default search action
Ya-Fen Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Ya-Fen Chang, Wei-Liang Tai, Che-Hui Lin:
A Feasible Solution for eHealth with an A nonymous Patient Monitoring System and a Privacy Ensured Telecare Medical Information System. J. Inf. Sci. Eng. 40(6): 1211-1226 (2024) - 2022
- [j44]Ya-Fen Chang, Wei-Liang Tai, Ka-Ho Fung:
Offline User Authentication Ensuring Non-Repudiation and Anonymity. Sensors 22(24): 9673 (2022) - [j43]Ya-Fen Chang, Wei-Liang Tai:
Separable Reversible Watermarking in Encrypted Images for Privacy Preservation. Symmetry 14(7): 1336 (2022) - 2021
- [j42]Ya-Fen Chang, Wei-Liang Tai, Po-Lin Hou, Kuan-Yu Lai:
A Secure Three-Factor Anonymous User Authentication Scheme for Internet of Things Environments. Symmetry 13(7): 1121 (2021) - [c27]Ya-Fen Chang, Huan-Wen Chen, Ting-Yu Chang, Wei-Liang Tai:
Security Analyses of an Anonymous Two Factor Authentication Protocol for Roaming Service in Global Mobile Networks. SNPD 2021: 213-217 - 2020
- [j41]Wei-Liang Tai, Ya-Fen Chang, Wen-Hsin Huang:
Security Analyses of a Data Collaboration Scheme with Hierarchical Attribute-based Encryption in Cloud Computing. Int. J. Netw. Secur. 22(2): 212-217 (2020)
2010 – 2019
- 2019
- [j40]Wei-Liang Tai, Ya-Fen Chang, Po-Lin Hou:
Security Analysis of a Three-factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things Environments. Int. J. Netw. Secur. 21(6): 1014-1020 (2019) - 2018
- [j39]Pei-Feng Shiu, Chia-Chen Lin, Jinn-Ke Jan, Ya-Fen Chang:
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy. J. Netw. Intell. 3(4): 259-277 (2018) - [j38]Wei-Liang Tai, Ya-Fen Chang:
Separable Reversible Data Hiding in Encrypted Signals with Public Key Cryptography. Symmetry 10(1): 23 (2018) - 2017
- [j37]Wei-Liang Tai, Ya-Fen Chang:
Comments on a Secure Authentication Scheme for IoT and Cloud Servers. Int. J. Netw. Secur. 19(4): 648-651 (2017) - [j36]Wei-Liang Tai, Ya-Fen Chang, Wei-Han Li:
An IoT notion-based authentication and key agreement scheme ensuring user anonymity for heterogeneous ad hoc wireless sensor networks. J. Inf. Secur. Appl. 34: 133-141 (2017) - [j35]Ya-Fen Chang, Wei-Liang Tai, Min-How Hsu:
A Secure Mobility Network Authentication Scheme Ensuring User Anonymity. Symmetry 9(12): 307 (2017) - 2016
- [j34]Wei-Liang Tai, Ya-Fen Chang, Ti-Sheng Kwang:
An Efficient Improvement on Safkhani et al.'s Hash-based Mutual Authentication Protocol for RFID Systems. J. Inf. Hiding Multim. Signal Process. 7(3): 653-658 (2016) - [j33]Wei-Liang Tai, Ya-Fen Chang, Yung-Chi Chen:
A Fast-Handover-Supported Authentication Protocol for Vehicular Ad Hoc Networks. J. Inf. Hiding Multim. Signal Process. 7(5): 960-969 (2016) - 2015
- [j32]Ya-Fen Chang, Chia-Chen Chen, Shao-Cian Lin:
An intelligent context-aware communication system for one single autonomic region to realize smart living. Inf. Fusion 21: 57-67 (2015) - [j31]Ya-Fen Chang:
Flexible Access Control over Verifiable Cloud Computing Services with Provable Security. Informatica 26(2): 181-198 (2015) - [j30]Xuedan Jia, Ya-Fen Chang, Chin-Chen Chang, Liang-Min Wang:
A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks. J. Inf. Hiding Multim. Signal Process. 6(2): 183-188 (2015) - [j29]Ya-Fen Chang:
A flexible hierarchical access control mechanism enforcing extension policies. Secur. Commun. Networks 8(2): 189-201 (2015) - 2014
- [j28]Chia-Chen Chen, Ya-Fen Chang:
Developing a Smart Shopping Automation System: Ambient Intelligence in Practice. Ad Hoc Sens. Wirel. Networks 20(1-2): 95-105 (2014) - [j27]Ya-Fen Chang, Wei-Liang Tai, Hung-Chin Chang:
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. Int. J. Commun. Syst. 27(11): 3430-3440 (2014) - [j26]Chung-Chuan Wang, Ya-Fen Chang, Chin-Chen Chang, Jinn-Ke Jan, Chia-Chen Lin:
A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93: 152-162 (2014) - [c26]Ya-Fen Chang, Wei-Liang Tai, Wei-Na Wu, Wei-Han Li, Yung-Chi Chen:
Comments on Chaotic Maps-Based Password-Authenticated Key Agreement Using Smart Cards. IIH-MSP 2014: 94-97 - 2013
- [j25]Ya-Fen Chang, Wei-Liang Tai, Chia-Chen Chen:
Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices. Informatica 24(1): 1-12 (2013) - [j24]Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen:
An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment. Inf. Technol. Control. 42(4): 315-324 (2013) - [j23]Ya-Fen Chang, Shih-Hui Yu, Ding-Rui Shiao:
A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care. J. Medical Syst. 37(2): 9902 (2013) - [j22]Ya-Fen Chang, Chia-Chen Chen, Pei-Yu Chang:
A Robust and Novel Dynamic-ID-based Authentication Scheme for Care Team Collaboration with Smart Cards. J. Medical Syst. 37(2): 9909 (2013) - [c25]Jian-Wei Fan, Chao-Wen Chan, Ya-Fen Chang:
A random increasing sequence hash chain and smart card-based remote user authentication scheme. ICICS 2013: 1-5 - [c24]Jen-Ho Yang, Ya-Fen Chang, Chih-Cheng Huang:
A user authentication scheme on multi-server environments for cloud computing. ICICS 2013: 1-4 - [c23]Ya-Fen Chang, Wei-Liang Tai, Shao-Cian Lin, Ti-Sheng Kwamg:
A Two-Factor and Reader-Undedicated Authentication Scheme with Passive RFID Tags in WLAN. SITIS 2013: 279-284 - 2012
- [j21]Ya-Fen Chang:
A critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011). Electron. Commer. Res. Appl. 11(4): 441-442 (2012) - [j20]Ya-Fen Chang, Wei-Liang Tai, Chung-Yi Lin:
A Verifiable Proxy Signature Scheme Based on Bilinear Pairings with Identity-Based Cryptographic Approaches. Inf. Technol. Control. 41(1): 60-68 (2012) - [j19]Ya-Fen Chang, Wei-Liang Tai:
Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting. KSII Trans. Internet Inf. Syst. 6(12): 3100-3116 (2012) - [c22]Wei-Liang Tai, Ya-Fen Chang, Yuan-Fu Li, Shun-Meng Pan:
A Security Enhancement on a Remote User Authentication Scheme Based on the Rabin Cryptosystem with Secure Password Updating. AINA Workshops 2012: 160-164 - [c21]Ya-Fen Chang, Pei-Yu Chang:
Comments on a Dynamic-ID-Based Remote User Authentication Scheme for Multi-server Environment Using Smart Cards. ICGEC 2012: 59-62 - [c20]Yuan-Fu Li, Ya-Fen Chang:
A Security Flaw of a Bilinear-Pairing-Based Electronic Cash Scheme with Trustee-Based Anonymity Revocation. ICGEC 2012: 71-74 - 2011
- [c19]Ya-Fen Chang, Shao-Cian Lin, Pei-Yu Chang:
A Location-Privacy-Protected RFID Authentication Scheme. ICC 2011: 1-4 - [c18]Ya-Fen Chang, Jhih-Yi Lin, Yuo-Ju Yen:
Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme. ICGEC 2011: 168-171 - 2010
- [c17]Hui-Feng Huang, Ya-Fen Chang, Chun-Hung Liu:
Enhancement of Two-Factor User Authentication in Wireless Sensor Networks. IIH-MSP 2010: 27-30
2000 – 2009
- 2009
- [c16]Ya-Fen Chang, Yen-Cheng Lai:
An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. ARES 2009: 130-134 - [c15]Hsu-Hung Chiang, Ching-Chung Liu, Ying-Ming Chen, Ya-Fen Chang:
Security of Indirect-Authenticated Key Exchange Protocol. IIH-MSP 2009: 336-339 - [c14]Ya-Fen Chang, Yen-Cheng Lai, Mu-Yen Chen:
Further Remarks on Identity-Based RSA Multi-signature. IIH-MSP 2009: 750-753 - [c13]Ya-Fen Chang, Hung-Chin Chang:
Security of Dynamic ID-Based Remote User Authentication Scheme. NCM 2009: 2108-2110 - [c12]Jeng-Ji Huang, Ya-Fen Chang:
Performance Evaluation of Mobility Management in Cellular IP. VTC Fall 2009 - 2008
- [j18]Fang-Ping Chiang, Yi-Mien Lin, Ya-Fen Chang:
Comments on the Security Flaw of Hwang et al.'s Blind Signature Scheme. Int. J. Netw. Secur. 6(2): 185-189 (2008) - [j17]Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu:
Visual secret sharing for multiple secrets. Pattern Recognit. 41(12): 3572-3581 (2008) - [c11]Ya-Fen Chang, Wei-Cheng Shiao:
The Essential Design Principles of Verifiable Non-interactive OT Protocols. ISDA (3) 2008: 241-245 - 2007
- [j16]Ya-Fen Chang, Chin-Chen Chang:
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Fundam. Informaticae 76(1-2): 13-23 (2007) - [j15]Ya-Fen Chang, Chin-Chen Chang:
An RSA-based (t, n) threshold proxy signature scheme with freewill identities. Int. J. Inf. Comput. Secur. 1(1/2): 201-209 (2007) - [j14]Ya-Fen Chang, Chin-Chen Chang, Pei-Yu Lin:
A Concealed t-out-of-n Signer Ambiguous Signature Scheme with Variety of Keys. Informatica 18(4): 535-546 (2007) - [c10]Ya-Fen Chang:
Non-Interactive t-out-of-n Oblivious Transfer Based on the RSA Cryptosystem. IIH-MSP 2007: 45-50 - 2006
- [j13]Ya-Fen Chang, Jung-San Lee, Chin-Chen Chang:
A secure and efficient authentication scheme for mobile users. Int. J. Mob. Commun. 4(5): 581-594 (2006) - [c9]Ya-Fen Chang, Chin-Chen Chang:
Enhanced Anonymous Auction Protocols with Freewheeling Bids. AINA (1) 2006: 353-358 - [c8]Ya-Fen Chang, Chin-Chen Chang, Yu-Wei Su:
A secure improvement on the user-friendly remote authentication scheme with no time concurrency mech. AINA (2) 2006: 741-745 - [c7]Ya-Fen Chang, Chin-Chen Chang, Wei-Liang Tai:
Comments on Distributed Sign-and-Encryption Schemes. IMECS 2006: 178-180 - [c6]Ya-Fen Chang, Chin-Chen Chang:
Comments on Abe et al.'s Threshold Signer-ambiguous Signature Scheme from Variety of Keys. JCIS 2006 - 2005
- [j12]Ya-Fen Chang, Chin-Chen Chang, Hui-Feng Huang:
Digital signature with message recovery using self-certified public keys without trustworthy system authority. Appl. Math. Comput. 161(1): 211-227 (2005) - [j11]Ya-Fen Chang, Chin-Chen Chang:
Authentication schemes with no verification table. Appl. Math. Comput. 167(2): 820-832 (2005) - [j10]Chin-Chen Chang, Jung-San Lee, Ya-Fen Chang:
Efficient authentication protocols of GSM. Comput. Commun. 28(8): 921-928 (2005) - [j9]Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang:
An efficient password authenticated key exchange protocol for imbalanced wireless networks. Comput. Stand. Interfaces 27(3): 313-322 (2005) - [j8]Ya-Fen Chang, Chin-Chen Chang:
Schemes for Digital Gift Certificates with Low Computation Complexity. Informatica 16(4): 503-518 (2005) - [j7]Ya-Fen Chang, Chin-Chen Chang:
An efficient authentication protocol for mobile satellite communication systems. ACM SIGOPS Oper. Syst. Rev. 39(1): 70-84 (2005) - [c5]Chin-Chen Chang, Ya-Fen Chang, Wen-Chuan Wu:
An Extendable-Message-Passing Protocol with Signatures Based on Two Hard Problems and Its Applications. CW 2005: 93-100 - [c4]Ya-Fen Chang, Chin-Chen Chang:
Password-authenticated 3PEKE with Round Efficiency without Server's Public Key. CW 2005: 340-344 - [c3]Ya-Fen Chang, Chin-Chen Chang:
An Improvement on Strong-Password Authentication Protocols. ICESS 2005: 629-637 - 2004
- [j6]Chin-Chen Chang, Ya-Fen Chang:
A novel three-party encrypted key exchange protocol. Comput. Stand. Interfaces 26(5): 471-476 (2004) - [j5]Chin-Chen Chang, Ya-Fen Chang:
Signing a digital signature without using one-way hash functions and message redundancy schemes. IEEE Commun. Lett. 8(8): 485-487 (2004) - [j4]Ya-Fen Chang, Chin-Chen Chang, Chia-Lin Kao:
An improvement on a deniable authentication protocol. ACM SIGOPS Oper. Syst. Rev. 38(3): 65-74 (2004) - [j3]Ya-Fen Chang, Chin-Chen Chang:
A secure and efficient strong-password authentication protocol. ACM SIGOPS Oper. Syst. Rev. 38(3): 79-90 (2004) - [j2]Ya-Fen Chang, Chin-Chen Chang, Jui-Yi Kuo:
A secure one-time password authentication scheme using smart cards without limiting login times. ACM SIGOPS Oper. Syst. Rev. 38(4): 80-90 (2004) - [c2]Chin-Chen Chang, Ya-Fen Chang:
Yet Another Attack on a QR-based Password Authentication System. AINA (2) 2004: 170-173 - [c1]Chin-Chen Chang, Ya-Fen Chang:
The Security Flaw of an Untraceable Signature Scheme. ICEB 2004: 1379-1381 - 2003
- [j1]Chin-Chen Chang, Ya-Fen Chang:
Efficient anonymous auction protocols with freewheeling bids. Comput. Secur. 22(8): 728-734 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-01 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint