default search action
Jue-Sam Chou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i46]Yu-Yuan Chou, Hsien-Hung Liu, Jue-Sam Chou:
Revisiting the "improving the security of multi-party quantum key agreement with five- qubit Brown states". IACR Cryptol. ePrint Arch. 2024: 1749 (2024)
2010 – 2019
- 2019
- [i45]Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou:
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography. IACR Cryptol. ePrint Arch. 2019: 24 (2019) - [i44]Yalin Chen, Jue-Sam Chou, Liangchun Wang, Yu-Yuan Chou:
A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography. IACR Cryptol. ePrint Arch. 2019: 785 (2019) - [i43]Yalin Chen, Chang Hsiang, Liangchun Wang, Yu-Yuan Chou, Jue-Sam Chou:
A Diffie-Hellman quantum session key establishment protocol without entanglement. IACR Cryptol. ePrint Arch. 2019: 1118 (2019) - [i42]Chang-Bin Wang, Shu-Mei Hsu, Chang Hsiang, Jue-Sam Chou:
Improved on Identity-based quantum signature based on Bell states. IACR Cryptol. ePrint Arch. 2019: 1496 (2019) - 2016
- [i41]Yalin Chen, Jue-Sam Chou, Hung-Shen Wu:
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. IACR Cryptol. ePrint Arch. 2016: 1 (2016) - [i40]Yalin Chen, Jue-Sam Chou, I-Ching Liao:
Improved on an improved remote user authentication scheme with key agreement. IACR Cryptol. ePrint Arch. 2016: 23 (2016) - 2015
- [j13]Yalin Chen, Jue-Sam Chou:
ECC-based untraceable authentication for large-scale active-tag RFID systems. Electron. Commer. Res. 15(1): 97-120 (2015) - [j12]Yalin Chen, Jue-Sam Chou:
On the Privacy of "User Efficient Recoverable Off-Line E-Cash Scheme with Fast Anonymity Revoking". Int. J. Netw. Secur. 17(6): 708-711 (2015) - 2014
- [j11]Jue-Sam Chou:
A constant-time identifying large-scale RFID tags using lines on a plane. Trans. Emerg. Telecommun. Technol. 25(11): 1083-1094 (2014) - [j10]Jue-Sam Chou:
An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J. Supercomput. 70(1): 75-94 (2014) - [i39]Yalin Chen, Jue-Sam Chou:
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks. IACR Cryptol. ePrint Arch. 2014: 1 (2014) - [i38]Yalin Chen, Jue-Sam Chou:
Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking". IACR Cryptol. ePrint Arch. 2014: 46 (2014) - [i37]Yalin Chen, Jue-Sam Chou:
Cryptanalysis on "Secure untraceable off-line electronic cash system". IACR Cryptol. ePrint Arch. 2014: 63 (2014) - [i36]Yalin Chen, Jue-Sam Chou:
Crypto-analyses on "secure and efficient privacy-preserving public auditing scheme for cloud storage". IACR Cryptol. ePrint Arch. 2014: 723 (2014) - 2013
- [i35]Yalin Chen, Jue-Sam Chou, Wen-Yi Tsai:
Comments on Three Multi-Server Authentication Protocols. IACR Cryptol. ePrint Arch. 2013: 380 (2013) - [i34]Jue-Sam Chou, Chun-Hui Huang, Yu-Siang Huang, Yalin Chen:
Efficient Two-Pass Anonymous Identity Authentication Using Smart Card. IACR Cryptol. ePrint Arch. 2013: 402 (2013) - [i33]Yalin Chen, Jue-Sam Chou:
ECC-Based Non-Interactive Deniable Authentication with Designated Verifier. IACR Cryptol. ePrint Arch. 2013: 783 (2013) - 2012
- [j9]Jue-Sam Chou:
A Novel Anonymous Proxy Signature Scheme. Adv. Multim. 2012: 427961:1-427961:10 (2012) - [j8]Jue-Sam Chou:
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing. Adv. Multim. 2012: 630610:1-630610:9 (2012) - [j7]Yalin Chen, Jue-Sam Chou, Hung-Min Sun, Ming-Sun Cho:
A response to a critique of "A novel electronic cash system with trustee-based anonymity revocation from pairing, " by Chen, Chou, Sun and Cho (2011). Electron. Commer. Res. Appl. 11(4): 443-444 (2012) - [j6]Chun-Hui Huang, Jue-Sam Chou, Yalin Chen, Siang Yu Wun:
Improved multi-server authentication protocol. Secur. Commun. Networks 5(3): 331-341 (2012) - [i32]Jue-Sam Chou, Yalin Chen, Chun-Hui Huang, Yu-Siang Huang:
Comments on four multi-server authentication protocols using smart card. IACR Cryptol. ePrint Arch. 2012: 406 (2012) - 2011
- [j5]Yalin Chen, Jue-Sam Chou, Hung-Min Sun, Ming-Hsun Cho:
A novel electronic cash system with trustee-based anonymity revocation from pairing. Electron. Commer. Res. Appl. 10(6): 673-682 (2011) - [i31]Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen:
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing. IACR Cryptol. ePrint Arch. 2011: 150 (2011) - [i30]Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin:
Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach. IACR Cryptol. ePrint Arch. 2011: 167 (2011) - [i29]Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu:
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem. IACR Cryptol. ePrint Arch. 2011: 381 (2011) - [i28]Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin:
An efficient RFID mutual authentication scheme based on ECC. IACR Cryptol. ePrint Arch. 2011: 418 (2011) - [i27]Jue-Sam Chou, Shih-Che Hung, Yalin Chen:
An Efficient Secure Anonymous Proxy Signature Scheme. IACR Cryptol. ePrint Arch. 2011: 498 (2011) - 2010
- [i26]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comments on Five Smart Card Based Password Authentication Protocols. CoRR abs/1007.0057 (2010) - [i25]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Cryptanalysis on Four Two-Party Authentication Protocols. CoRR abs/1007.0060 (2010) - [i24]Yalin Chen, Jue-Sam Chou, Xian-Wu Hou:
A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings. IACR Cryptol. ePrint Arch. 2010: 27 (2010) - [i23]Jue-Sam Chou, Yalin Chen:
A secure anonymous communication scheme in vehicular ad hoc networks from pairings. IACR Cryptol. ePrint Arch. 2010: 28 (2010) - [i22]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comments on five smart card based password authentication protocols. IACR Cryptol. ePrint Arch. 2010: 148 (2010) - [i21]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Comment on four two-party authentication protocols. IACR Cryptol. ePrint Arch. 2010: 165 (2010) - [i20]Jue-Sam Chou, Yalin Chen, Chun-Hui Huang:
A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment. IACR Cryptol. ePrint Arch. 2010: 393 (2010) - [i19]Jue-Sam Chou, Hsien-Ching Chen, Chun-Yun Chen:
Cryptanalysis and Improvement of A New Electronic Traveler's Check Scheme Based on One-way Hash Function. IACR Cryptol. ePrint Arch. 2010: 418 (2010) - [i18]Yalin Chen, Jue-Sam Chou, Chi-Fong Lin:
A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem. IACR Cryptol. ePrint Arch. 2010: 549 (2010)
2000 – 2009
- 2009
- [i17]Yalin Chen, Chun-Hui Huang, Jue-Sam Chou:
A novel multi-server authentication protocol. IACR Cryptol. ePrint Arch. 2009: 176 (2009) - [i16]Jue-Sam Chou, Chun-Hui Huang, Cheng-Chung Ding:
Security weaknesses in two multi-server password based authentication protocols. IACR Cryptol. ePrint Arch. 2009: 338 (2009) - [i15]Jue-Sam Chou, Yalin Chen, Ming-Hsun Cho, Hung-Min Sun:
A Novel ID-based Electronic Cash System from Pairings. IACR Cryptol. ePrint Arch. 2009: 339 (2009) - [i14]Huang-Ta Huang, Jue-Sam Chou:
A provably secure really source hiding designated verifier signature scheme based on random oracle model. IACR Cryptol. ePrint Arch. 2009: 348 (2009) - [i13]Hung-Min Sun, Yalin Chen, Jue-Sam Chou:
An Efficient Secure Oblivious Transfer. IACR Cryptol. ePrint Arch. 2009: 521 (2009) - [i12]Yalin Chen, Jue-Sam Chou, Chun-Hui Huang:
Improvements on two password-based authentication protocols. IACR Cryptol. ePrint Arch. 2009: 561 (2009) - 2008
- [j4]Yalin Chen, Jue-Sam Chou, Hung-Min Sun:
A novel mutual authentication scheme based on quadratic residues for RFID systems. Comput. Networks 52(12): 2373-2380 (2008) - [j3]Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen:
An efficient session key generation for NTDR networks based on bilinear paring. Comput. Commun. 31(14): 3113-3123 (2008) - [i11]Yalin Chen, Hung-Min Sun, Chun-Hui Huang, Jue-Sam Chou:
Comments on two password based protocols. IACR Cryptol. ePrint Arch. 2008: 400 (2008) - [i10]Yalin Chen, Chun-Hui Huang, Jue-Sam Chou:
Comments on two multi-server authentication protocols. IACR Cryptol. ePrint Arch. 2008: 544 (2008) - 2007
- [i9]Jue-Sam Chou, Yalin Chen, Chung-Ju Chan:
Cryptanalysis of Hwang-Chang's a Time-Stamp Protocol for Digital Watermarking. IACR Cryptol. ePrint Arch. 2007: 4 (2007) - [i8]Jue-Sam Chou, Yalin Chen, Tsung-Heng Chen:
A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring. IACR Cryptol. ePrint Arch. 2007: 180 (2007) - [i7]Jue-Sam Chou, Guey-Chuen Lee, Chung-Ju Chan:
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems. IACR Cryptol. ePrint Arch. 2007: 224 (2007) - 2006
- [c2]Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin:
An improvement of an efficient user identification scheme based on ID-based cryptosystem. SUTC (1) 2006: 558-561 - [i6]Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A ID-Based Deniable Authentication Protocol on pairings. IACR Cryptol. ePrint Arch. 2006: 335 (2006) - [i5]Jue-Sam Chou, Yalin Chen, Jin-Cheng Huang:
A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings. IACR Cryptol. ePrint Arch. 2006: 342 (2006) - 2005
- [i4]Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin:
Improvement of Manik et al.¡¦s remote user authentication scheme. IACR Cryptol. ePrint Arch. 2005: 450 (2005) - [i3]Jue-Sam Chou, Yalin Chen, Ming-De Yang:
Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols. IACR Cryptol. ePrint Arch. 2005: 451 (2005) - [i2]Jue-Sam Chou, Chu-Hsing Lin, Chia-Hung Chiu:
Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol. IACR Cryptol. ePrint Arch. 2005: 457 (2005) - [i1]Jue-Sam Chou, Ming-De Yang, Guey-Chuen Lee:
Cryptanalysis of the Yang -Wang's password authentication schemes. IACR Cryptol. ePrint Arch. 2005: 466 (2005) - 2004
- [c1]Jue-Sam Chou, Chu-Hsing Lin, Ting-Ying Lee:
A Novel Hierarchical Key Management Scheme Based on Quadratic Residues. ISPA 2004: 858-865 - 2002
- [j2]Jue-Sam Chou, Yi-Shiung Yeh:
Mental poker game based on a bit commitment scheme through network. Comput. Networks 38(2): 247-255 (2002) - [j1]Chin Ching Chiu, Yi-Shiung Yeh, Jue-Sam Chou:
A fast algorithm for reliability-oriented task assignment in a distributed system. Comput. Commun. 25(17): 1622-1630 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint