default search action
Jinn-ke Jan
Person information
- affiliation: National Chung Hsing University, Taichung, Taiwan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j61]Chia-Chen Lin, Bohan Zhang, Wei-Liang Tai, Pei-Feng Shiu, Jinn-Ke Jan:
A High-Payload Data Hiding Scheme Based on Absolute Moment Block Truncation Coding for Minimizing Hiding Impact. Symmetry 16(1): 64 (2024) - 2019
- [j60]Jau-Ji Shen, Chun-Hsiu Yeh, Jinn-Ke Jan:
A new approach of lossy image compression based on hybrid image resizing techniques. Int. Arab J. Inf. Technol. 16(2): 226-235 (2019) - [j59]Pei-Feng Shiu, Wei-Liang Tai, Jinn-Ke Jan, Chin-Chen Chang, Chia-Chen Lin:
An Interpolative AMBTC-based high-payload RDH scheme for encrypted images. Signal Process. Image Commun. 74: 64-77 (2019) - 2018
- [j58]Pei-Feng Shiu, Chia-Chen Lin, Jinn-Ke Jan, Ya-Fen Chang:
A DCT-based Robust Watermarking Scheme Surviving JPEG Compression with Voting Strategy. J. Netw. Intell. 3(4): 259-277 (2018) - 2014
- [j57]Chung-Chuan Wang, Ya-Fen Chang, Chin-Chen Chang, Jinn-Ke Jan, Chia-Chen Lin:
A high capacity data hiding scheme for binary images based on block patterns. J. Syst. Softw. 93: 152-162 (2014) - 2013
- [j56]Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan:
The design of speedy seamless safe messaging mechanism in VANET. Int. J. Comput. Math. 90(12): 2614-2630 (2013) - [j55]Yu-Yi Chen, Yao-Jen Wang, Jinn-Ke Jan:
A Secure 2G-RFID-Sys Mechanism for Applying to the Medical Emergency System. J. Medical Syst. 37(3): 9940 (2013) - [j54]Te-Yu Chen, Cheng-Chi Lee, Min-Shiang Hwang, Jinn-Ke Jan:
Towards secure and efficient user authentication scheme using smart card for multi-server environments. J. Supercomput. 66(2): 1008-1032 (2013) - 2012
- [j53]Yu-Yi Chen, Jinn-ke Jan, Meng-Lin Tsai, Chun Ching Ku, Der-Chen Huang:
On The Security of RFID-based Monitoring Mechanism for Retail Inventory Management. KSII Trans. Internet Inf. Syst. 6(2): 515-528 (2012) - [j52]Yu-Yi Chen, Der-Chen Huang, Meng-Lin Tsai, Jinn-ke Jan:
A Design of Tamper Resistant Prescription RFID Access Control System. J. Medical Syst. 36(5): 2795-2801 (2012) - [j51]Yu-Yi Chen, Jun-Chao Lu, Jinn-ke Jan:
A Secure EHR System Based on Hybrid Clouds. J. Medical Syst. 36(5): 3375-3384 (2012) - 2011
- [j50]Yu-Yi Chen, Meng-Lin Tsai, Jinn-ke Jan:
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. Comput. Commun. 34(3): 250-256 (2011) - [j49]Yu-Yi Chen, Meng-Lin Tsai, Yu-Tan Chen, Jinn-ke Jan:
A tagged-product ownership transfer mechanism used in retailer and second-hand transaction. Int. J. Radio Freq. Identif. Technol. Appl. 3(1/2): 47-53 (2011) - 2010
- [j48]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A cocktail protocol with the Authentication and Key Agreement on the UMTS. J. Syst. Softw. 83(2): 316-325 (2010) - [j47]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-Ke Jan:
A Provable Billing Protocol on the Current UMTS. Wirel. Pers. Commun. 55(4): 551-566 (2010) - 2009
- [j46]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
The UMTS-AKA Protocols for Intelligent Transportation Systems. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j45]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan:
NovelWatermarking Authentication Schemes for Binary Images Based on Dual-Pair Block Pixel Patterns. Fundam. Informaticae 90(1-2): 125-155 (2009) - [j44]Hsia-Hung Ou, Iuon-Chang Lin, Min-Shiang Hwang, Jinn-ke Jan:
TK-AKA: using temporary key on Authentication and Key Agreement protocol on UMTS. Int. J. Netw. Manag. 19(4): 291-303 (2009) - 2007
- [j43]Hsia-Hung Ou, Min-Shiang Hwang, Jinn-ke Jan:
A simple mobile communication billing system among charged parties. Appl. Math. Comput. 192(2): 487-495 (2007) - [j42]Ren-Hung Lin, Jinn-ke Jan:
An innovative revocation scheme for one-to-many E-services. Electron. Commer. Res. Appl. 6(3): 358-363 (2007) - [j41]Ren-Hung Lin, Jinn-ke Jan:
A tree-based scheme for security of many-to-many communications. J. High Speed Networks 16(1): 69-79 (2007) - [j40]Yu-Yi Chen, Chin-Ling Chen, Jinn-Ke Jan:
A Mobile Ticket System Based on Personal Trusted Device. Wirel. Pers. Commun. 40(4): 569-578 (2007) - 2005
- [j39]Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
A novel proxy deposit protocol for e-cash systems. Appl. Math. Comput. 163(2): 869-877 (2005) - [j38]Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
A fair and secure mobile billing system. Comput. Networks 48(4): 517-524 (2005) - [j37]Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
Design of a fair proxy raffle protocol on the Internet. Comput. Stand. Interfaces 27(4): 415-422 (2005) - [j36]Yi-Hwa Chen, Jinn-ke Jan:
Enhancement of digital signature with message recovery using self-certified public keys and its variants. ACM SIGOPS Oper. Syst. Rev. 39(3): 90-96 (2005) - 2004
- [j35]Hung-Yu Chien, Jinn-Ke Jan:
Improved authenticated multiple-key agreement protocol without using conventional one-way function. Appl. Math. Comput. 147(2): 491-497 (2004) - [j34]Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
The design of a secure anonymous Internet voting system. Comput. Secur. 23(4): 330-337 (2004) - [j33]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
Solving the invalid signer-verified signature problem and comments on Xia-You group signature. J. Syst. Softw. 73(3): 369-373 (2004) - [j32]Fuw-Yi Yang, Jinn-Ke Jan:
Cryptanalysis of log-in authentication based on circle property. IEEE Trans. Consumer Electron. 50(2): 625-628 (2004) - 2003
- [j31]Yuh-Min Tseng, Jinn-Ke Jan, Hung-Yu Chien:
Digital signature with message recovery using self-certified public keys and its variants. Appl. Math. Comput. 136(2-3): 203-214 (2003) - [j30]Hung-Yu Chien, Jinn-Ke Jan, Yuh-Min Tseng:
Cryptanalysis on Mu-Varadharajan's e-voting schemes. Appl. Math. Comput. 139(2-3): 525-530 (2003) - [j29]Yuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien:
Authenticated encryption schemes with message linkages for message flows. Comput. Electr. Eng. 29(1): 101-109 (2003) - [j28]Hung-Yu Chien, Jinn-ke Jan:
Robust and Simple Authentication Protocol. Comput. J. 46(2): 193-201 (2003) - [j27]Hung-Yu Chien, Jinn-ke Jan:
New hierarchical assignment without Public Key cryptography. Comput. Secur. 22(6): 523-526 (2003) - [j26]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
Partially Blind Threshold Signature Based on RSA. Informatica 14(2): 155-166 (2003) - [j25]Hung-Yu Chien, Jinn-ke Jan:
A hybrid authentication protocol for large mobile network. J. Syst. Softw. 67(2): 123-130 (2003) - [j24]Fuw-Yi Yang, Jinn-Ke Jan:
A provable secure access control using smart cards. IEEE Trans. Consumer Electron. 49(4): 1223-1226 (2003) - 2002
- [j23]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
An Efficient and Practical Solution to Remote Authentication: Smart Card. Comput. Secur. 21(4): 372-375 (2002) - [j22]Jinn-ke Jan, Yu-Yi Chen:
A secure anonymous voting protocol with a complete supervision. Comput. Syst. Sci. Eng. 17(4/5): 213-221 (2002) - [j21]Yuh-Min Tseng, Jinn-ke Jan:
An Efficient Authenticated Encryption Scheme With Message Linkages and Low Communication Costs. J. Inf. Sci. Eng. 18(1): 41-46 (2002) - [j20]Hung-Yu Chien, Jinn-Ke Jan, Yuh-Min Tseng:
Forgery attacks on "Multisignature schemes for authenticating mobile code delegates". IEEE Trans. Veh. Technol. 51(6): 1669-1671 (2002) - 2001
- [j19]Yuh-Min Tseng, Jinn-ke Jan:
Generalized group-oriented cryptosystem with authenticated sender. Comput. Syst. Sci. Eng. 16(5): 291-294 (2001) - [j18]Yuh-Min Tseng, Jinn-ke Jan, Hung-Yu Chien:
On the Security of Methods for Protecting Password Transmission. Informatica 12(3): 469-476 (2001) - [j17]Hung-Yu Chien, Tzong-Chen Wu, Jinn-ke Jan, Yuh-Min Tseng:
Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols. Inf. Process. Lett. 80(2): 113-117 (2001) - [j16]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
A modified remote login authentication scheme based on geometric approach. J. Syst. Softw. 55(3): 287-290 (2001) - 1999
- [j15]Yuh-Min Tseng, Jinn-ke Jan:
Anonymous conference key distribution systems based on the discrete logarithm problem. Comput. Commun. 22(8): 749-754 (1999) - [j14]Yuh-Min Tseng, Jinn-ke Jan:
Attacks on Threshold Signature Schemes with Traceable Signers. Inf. Process. Lett. 71(1): 1-4 (1999) - [j13]Yuh-Min Tseng, Jinn-ke Jan:
A Novel ID-based Group Signature. Inf. Sci. 120(1-4): 131-141 (1999) - [j12]Shiuh-Jeng Wang, Jinn-ke Jan:
A displacement addressing method for letter-oriented keys. J. Syst. Softw. 46(1): 77-88 (1999) - 1998
- [j11]Yuh-Min Tseng, Jinn-ke Jan:
A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. Inf. Sci. 112(1-4): 199-211 (1998) - [j10]Jinn-ke Jan, Yu-Yi Chen:
"Paramita wisdom" password authentication scheme without verification tables. J. Syst. Softw. 42(1): 45-57 (1998) - 1997
- [j9]Chin-Chen Chang, Jinn-Ke Jan, Huey-Cheue Kowng:
A Digital Signature Scheme Based upon the Theory of Quadratic residues. Cryptologia 21(1): 55-70 (1997) - [j8]Jinn-ke Jan, Chih-Chang Tai:
A secure electronic voting protocol with IC cards. J. Syst. Softw. 39(2): 93-101 (1997) - 1996
- [j7]Jinn-ke Jan, Yuh-Min Tseng:
On the Security of Image Encryption Method. Inf. Process. Lett. 60(5): 261-265 (1996) - 1995
- [j6]Jinn-ke Jan, Min-Jinn Jan:
A New Dynamic Access Control Method Using Binary Locks. J. Inf. Sci. Eng. 11(3): 371-389 (1995) - 1994
- [j5]Chin-Chen Chang, Jinn-Ke Jan, Daniel J. Buehrer:
A scheme to determine the relationship between two users in a hierarchy. Comput. Secur. 13(3): 255-261 (1994) - 1993
- [j4]Jinn-Ke Jan, Chin-Chen Chang:
A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files. BIT 33(3): 382-389 (1993) - 1991
- [j3]Chin-Chen Chang, C. Y. Chen, Jinn-Ke Jan:
On the Design of a Machine-Independent Perfect Hashing Scheme. Comput. J. 34(5): 469-474 (1991) - [j2]Jinn-Ke Jan, Chin-Chen Chang, S. J. Wang:
A dynamic key-lock-pair access control scheme. Comput. Secur. 10(2): 129-139 (1991) - 1990
- [j1]Jinn-ke Jan:
A single-key access control scheme in information protection systems. Inf. Sci. 51(1): 1-11 (1990)
Conference and Workshop Papers
- 2016
- [c21]Jau-Ji Shen, Chun-Hsiu Yeh, Jinn-Ke Jan:
Effective quality improvement of upscaled images by differential image scheme. ICNC-FSKD 2016: 1887-1892 - 2015
- [c20]Chun-Hsiu Yeh, Jau-Ji Shen, Jinn-Ke Jan:
Equalized CR-dropping for Image Compression. IIH-MSP 2015: 121-124 - 2012
- [c19]Jinn-Ke Jan, Jau-Ji Shen, Chun-Hsiu Yeh:
Two Phased Decompression Scheme for Quality Improvement of Vector Quantized Images. ICGEC 2012: 161-164 - 2011
- [c18]Yu-Yi Chen, Zhen-Jie Qiu, Jun-Chao Lu, Jinn-ke Jan:
A Secure RFID Deactivation/Activation Mechanism for Customer Service and Consumer Shopping. BWCCA 2011: 405-410 - [c17]Jun-Chao Lu, Yu-Yi Chen, Jinn-ke Jan:
A secure negotiable on-demand services model for cloud environment. EUROCON 2011: 1-4 - [c16]Jun-Chao Lu, Yu-Yi Chen, Jing-Min Wang, Jinn-Ke Jan, Chih-Cheng Chen, Yeong-Lin Lai:
Study and Implementation of RFID Eseals for Power Meters. IBICA 2011: 352-355 - 2010
- [c15]Chin-Ling Chen, Jinn-ke Jan, Chih-Feng Chien:
Based on Mobile RFID Device to Design a Secure Mutual Authentication Scheme for Market Application. BWCCA 2010: 423-428 - [c14]Chin-Ling Chen, Jinn-ke Jan, Chih-Feng Chien:
Using Mobile Device to Design a Secure Transaction. CISIS 2010: 833-838 - 2009
- [c13]Yu-Yi Chen, Jun-Chao Lu, Shin-I Chen, Jinn-ke Jan:
A Low-cost RFID Authentication Protocol with Location Privacy Protection. IAS 2009: 109-113 - 2007
- [c12]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Iuon-Chang Lin:
A Flexible Fragile Watermarking Scheme for Binary Images with Reversibility. IIH-MSP 2007: 501-504 - [c11]Chung-Chuan Wang, Chin-Chen Chang, Xinpeng Zhang, Jinn-ke Jan:
Senary Huffman Compression - A Reversible Data Hiding Scheme for Binary Images. MCAM 2007: 351-360 - [c10]Chin-Ling Chen, Yu-Yi Chen, Jinn-ke Jan:
A Secure Authentication Scheme for a Public Terminal Before a Transaction. NBiS 2007: 118-126 - 2006
- [c9]Chun-Hua Chen, Jinn-ke Jan, Chao-Hsing Hsu:
One-Server Private Information Retrieval Scheme combined with Mutual Authentication by ElGamal Signature. ICICIC (3) 2006: 300-303 - [c8]Chung-Chuan Wang, Chin-Chen Chang, Jinn-ke Jan, Jieh-Shan Yeh:
Novel Steganographic Schemes Based on Row-Major Mapping Relation. IIH-MSP 2006: 392-395 - 2004
- [c7]Jinn-ke Jan, Yi-Hwa Chen:
A New Efficient MAKEP for Wireless Communications. AINA (2) 2004: 347-350 - [c6]Fuw-Yi Yang, Jinn-ke Jan:
A Secure Scheme for Restrictive Partially Blind Signatures. iiWAS 2004 - [c5]Fuw-Yi Yang, Jinn-ke Jan:
An Efficient Group Signature Based on the Discrete Logarithm Problem. iiWAS 2004 - 2001
- [c4]Hung-Yu Chien, Jinn-ke Jan, Yuh-Min Tseng:
RSA-Based Partially Blind Signature with Low Computation. ICPADS 2001: 385-389 - [c3]Whe Dar Lin, Jinn-ke Jan:
A Wireless-based Authentication and Anonymous Channels for Large Scale Area. ISCC 2001: 36-41 - 1999
- [c2]Jinn-ke Jan, Yuh-Min Tseng:
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. ICPP Workshops 1999: 198-203 - 1998
- [c1]Yuh-Min Tseng, Jinn-ke Jan:
ID-Based Cryptographic Schemes Using a Non-Interactive Public-Key Distribution System. ACSAC 1998: 237-243
Informal and Other Publications
- 2011
- [i6]Jun-Chao Lu, Yu-Yi Chen, Zhen-Jie Qiu, Jinn-ke Jan:
A Secure RFID Deactivation/Activation Mechanism for Supporting Customer Service and Consumer Shopping. CoRR abs/1105.3790 (2011) - 2004
- [i5]Fuw-Yi Yang, Jinn-ke Jan:
A Provably Secure Scheme for Restrictive Partially Blind Signatures. IACR Cryptol. ePrint Arch. 2004: 37 (2004) - [i4]Fuw-Yi Yang, Jinn-ke Jan:
A Secure and Efficient Key Exchange Protocol for Mobile Communications. IACR Cryptol. ePrint Arch. 2004: 167 (2004) - [i3]Fuw-Yi Yang, Jinn-ke Jan:
A Provable Secure Scheme for Partially Blind Signatures. IACR Cryptol. ePrint Arch. 2004: 230 (2004) - [i2]Fuw-Yi Yang, Jinn-ke Jan:
An Enhanced and Secure Protocol for Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2004: 270 (2004) - [i1]Fuw-Yi Yang, Jinn-ke Jan, Woei-Jiunn Jeng:
Cryptanalysis of a threshold proxy signature with known signers. IACR Cryptol. ePrint Arch. 2004: 313 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint