[go: up one dir, main page]

Follow
Chun-I Fan
Chun-I Fan
Distinguished Professor, National Sun Yat-sen University
Verified email at mail.cse.nsysu.edu.tw - Homepage
Title
Cited by
Cited by
Year
A practical privacy-preserving data aggregation (3PDA) scheme for smart grid
Y Liu, W Guo, CI Fan, L Chang, C Cheng
IEEE Transactions on Industrial Informatics 15 (3), 1767-1774, 2018
3162018
Privacy-enhanced data aggregation scheme against internal attackers in smart grid
CI Fan, SY Huang, YL Lai
IEEE Transactions on Industrial informatics 10 (1), 666-675, 2013
2782013
Robust remote authentication scheme with smart cards
CI Fan, YC Chan, ZK Zhang
Computers & Security 24 (8), 619-628, 2005
2222005
Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics
CI Fan, YH Lin
IEEE Transactions on Information Forensics and Security 4 (4), 933-945, 2009
2102009
Anonymous multireceiver identity-based encryption
CI Fan, LY Huang, PH Ho
IEEE Transactions on Computers 59 (9), 1239-1249, 2010
1642010
Malware detection systems based on API log data mining
CI Fan, HW Hsiao, CH Chou, YF Tseng
2015 IEEE 39th annual computer software and applications conference 3, 255-260, 2015
1162015
A privacy-preserving federated learning system for android malware detection based on edge computing
RH Hsu, YC Wang, CI Fan, B Sun, T Ban, T Takahashi, TW Wu, SW Kao
2020 15th Asia Joint Conference on Information Security (AsiaJCIS), 128-136, 2020
992020
Low-computation partially blind signatures for electronic cash
CI Fan, CL Lei
IEICE Transactions on Fundamentals of Electronics, Communications and …, 1998
931998
Arbitrary-state attribute-based encryption with dynamic membership
CI Fan, VSM Huang, HM Ruan
IEEE Transactions on Computers 63 (8), 1951-1961, 2013
832013
Randomization enhanced Chaum's blind signature scheme
CI Fan, WK Chen, YS Yeh
Computer Communications 23 (17), 1677-1680, 2000
812000
Provably secure and generalized signcryption with public verifiability for secure data transmission between resource-constrained IoT devices
A Karati, CI Fan, RH Hsu
IEEE Internet of Things Journal 6 (6), 10431-10440, 2019
722019
Efficient blind signature scheme based on quadratic residues
CI Fan, CL Lei
Electronics Letters 32 (9), 811-813, 1996
661996
Provably secure randomized blind signature scheme based on bilinear pairing
CI Fan, WZ Sun, VSM Huang
Computers & Mathematics with Applications 60 (2), 285-293, 2010
642010
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
CI Fan, SY Huang
Future Generation Computer Systems 29 (7), 1716-1724, 2013
622013
Cross-Network-Slice Authentication Scheme for the 5th Generation Mobile Communication System
CI Fan, YT Shih, JJ Huang, WR Chiu
IEEE Transactions on Network and Service Management 18 (1), 701-712, 2021
582021
An extended multi-server-based user authentication and key agreement scheme with user anonymity
CT Li, CC Lee, CY Weng, CI Fan
KSII Transactions on Internet and Information Systems (TIIS) 7 (1), 119-131, 2013
552013
User efficient blind signatures
CI Fan, CL Lei
Electronics letters 34 (6), 544-546, 1998
511998
Encrypted data deduplication in cloud storage
CI Fan, SY Huang, WC Hsu
2015 10th Asia joint conference on information security, 18-25, 2015
462015
Secure hierarchical bitcoin wallet scheme against privilege escalation attacks
CI Fan, YF Tseng, HP Su, RH Hsu, H Kikuchi
International Journal of Information Security 19 (3), 245-255, 2020
432020
Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings.
CI Fan, RH Hsu, PH Ho
J. Inf. Sci. Eng. 27 (3), 969-982, 2011
432011
The system can't perform the operation now. Try again later.
Articles 1–20