J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai, "Leakage-resilient revocable identity-based signature with cloud revocation authority", Informatica, vol. 31, no. 3, pp. 597-620, 2020.  (*Corresponding author) (SCI) (MOST 108-2221-E-018-004-MY2).
  8. J.D. Wu, Y.M. Tseng* and S.S. Huang, "An identity-based authenticated key exchange protocol resilient to continuous key leakage", IEEE Systems Journal, vol. 13, no. 4, pp. 3968-3979, 2019. (*Corresponding author) (SCI) (MOST 108-2221-E-018-004-MY2).  
  9. Y.M. Tseng*, T.T. Tsai, J.D. Wu and S.S. Huang, "Efficient certificate-based signature with short key and signature sizes from lattices", Informatica, vol. 30, no. 3, pp. 595-612, 2019.  (*Corresponding author) (SCI) (MOST 106-2221-E-018-007-MY2).
  10. J.D. Wu, Y.M. Tseng*, S.S. Huang and T.T. Tsai, "Leakage-resilient certificate-based signature resistant to side-channel attacks", IEEE Access, vol. 7, no. 1, pp. 19041-19053, 2019. (*Corresponding author) (SCI) (MOST 106-2221-E-018-007-MY2).
  11. Y.M. Tseng*, T.T. Tsai, S.S. Huang and C.P. Huang, "Identity-based encryption with cloud revocation authority and its applications", IEEE Transactions on Cloud Computing, vol. 6, no. 4, pp. 1041-1053, 2018. (SCI) (MOST 103-2221-E-018 -022 -MY2).
  12. J.D. Wu, Y.M. Tseng* and S.S. Huang, "Leakage-resilient certificateless signature under continual leakage model", Information Technology and Control, vol. 47, no. 2, pp. 363-386, 2018. (*Corresponding author) (SCI) (MOST 106-2221-E-018-007-MY2).
  13. J.D. Wu, Y.M. Tseng*, S.S. Huang and W.C. Chou, "Leakage-resilient certificateless key encapsulation scheme", Informatica, vol. 29, no. 1, pp. 125-155, 2018. (*Corresponding author) (SCI) (MOST 106-2221-E-018-007-MY2).
  14. J.D. Wu, Y.M. Tseng* and S.S. Huang, "Efficient leakage-resilient authenticated key agreement protocol in the continual leakage eCK model", IEEE Access, vol. 6, no.1, pp. 17130-17142, 2018. (*Corresponding author) (SCI) (MOST 106-2221-E-018-007-MY2)
  15. Y.H. Hung, Y.M. Tseng* and S.S. Huang, “Lattice-based revocable certificateless signature”, Symmetry, vol. 9, Article ID 242, 2017. (*Corresponding author) (SCI) (MOST 106-2221-E-018-007-MY2).
  16. Y.H. Hung, S.S. Huang, Y.M. Tseng* and T.T. Tsai, “Efficient anonymous multireceiver certificateless encryption”, IEEE Systems Journal, vol. 11, no. 4, pp. 2602-2613, 2017. (*Corresponding author) (SCI) (MOST 103-2221-E-018 -022 -MY2).
  17. T.Y. Wu, Y.M. Tseng*, S.S. Huang and Y.C. Lai, “Non-repudiable provable data possession scheme with designated verifier in cloud storage systems”, IEEE Access, vol. 5, pp. 19333-19341, 2017. (*Corresponding author) (SCI) (MOST 106-2221-E-018-007-MY2)
  18. C. Meshram, Y.M. Tseng, C.C. Lee, S. Meshram, "An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP", Informatica, vol. 28, no. 3, pp. 471-484, 2017, 2017. (SCI)
  19. Y.M. Tseng*, S.S. Huang, and M.L. You, "Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments", International Journal of Communication Systems, vol. 30, no.11, e3251, 2017. (DOI: 10.1002/dac.3251) (*Corresponding author) (SCI) (MOST 105-2221-E-018 -013).
  20. Y.H. Hung, Y.M. Tseng* and S.S. Huang, “Revocable ID-based signature with short size over lattices”, Security and Communication Networks, vol. 2017, Article ID 7571201, 9 pages, 2017. (*Corresponding author) (SCI) (MOST 105-2221-E-018 -013).
  21. T.T. Tsai, S.S. Huang, and Y.M. Tseng*, "SIBSC: separable identity-based signcryption for resource-constrained devices", Informatica, vol. 28, no. 1, pp. 193-214, 2017. (*Corresponding author) (SCI) (MOST 103-2221-E-018 -022 -MY2).
  22. J.D. Wu, Y.M. Tseng*, and S.S. Huang, "Leakage-resilient ID-based signature scheme in the generic bilinear group model", Security and Communication Networks, vol. 9, no. 17, pp. 3987-4001, 2016. (*Corresponding author) (SCI) (MOST 105-2221-E-018 -013).
  23. Y.H. Hung, Y.M. Tseng* and S.S. Huang, “A revocable certificateless short signature scheme and its authentication application”, Informatica, vol. 27, no. 3, pp. 549-572, 2016. (*Corresponding author) (SCI) (MOST 103-2221-E-018 -022 -MY2).
  24. Y.H. Hung, S.S. Huang and Y.M. Tseng* “A short certificate-based signature scheme with provable security”, Information Technology and Control, vol. 45, no. 3, pp. 243-253, 2016. (*Corresponding author) (SCI) (MOST 103-2221-E-018 -022 -MY2).
  25. Y.M. Tseng*, S.S. Huang, T.T. Tsai, and J.H. Ke, "List-free ID-based mutual authentication and key agreement protocol for multi-server architectures", IEEE Transactions on Emerging Topics in Computing, vol. 4, no. 1, pp. 102-122, 2016. (*Corresponding author) (SCI) (MOST 103-2221-E-018 -022 -MY2).
  26. T.T. Tsai, Y.M. Tseng* and S.S. Huang, “Efficient revocable certificateless public key encryption with a delegated revocation authority”, Security and Communication Networks, vol. 8, no. 18, pp. 3713-3725, 2015. (*Corresponding author) (SCI) (MOST 103-2221-E-018 -022 -MY2).
  27. Y.H. Hung, S.S. Huang, Y.M. Tseng* and T.T. Tsai, “Certificateless signature with strong unforgeability in the standard model”, Informatica, vol. 26, no. 4, pp. 663-684, 2015. (*Corresponding author) (SCI) (MOST 103-2221-E-018 -022 -MY2).
  28. T.T. Tsai and Y.M. Tseng*, “Revocable certificateless public key encryption”, IEEE Systems Journal, vol. 9, no. 3, pp. 824-833, 2015. (*Corresponding author) (SCI) (MOST103-2221-E-018-022-MY2)
  29. Y.M. Tseng*, T.T. Tsai and S.S. Huang, “Leakage-free ID-based signature”, The Computer Journal, vol. 58, no. 4, pp. 750-757, 2015. (*Corresponding author) (SCI) (MOST103-2221-E-018-022-MY2)
  30. Y.M. Tseng*, S.S. Huang, T.T. Tsai and L. Tseng, “A novel ID-based authentication and key exchange protocol resistant to ephemeral secret leakage attacks for mobile devices”, International Journal of Distributed Sensor Networks, vol. 2015, Article ID 898716, 12 pages, 2015. (DOI: 10.1155/2015/898716). (*Corresponding author) (SCI) (MOST103-2221-E-018-022-MY2)
  31. Y.M. Tseng*, T.T. Tsai and S.S. Huang, “Enhancement on strongly secure group key agreement”, Security and Communication Networks, vol. 8, no. 2, pp. 126-135, 2015. (*Corresponding author) (SCI) (NSC102-2221-E-018 -019)
  32. T.T. Tsai, S.S. Huang and Y.M. Tseng*, “Secure certificateless signature with revocation in the standard model”, Mathematical Problems in Engineering, vol. 2014, Article ID 728591, 16 pages, 2014. (DOI: 10.1155/2014/728591). (*Corresponding author) (SCI) (MOST103-2221-E-018-022-MY2)
  33. T.T. Tsai, Y.M. Tseng* and S.S. Huang, “Efficient strongly unforgeable ID-based signature without random oracles”, Informatica, vol. 25, no. 3, pp. 505-521, 2014. (*Corresponding author) (SCI) (NSC101-2221-E-018 -027)
  34. Y.H. Hung, T.T. Tsai, Y.M. Tseng* and S.S. Huang, “Strongly secure revocable ID-based signature without random oracles”, Information Technology and Control, vol. 43, no. 3, pp. 264-276, 2014. (*Corresponding author) (SCI) (NSC102-2221-E-018-019)
  35. T.Y. Wu, T.T. Tsai and Y.M. Tseng*, “Efficient searchable ID-based encryption with a designated server”, Annals of telecommunications, vol. 69, no. 7, pp. 391-402, 2014. (*Corresponding author) (SCI) (NSC101-2221-E-018-027)
  36. Y.M. Tseng*, Y.H. Huang and H.J. Chang, “Privacy-preserving multi-receiver ID-based encryption with provable security”, International Journal of Communication Systems, vol. 27, no. 7, pp.1034-1050, 2014. (*Corresponding author) (SCI) (NSC101-2221-E-018-027)
  37. T.Y. Wu, T.T. Tsai and Y.M. Tseng, “A provably secure revocable ID-based authenticated group key exchange protocol with identifying malicious participants”, Scientific World Journal, vol. 2014, Article ID 367264, 2014. doi:10.1155/2014/367264. (NSC102-2221-E-018 -019)
  38. T.T. Tsai, Y.M. Tseng* and T.Y. Wu, “RHIBE: Constructing revocable hierarchical ID-based encryption from HIBE”, Informatica, vol. 25, no. 2, pp. 299-326, 2014. (*Corresponding author) (SCI) (NSC100-2221-E-018 -027)
  39. T.Y. Wu and Y.M. Tseng*, “Publicly verifiable multi-secret sharing scheme from bilinear pairings”, IET Information Security, vol. 7, no. 3, pp. 239-246, 2013.  (*Corresponding author) (SCI) (NSC101-2221-E-018-027)
  40. T.T. Tsai, Y.M. Tseng* and T.Y. Wu, “Provably secure revocable ID-based signature in the standard model”, Security and Communication Networks, vol. 6, no. 10, pp. 1250-1260, 2013. (*Corresponding author) (SCI) (NSC101-2221-E-018 -027)
  41. T.T. Tsai, Y.M. Tseng* and T.Y. Wu, “Efficient revocable multi-receiver ID-based encryption”, Information Technology and Control, vol. 42, no. 2, pp. 159-169, 2013. (*Corresponding author) (SCI) (NSC101-2221-E-018-027)
  42. T.Y. Wu and Y.M. Tseng*, “Further analysis of pairing-based traitor tracing schemes for broadcast encryption”, Security and Communication Networks, vol. 6, no. 1, pp. 28-32, 2013. (*Corresponding author) (SCI) (NSC97-2221-E-018 -027)
  43. T.Y. Wu, Y.M. Tseng* and T.T. Tsai, “A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants”, Computer Networks, vol. 56, no. 12, pp. 2994-3006, 2012.  (*Corresponding author) (SCI) (NSC101-2221-E-018-027)
  44. T.T. Tsai, Y.M. Tseng* and T.Y. Wu, “A fully secure revocable ID-based encryption in the standard model”, Informatica, vol. 23, no. 3, pp. 487-505, 2012. (*Corresponding author) (SCI) (NSC100-2221-E-018 -027)
  45. T.Y. Wu, T.T. Tsai and Y.M. Tseng, “A revocable ID-based signcryption scheme”, Journal of Information Hiding and Multimedia Signal Processing, vol. 3, no. 3, pp. 240-251, 2012. (EI)
  46. Y.M. Tseng*, C.H. Yu and T.Y. Wu, "Towards scalable key management for secure multicast communication", Information Technology and Control, vol. 41, no. 2, pp. 173-182, 2012. (*Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  47. Y.M. Tseng* and T.T. Tsai, “Efficient revocable ID-based encryption with a public channel”, The Computer Journal, vol. 55, no. 4, pp. 475-486, 2012. (*Corresponding author) (SCI) (NSC100-2221-E-018 -027)
  48. C.L. Chen, C.C. Lee, Y.M. Tseng and T.T. Chou, “A private online system for executing wills based on a secret sharing mechanism”, Security and Communication Networks, vol. 5, no. 7, pp. 725-737, 2012. (SCI)
  49. T.Y. Wu and Y.M. Tseng*, “Towards ID-based authenticated group key exchange protocol with identifying malicious participants”, Informatica, vol. 23, no. 2, pp. 315-334, 2012. (*Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  50. Y.H. Chuang, Y.M. Tseng and C.-L. Lei, “Efficient mutual authentication and key agreement with user anonymity for roaming services in global mobility networks”, International Journal of Innovative Computing Information and Control, vol. 8, no. 9, pp. 6415-6428, 2012. (SCI)
  51. Y.H. Chuang and Y.M. Tseng*, “Towards generalized ID-based user authentication for mobile multi-server environment”, International Journal of Communication Systems, vol. 25, no. 4, pp. 447-460, 2012. (*Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  52. T.Y. Wu, Y.M. Tseng* and C.W. Yu, “ID-based key-insulated signature scheme with batch verifications and its novel application”, International Journal of Innovative Computing Information and Control, vol. 8, no. 7(A), pp. 4797-4810, 2012. (*Corresponding author) (SCI) (NSC100-2221-E-018-027)
  53. T.Y. Wu, Y.M. Tseng* and C.W. Yu, “Two-round contributory group key exchange protocol for wireless network environments”, EURASIP Journal on Wireless Communications and Networking, 2011:12, 2011. (*Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  54. T.Y. Wu, Y.M. Tseng* and C.W. Yu, “A secure ID-based authenticated group key exchange protocol resistant to insider attacks”, Journal of Information Science and Engineering, vol. 27, no. 3, pp. 915-932, 2011. (*Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  55. Y.M. Tseng* and F.G. Chen, “A free-rider aware reputation system for peer-to-peer file sharing networks”, Expert Systems with Applications, vol. 38, no. 3, pp. 2432-2440, 2011. (SCI) (NSC97-2221-E-018-010-MY3)
  56. T.Y. Wu and Y.M. Tseng*, “A pairing-based publicly verifiable secret sharing scheme”, Journal of Systems Science and Complexity, vol. 24, no. 1, pp. 186-194, 2011. (* Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  57. T.C. Yeh, C.H. Wu, and Y.M. Tseng, “Improvement of the RFID authentication scheme based on quadratic residue”, Computer Communications, vol. 34, no. 3, pp. 337-341, 2011. (SCI)
  58. T.Y. Wu and Y.M. Tseng*, “An efficient user authentication and key exchange protocol for mobile client-server environment”, Computer Networks, vol. 54, no. 9, pp. 1520-1530, 2010. (* Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  59. T.Y. Wu and Y.M. Tseng*, “An ID-based mutual authentication and key exchange protocol for low-power mobile devices”, The Computer Journal, vol. 53, no. 7, pp. 1062-1070, 2010. (* Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  60. Y.M. Tseng* and T.Y. Wu, “Analysis and improvement on a contributory group key exchange protocol based on the Diffie-Hellman technique”, Informatica, vol. 21, no. 2, pp. 247-258, 2010. (SCI) (NSC97-2221-E-018-010-MY3)
  61. Y.H. Chuang and Y.M. Tseng*, "An efficient dynamic group key agreement protocol for imbalanced wireless networks", International Journal of Network Management, vol. 20, no. 4, pp. 167-180, 2010. (* Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  62. T.Y. Wu and Y.M. Tseng*, “Comments on an ID-based authenticated group key agreement protocol with withstanding insider attacks”, IEICE Trans. on Fundamentals of Electronics, Communications of Computer, vol. E92-A, no.10, pp. 2638-2640, 2009. (* Corresponding author) (SCI) (NSC97-2221-E-018-010-MY3)
  63. Y.M. Tseng*, T.Y. Wu and J.D. Wu, “An efficient and provably secure ID-based signature scheme with batch verifications”, International Journal of Innovative Computing, Information and Control, vol. 5, no. 11, pp.3911-3922, 2009. (SCI) (NSC97-2221-E-018-010-MY3)
  64. Y.M. Tseng, “USIM-based EAP-TLS authentication protocol for wireless local area networks", Computer Standards & Interfaces, vol. 31, no. 1, pp.128-136, 2009. (SCI) (NSC97-2221-E-018-010-MY3)
  65. Y.M. Tseng, T.Y. Wu and J.D. Wu, “Forgery attacks on an ID-based partially blind signature scheme”, IAENG International Journal of Computer Science, vol. 35, no. 3, pp.301-304, 2008. (EI) (NSC95-2221-E-018-010-MY2)
  66. Y.M. Tseng*, T.Y. Wu and J.D. Wu, “A pairing-based user authentication scheme for wireless clients with smart cards”, Informatica, vol. 19, no. 2, pp. 285-302, 2008. (SCI) (NSC95-2221-E-018-010-MY2)
  67. Y.M. Tseng, “A resource-constrained group key agreement protocol for imbalanced wireless networks”, Computers & Security, vol. 26, no. 4, pp. 331-337, 2007.  (SCI) (NSC95-2221-E-018-010-MY2)
  68. Y.M. Tseng, “A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy”, Journal of Systems and Software, vol. 80, no. 7, pp. 1091-1101, 2007. (SCI) (NSC95-2221-E-018-010-MY2)
  69. Y.M. Tseng, “A secure authenticated group key agreement protocol for resource-limited mobile devices”, The Computer Journal, vol. 50, no.1, pp. 41-52, 2007. (NSC94-2213-E-018-009) (SCI) (NSC95-2221-E-018-010-MY2)
  70. H.C. Lin and Y.M. Tseng*, ”A scalable ID-based pairwise key establishment protocol for wireless sensor networks”, Journal of Computers, vol. 18, no. 2, pp. 13-24 , 2007. (* Corresponding author) (ISSN:1991-1599) (NSC94-2213-E-018-010)
  71. Y.M. Tseng, “An efficient two-party identity-based key exchange protocol”, Informatica, vol. 18, no. 1, pp. 125-136, 2007. (NSC95-2221-E-018-010-MY2) (SCI)
  72. Y.M. Tseng, “A heterogeneous-network aided public-key management scheme for mobile ad hoc networks”, International Journal of Network Management, vol.17, no.1, pp. 3-15, 2007.  (NSC94-2213-E-018-010) (SCI)
  73. Y.M. Tseng, “GPRS/UMTS-aided authentication protocol for wireless LANs”, IEE Proceedings - Communications, vol.153, no.6, pp. 810-817, 2006. (NSC94-2213-E-018-009) (SCI)
  74. Y.M. Tseng, “A robust multi-party key agreement protocol resistant to malicious participants", The Computer Journal, vol. 48, no. 4, pp. 480-487, 2005. (NSC93-2213-E-018-011) (SCI) (This paper wins the runner-up paper of the Wilkes Award).
  75. Y.M. Tseng, “An improved conference-key agreement protocol with forward secrecy", Informatica, vol. 16, no. 2, pp. 275-284, 2005. (SCI) (NSC93-2213-E-018-011)
  76. Y.M. Tseng, “Efficient authenticated key agreement protocols resistant to a denial-of-service attack", International Journal of Network Management, vol. 15, no. 3, pp. 193-202, 2005. (ISSN:1055-7148) (SCI) (NSC93-2213-E-018-011)
  77. Y.M. Tseng, C.C. Yang and J.H. Su, “Authentication and billing protocols for the integration of WLAN and 3G networks", Wireless Personal Communications, vol. 29, no. 3-4, pp. 351-366, 2004. (SCI) (NSC92-2213-E-018-014)
  78. Y.M. Tseng, "On the security of an efficient two-pass key agreement protocol", Computer Standards & Interfaces, vol. 26, no. 4, pp. 371-374, 2004. (SCI) (NSC92-2213-E-018-014)
  79. H.Y. Chien, J.K. Jan and Y.M. Tseng, “Solving the invalid signer-verified signature problem and comments on Xia-You’s group signature”, Journal of Systems and Software, vol. 73, no. 3, pp. 369-373, 2004. (SCI, EI)
  80. Y.M. Tseng, “A cryptographic key assignment scheme for access control in a hierarchy with exceptions”, Journal of Discrete Mathematical Sciences & Cryptography, vol. 7, no. 1, pp. 121-132, 2004. (EI) (NSC92-2213-E-018-014)
  81. Y.Y. Chen, J.K. Jan, Y.M. Tseng, and C.L. Chen, “Cryptanalysis of a blind signature scheme based on ElGamal signature”, Journal of Engineering, vol. 15, no. 1, pp. 37-39, 2004. (ISSN:1017-4397) (NSC92-2213-E-018-014)
  82. Y.M. Tseng, "A scalable key management scheme with minimizing key storage for secure group communications”, International Journal of Network Management, vol.13, no.6, pp.419-425, 2003. (ISSN:1055-7148) (SCI) (NSC91-2213-E-324-029)
  83. Y.M. Tseng, "Cryptanalysis and restriction of an automatic signature scheme in distributed systems”, IEICE Transactions on Communications, vol.E86-B, no. 5, pp. 1679-1681, 2003. (NSC91-2213-E-324-029) (SCI)
  84. Y.M. Tseng, "Multi-party key agreement protocols with cheater identification", Applied Mathematics and Computation, vol. 145, no.2-3, pp. 551-559, 2003. (SCI) (NSC-91-2213-E-324-029)
  85. Y.M. Tseng, J.K. Jan, and H.Y. Chien, "Authenticated encryption schemes with message linkages for message flows", Computers & Electrical Engineering, vol. 29, no. 1, pp. 101-109, 2003. (SCI) (NSC90-2213-E-252-007)
  86. H.Y. Chien, J.K. Jan and Y.M. Tseng, "Cryptanalysis on MU-Varadharajan's e-voting", Applied Mathematics and Computation, vol.139, no.2-3, pp. 525–530, 2003. (SCI)
  87. Y.M. Tseng, J.K. Jan, and H.Y. Chien, "Digital signature with message recovery using self-certified public keys and its variants", Applied Mathematics and Computation, vol. 136, no. 2-3, pp. 203-214, 2003. (SCI) (NSC90-2213-E-252-007)
  88. H.Y. Chien, J.K. Jan and Y.M. Tseng, " Partially blind threshold signature based on RSA”, Informatica, vol. 14, no. 2, pp. 155-166, 2003. (SCI) (NSC90-2213-E-252-007)
  89. Y.M. Tseng, "Cryptanalysis and improvement of key distribution system for VSAT satellite communication", Informatica, vol. 13, no. 3, pp. 369-376, 2002.(SCI)
  90. H.Y. Chien, J.K. Jan and Y.M. Tseng, "Forgery attacks on multi-signature schemes for authenticating mobile code delegates", IEEE Transactions on Vehicular Tech
  91. Y.M. Tseng, "Robust generalized MQV key agreement protocol without using one-way hash functions", Computer Standards & Interfaces, vol. 24, no. 3, pp. 241-246, 2002. (SCI) (NSC-89-2213-E-252-008)
  92. Y.M. Tseng and J.K. Jan, "An efficient authenticated encryption scheme with message linkages and low communication costs", Journal of Information Science and Engineering, vol. 18, no. 1, pp. 41-46, 2002. (SCI) (NSC-90-2213-E-252-007)
  93. H.Y. Chien, J.K. Jan and Y.M. Tseng, "An efficient and practical solution to remote authentication: Smart card", Computers & Security, vol. 21, no. 4, pp. 372-375, 2002. (SCI)
  94. H.Y. Chien, J.K. Jan and Y.M. Tseng, "An unified approach to secret sharing schemes with low distribution cost", Journal of The Chinese Institute of Engineers, vol. 25, no. 6, pp. 723-733, 2002. (SCI)
  95. Y.M. Tseng , J.K. Jan and C.H. Wang, “Cryptanalysis and improvement of an Identity-Based key exchange protocol”, Journal of computers, vol. 14, no. 3, pp. 17-22, 2002. (NSC-90-2213-E-252-007)
  96. Y.M. Tseng and J.K. Jan, "Generalized group oriented cryptosystem with authenticated sender", Computer Systems Science and Engineering, vol. 16, no. 5, pp. 291-294, 2001. (SCI) (NSC-89-2213-E-252-008)
  97. H.Y. Chien, Y.H. Chen, J.K. Jan and Y.M. Tseng, "Cryptanalysis on dynamic authentication protocol for personal communication system", IEE Electronics Letters, vol. 37, no. 14, pp. 895-896, 2001. (SCI)
  98. Y.M. Tseng and J.K. Jan, "Cryptanalysis of Liaw's broadcasting cryptosystem", Computers and Mathematics with Applications, vol. 41, no. 12, pp. 1575-1578, 2001. (SCI) (NSC-89-2213-E-252-008)
  99. H.Y. Chien, J.K. Jan and Y.M. Tseng, "A modified remote login authentication scheme based on geometric approach", Journal of System and Software, vol. 55, no. 3, pp. 287-290, 2001. (SCI)
  100. Y.M. Tseng, J.K. Jan, and H.Y. Chien, "On the security methods for protecting password transmission", Informatica, vol. 12, no. 3, pp. 469-476, 2001. (SCI) (NSC89-2213-E-252-008)
  101. H.Y. Chien, T.C. Wu, J.K. Jan and Y.M. Tseng, "Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols", Information Processing Letters, vol. 80, no. 2, pp. 113-117, 2001. (SCI)
  102. Y.M. Tseng, J.K. Jan, and H.Y. Chien, " On the security of generalization of threshold signature and authenticated encryption", IEICE Trans. on Fundamentals of Electronics, Communications of Computer, vol. E84-A, no. 10, pp. 2606-2609, 2001. (SCI) (NSC89-2213-E-252-008)
  103. C.Y. Perng, J.K. Jan and Y.M. Tseng, "A efficient group-oriented (t,n) threshold signature scheme with message linkage", Journal of The Chinese Institute of Engineers, vol. 24, no. 1, pp. 113-116, 2001. (SCI)
  104. Y.M. Tseng, J.K. Jan and H.Y. Chien, "Security of digital signature with one-time pair of keys", IEE Electronics Letters, vol. 36, no. 16, pp. 1374-1375, 2000. (SCI)
  105. H.Y. Chien, J.K. Jan and Y.M. Tseng, "A practical (t,n) multi-secret sharing scheme", IEICE Trans. on Fundamentals of Electronics, Communications of Computer Sciences, vol. E83-A, no. 12, pp. 2762-2765, 2000. (SCI)
  106. Y.M. Tseng, "Weakness in a simple authenticated key agreement protocol", IEE Electronics Letters, vol. 36, no. 1, pp. 48-49, 2000. (SCI) (NSC89-2213-E-252-008)
  107. H.Y. Chien, J.K. Jan and Y.M. Tseng, "Impersonation attack on Tan-Zhu's remote login scheme", IEE Electronics Letters, vol.36, no.14, pp.1202-1203, 2000. (SCI)
  108. H.C. Hsu and Y.M. Tseng, " Non-interactive conference key distribution systems using self-certified public keys", Journal of Computers, vol. 12, no. 1, pp. 50-58, 2000.
  109. Y.M. Tseng and J.K. Jan, "A novel ID-based group signature", Information Sciences, vol. 120, no. 1-4, pp. 131-141, 1999. (SCI)
  110. Y.M. Tseng and J.K. Jan, "Reply improved group signature scheme based on the discrete logarithm problem", IEE Electronics Letters, vol. 35, no. 16, pp. 1324-1325, 1999. (SCI)
  111. J.K. Jan, Y.M. Tseng and H.Y. Chien, "A threshold signature scheme withstanding the conspiracy attack", Communications of IICM, vol. 2, no. 3, pp. 31-38, 1999.
  112. Y.M. Tseng and J.K. Jan, "Attacks on threshold signature scheme with traceable signers ", Information Processing Letters, vol. 71, no. 1, pp. 1-4, 1999. (SCI)
  113. Y.M. Tseng and J.K. Jan, "Anonymous conference key distribution systems based on the discrete logarithm problem", Computer Communications, vol. 22, no. 8, pp. 749-754, 1999. (SCI)
  114. Y.M. Tseng and J.K. Jan, "Improved group signature scheme based on the discrete logarithm problem", IEE Electronics Letters, vol. 35, no. 1, pp. 37-38, 1999. (SCI)
  115. J.K. Jan and Y.M. Tseng, "Two integrated schemes of user authentication and access control in a distributed computer network", IEE Proceedings - Computers and Digital Techniques, vol. 145, no. 6, pp. 419-424, 1998. (SCI)
  116. Y.M. Tseng and J.K. Jan, "A scheme and concept for limited inheritance of privileges in a user hierarchy", Information Sciences, vol. 112, no. 1-4, pp. 199-211, 1998. (SCI)
  117. Y.M. Tseng and J.K. Jan, "Improvement of Chikazawa-Yamagishi ID-based key sharing system", IEE Electronics Letters, vol. 34, no. 12, pp. 1221-1222, 1998. (SCI)
  118. J.K. Jan and Y.M. Tseng, "On the security of image encryption method", Information Processing Letters, vol. 60, no. 5, pp. 261-265, 1996. (SCI)