Tsu-Yang Wu
Tsu-Yang Wu
College of Computer Science and Engineering, Shandong University of Science and Technology
Verified email at sdust.edu.cn
Cited by
Cited by
Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications
CM Chen, KH Wang, KH Yeh, B Xiang, TY Wu
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3133-3142, 2019
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
KH Wang, CM Chen, W Fang, TY Wu
The Journal of Supercomputing 74 (1), 65-70, 2018
An efficient user authentication and key exchange protocol for mobile client–server environment
TY Wu, YM Tseng
Computer Networks 54 (9), 1520-1530, 2010
A pairing-based user authentication scheme for wireless clients with smart cards
YM Tseng, TY Wu, JD Wu
Informatica 19 (2), 285-302, 2008
An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system
CT Li, TY Wu, CL Chen, CC Lee, CM Chen
Sensors 17 (7), 1482, 2017
An ID-based mutual authentication and key exchange protocol for low-power mobile devices
TY Wu, YM Tseng
The Computer Journal 53 (7), 1062-1070, 2010
A secure authentication scheme for internet of things
KH Wang, CM Chen, W Fang, TY Wu
Pervasive and Mobile Computing 42, 15-26, 2017
On the Security of a Chaotic Maps-based Three-party Authenticated Key Agreement Protocol.
CM Chen, L Xu, TY Wu, CR Li
J. Netw. Intell. 1 (2), 61-66, 2016
Efficient searchable ID-based encryption with a designated server
TY Wu, TT Tsai, YM Tseng
annals of telecommunications-annales des tÚlÚcommunications 69 (7-8), 391-402, 2014
A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
TY Wu, YM Tseng, TT Tsai
Computer Networks 56 (12), 2994-3006, 2012
An authenticated key exchange protocol for multi-server architecture in 5G networks
TY Wu, Z Lee, MS Obaidat, S Kumari, S Kumar, CM Chen
IEEE Access 8, 28096-28108, 2020
A provable authenticated group key agreement protocol for mobile environment
HM Sun, BZ He, CM Chen, TY Wu, CH Lin, H Wang
Information Sciences 321, 224-237, 2015
A scalable transitive human-verifiable authentication protocol for mobile devices
CM Chen, KH Wang, TY Wu, JS Pan, HM Sun
IEEE Transactions on Information Forensics and Security 8 (8), 1318-1330, 2013
An anonymous mutual authenticated key agreement scheme for wearable sensors in wireless body area networks
CM Chen, B Xiang, TY Wu, KH Wang
Applied Sciences 8 (7), 1074, 2018
A pairing-based publicly verifiable secret sharing scheme
TY Wu, YM Tseng
Journal of Systems Science and Complexity 24 (1), 186-194, 2011
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining
JCW Lin, TY Wu, P Fournier-Viger, G Lin, J Zhan, M Voznak
Engineering Applications of Artificial Intelligence 55, 269-284, 2016
Provably secure revocable id‐based signature in the standard model
TT Tsai, YM Tseng, TY Wu
Security and Communication Networks 6 (10), 1250-1260, 2013
Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments
TY Wu, CM Chen, KH Wang, JMT Wu
IEEE Access 7, 49232-49239, 2019
Comments on “An improved secure and efficient password and chaos-based two-party key agreement protocol”
CM Chen, W Fang, KH Wang, TY Wu
Nonlinear Dynamics 87 (3), 2073-2075, 2017
The system can't perform the operation now. Try again later.
Articles 1–20