**
**

** Dr. ****Yuh-Min
Tseng**

Vice president

Dean, College of Science

Professor,
Department of Mathematics

National Changhua University of
Education, Taiwan

E-mail: ymtseng@cc.ncue.edu.tw or yuhmintseng@gmail.com

Chinese
Web-site: http://www.math.ncue.edu.tw/~ymtseng/

**Resume**

**Yuh-Min Tseng **received
the B.S. degree from National Chiao Tung University, Hsinchu, Taiwan, in 1988;
the M.S. degree from National Taiwan University, Taipei, Taiwan, in 1990 and
the Ph.D. degree from National Chung Hsing University, Taichung, Taiwan, in
1999. He is currently a Professor with the Department of Mathematics, National
Changhua University of Education, Changhua, Taiwan. Prof. Tseng is a member of
the IEEE Computer Society, IEEE Communications Society, and the Chinese
Cryptology and Information Security Association (CCISA). In 2006, he was the
recipient of the Wilkes Award from the British Computer Society. He has
published over 100 scientific journal papers on various research areas of
cryptography, information security and network security. He serves as an Editor
of several international journals: *
Wireless networks, Computer
Standards & Interfaces*, *International Journal of Security
and Its Applications*, *ISRN Communications and
Networking * , *International Journal of
Intelligent Information Processing* , *International Journal of Advancements in
Computing Technology*, *Journal of Current Engineering
Research*, *Information
Sciences Letters*, *Journal
of Engineering and **International
Journal of Computer Mathematics**. *His research interests include cryptography, information
security, and network security.

**(A)** **Referred Journal Papers: **

1. __
Y.M. Tseng*,__
J.L. Chen and S.S. Huang, "A lightweight leakage-resilient identity-based
mutual authentication and key exchange protocol for resource-limited devices",
*Computer Networks*, Accepted, 2021. (*Corresponding author) (SCI)
(MOST 108-2221-E-018-004-MY2).

2.
A.L. Peng, __Y.M. Tseng*__ and S.S. Huang, "An efficient leakage-resilient
authenticated key exchange protocol suitable for IoT devices", *IEEE Systems
Journal*, Accepted (DOI: 10.1109/JSYST.2020.3038216), 2021. (*Corresponding
author) (SCI)
(MOST 108-2221-E-018-004-MY2).

3. Y.H. Chuang __
and Y.M. Tseng*__,
"CAKE: Compatible authentication and key exchange protocol for a smart city in
5G networks", *Symmetry*, vol. 13, Article
698, 2021. (*Corresponding author)
(SCI)
(MOST 108-2221-E-018-004-MY2).

4. __
Y.M. Tseng*__,
J.D. Wu,
S.S. Huang and T.T. Tsai, "Leakage-resilient outsourced revocable
certificateless signature with a cloud revocation server", *Information
Technology and Control*, vol. 49, no. 4, pp.
464-481, 2020. (*Corresponding author) (SCI)
(MOST 108-2221-E-018-004-MY2).

5.
T.C.
Hsieh,
__Y.M. Tseng*__, and S.S. Huang, "A leakage-resilient certificateless
authenticated key exchange protocol withstanding side-channel attacks", *IEEE
Access*, vol. 8, pp.121795-121810, 2020. (*Corresponding author)
(SCI)
(MOST 108-2221-E-018-004-MY2).

6. J.D. Wu,
__Y.M. Tseng*__, S.S. Huang and T.T. Tsai, "Leakage-resilient
certificate-based key encapsulation scheme resistant to continual leakage", *
IEEE Open Journal of the Computer Society*, vol. 1, pp.131-144,
2020. (*Corresponding author)
(MOST 108-2221-E-018-004-MY2).

7. J.D. Wu,
__Y.M. Tseng*__, S.S. Huang and T.T. Tsai, "Leakage-resilient
revocable identity-based signature with cloud revocation authority",
*
Informatica*,
vol. 31, no. 3, pp.
597-620, 2020. (*Corresponding author) (SCI)
(MOST 108-2221-E-018-004-MY2).

8. J.D. Wu,
__Y.M. Tseng*__ and S.S. Huang, "An identity-based authenticated key exchange
protocol resilient to continuous key leakage",* IEEE Systems Journal*, vol.
13, no. 4, pp.
3968-3979, 2019. (*Corresponding author) (SCI)
(MOST 108-2221-E-018-004-MY2).

9. __
Y.M. Tseng*__, T.T. Tsai,
J.D. Wu
and S.S. Huang, "Efficient certificate-based signature with short
key and signature sizes
from lattices", *
Informatica*,
vol. 30, no. 3, pp.
595-612, 2019. (*Corresponding author) (SCI)
(MOST 106-2221-E-018-007-MY2).

10. J.D. Wu,
__Y.M. Tseng*__, S.S. Huang and T.T. Tsai, "Leakage-resilient
certificate-based signature resistant to side-channel attacks", *IEEE Access*,
vol. 7, no. 1, pp.
19041-19053, 2019. (*Corresponding author) (SCI)
(MOST 106-2221-E-018-007-MY2).

11. __
Y.M. Tseng*__, T.T. Tsai, S.S. Huang and C.P.
Huang, "Identity-based encryption with cloud revocation authority and its
applications", *IEEE Transactions on Cloud Computing*, vol. 6, no. 4, pp.
1041-1053,
2018. (SCI)
(MOST 103-2221-E-018 -022 -MY2).

12. J.D. Wu,
__Y.M. Tseng*__ and S.S. Huang, "Leakage-resilient
certificateless signature under continual leakage model",
*Information Technology and Control*, vol. 47, no. 2, pp. 363-386, 2018.
(*Corresponding author) (SCI)
(MOST 106-2221-E-018-007-MY2).

13. J.D. Wu,
__Y.M. Tseng*__, S.S. Huang and W.C. Chou, "Leakage-resilient certificateless
key encapsulation scheme", *
Informatica*, vol. 29, no. 1, pp. 125-155, 2018.
(*Corresponding author) (SCI)
(MOST 106-2221-E-018-007-MY2).

14. J.D. Wu,
__Y.M. Tseng*__ and S.S. Huang, "Efficient leakage-resilient authenticated
key agreement protocol in the continual leakage eCK model", *IEEE Access*,
vol. 6, no.1, pp.
17130-17142,
2018. (*Corresponding author) (SCI)
(MOST 106-2221-E-018-007-MY2)

15.
Y.H. Hung, __Y.M. Tseng*__ and S.S. Huang,
“Lattice-based revocable
certificateless signature”, *Symmetry*, vol. 9, Article ID
242, 2017. (*Corresponding author)
(SCI)
(MOST 106-2221-E-018-007-MY2).

16.
Y.H. Hung, S.S. Huang, __Y.M. Tseng*__ and
T.T. Tsai, “Efficient anonymous multireceiver
certificateless encryption”, *IEEE Systems Journal*,
vol. 11, no. 4, pp. 2602-2613,
2017. (*Corresponding author) (SCI)
(MOST 103-2221-E-018 -022 -MY2).

17. T.Y. Wu, __
Y.M. Tseng*__, S.S. Huang
and Y.C. Lai, “Non-repudiable
provable data possession scheme with designated verifier in cloud storage
systems”, *IEEE Access*,
vol. 5, pp. 19333-19341,
2017. (*Corresponding author) (SCI)
(MOST 106-2221-E-018-007-MY2)

18.
C. Meshram, __Y.M. Tseng__, C.C. Lee, S. Meshram, "An IND-ID-CPA secure
ID-based cryptographic protocol using GDLP and IFP", *
Informatica*,
vol. 28, no. 3, pp. 471-484, 2017,
2017. (SCI)

19. __
Y.M. Tseng*__, S.S. Huang, and
M.L. You,
"Strongly secure ID-based authenticated key agreement protocol for mobile
multi-server environments",* International Journal of Communication Systems*,
vol. 30, no.11, e3251,
2017. (DOI:
10.1002/dac.3251)
(*Corresponding author) (SCI)
(MOST 105-2221-E-018 -013).

20.
Y.H. Hung, __Y.M. Tseng*__ and S.S. Huang,
“Revocable ID-based signature with
short size over lattices”, *Security and Communication Networks*, vol.
2017, Article ID
7571201,
9 pages, 2017. (*Corresponding author) (SCI)
(MOST 105-2221-E-018 -013).

21.
T.T. Tsai, S.S. Huang, and __Y.M. Tseng*__, "SIBSC:
separable identity-based signcryption for resource-constrained devices",
*
Informatica*,
vol. 28, no. 1, pp. 193-214,
2017. (*Corresponding author) (SCI)
(MOST 103-2221-E-018 -022 -MY2).

22. J.D. Wu,
__Y.M. Tseng*__, and S.S. Huang, "Leakage-resilient ID-based signature scheme
in the generic bilinear group model", *Security and Communication Networks*,
vol. 9, no. 17, pp. 3987-4001, 2016. (*Corresponding author) (SCI)
(MOST 105-2221-E-018 -013).

23.
Y.H. Hung, __Y.M. Tseng*__ and
S.S. Huang,
“A revocable certificateless short
signature scheme and its authentication application”, *
Informatica*,
vol. 27, no. 3, pp. 549-572, 2016. (*Corresponding author) (SCI)
(MOST 103-2221-E-018 -022 -MY2).

24.
Y.H. Hung, S.S. Huang and __Y.M. Tseng*__
“A short certificate-based
signature scheme with provable security”, *Information Technology and Control*,
vol. 45, no. 3, pp. 243-253, 2016. (*Corresponding author) (SCI)
(MOST 103-2221-E-018 -022 -MY2).

25. __
Y.M. Tseng*__, S.S. Huang,
T.T. Tsai, and J.H. Ke, "List-free ID-based mutual
authentication and key agreement protocol for multi-server architectures", *
IEEE Transactions on Emerging Topics in Computing*, vol. 4, no. 1, pp.
102-122,
2016. (*Corresponding author) (SCI)
(MOST 103-2221-E-018 -022 -MY2).

26. T.T. Tsai, __Y.M. Tseng*__
and S.S. Huang, “Efficient revocable certificateless public key encryption with
a delegated revocation authority”, *Security and Communication Networks*,
vol. 8, no. 18, pp. 3713-3725, 2015. (*Corresponding author) (SCI)
(MOST 103-2221-E-018 -022 -MY2).

27.
Y.H. Hung, S.S. Huang, __Y.M. Tseng*__ and
T.T. Tsai, “Certificateless signature with
strong unforgeability in the standard model”, *
Informatica*,
vol. 26, no. 4, pp. 663-684, 2015. (*Corresponding author) (SCI)
(MOST 103-2221-E-018 -022 -MY2).

28. T.T. Tsai and __
Y.M. Tseng*__,
“Revocable certificateless public
key encryption”, *IEEE Systems Journal*, vol. 9, no. 3, pp. 824-833, 2015. (*Corresponding
author) (SCI)
(MOST103-2221-E-018-022-MY2)

29. __
Y.M. Tseng*__,
T.T. Tsai and S.S. Huang,
“Leakage-free
ID-based signature”,* The Computer Journal*, vol. 58, no. 4, pp. 750-757,
2015. (*Corresponding author) (SCI)
(MOST103-2221-E-018-022-MY2)

30. __
Y.M. Tseng*__,
S.S. Huang,
T.T. Tsai and L. Tseng, “A
novel ID-based authentication and key exchange protocol resistant to ephemeral
secret leakage attacks for mobile devices”, *International Journal of
Distributed Sensor Networks, *vol. 2015, Article ID 898716, 12 pages, 2015. (DOI**:**
10.1155/2015/898716).
(*Corresponding author) (SCI)
(MOST103-2221-E-018-022-MY2)

*
31. *__
Y.M. Tseng*__,
T.T. Tsai and
S.S. Huang,
“Enhancement on strongly secure
group key agreement”,* Security and Communication Networks*, vol. 8, no. 2,
pp. 126-135, 2015.
(*Corresponding author) (SCI)
(NSC102-2221-E-018 -019)

32. T.T. Tsai,
S.S. Huang
and __Y.M. Tseng*__, “Secure
certificateless signature with revocation in the standard model”,
*
Mathematical Problems in Engineering*, vol. 2014, Article ID 728591,
16 pages, 2014. (DOI**:**
10.1155/2014/728591).
(*Corresponding author) (SCI)
(MOST103-2221-E-018-022-MY2)

33. T.T. Tsai, __
Y.M. Tseng*__
and
S.S. Huang,
“Efficient
strongly unforgeable ID-based signature without random oracles”, *
Informatica*,
vol. 25, no. 3, pp. 505-521, 2014. (*Corresponding author) (SCI)
(NSC101-2221-E-018 -027)

34.
Y.H. Hung,
T.T. Tsai,
__Y.M. Tseng*__ and S.S. Huang,
“Strongly secure revocable
ID-based signature without random oracles”, *Information Technology and
Control*, vol. 43, no. 3, pp. 264-276, 2014. (*Corresponding
author) (SCI)
(NSC102-2221-E-018-019)

35. T.Y. Wu, T.T. Tsai and __
Y.M. Tseng*__,
“Efficient searchable ID-based
encryption with a designated server”, *Annals of telecommunications*, vol.
69, no. 7, pp. 391-402, 2014. (*Corresponding author) (SCI)
(NSC101-2221-E-018-027)

36. __
Y.M. Tseng*__,
Y.H. Huang and H.J. Chang, “Privacy-preserving multi-receiver ID-based
encryption with provable security”, *International Journal of Communication
Systems*, vol. 27, no. 7, pp.1034-1050, 2014. (*Corresponding author) (SCI)
(NSC101-2221-E-018-027)

37. T.Y. Wu, T.T. Tsai and __
Y.M. Tseng__,
“A provably secure revocable
ID-based authenticated group key exchange protocol with identifying malicious
participants”, *Scientific World Journal*, vol. 2014, Article ID 367264,
2014. doi:10.1155/2014/367264.
(NSC102-2221-E-018 -019)

38. T.T. Tsai, __
Y.M. Tseng*__
and T.Y. Wu, “RHIBE:
Constructing revocable hierarchical ID-based encryption from HIBE”, *
Informatica*,
vol. 25, no. 2, pp. 299-326, 2014. (*Corresponding author) (SCI)
(NSC100-2221-E-018 -027)

39.
T.Y. Wu and __
Y.M. Tseng*__,
“Publicly verifiable
multi-secret sharing scheme from bilinear pairings”, *IET Information Security*,
vol. 7, no. 3, pp. 239-246,
2013.
(*Corresponding author)
(SCI)
(NSC101-2221-E-018-027)

40. T.T. Tsai, __
Y.M. Tseng*__
and T.Y. Wu, “Provably
secure revocable ID-based signature in the standard model”, *Security and
Communication Networks*, vol. 6, no. 10, pp. 1250-1260, 2013.
(*Corresponding author)
(SCI)
(NSC101-2221-E-018 -027)

41. T.T. Tsai, __
Y.M. Tseng*__
and T.Y. Wu, “Efficient
revocable multi-receiver ID-based encryption”, *Information Technology and
Control*, vol. 42, no. 2, pp. 159-169, 2013. (*Corresponding author) (SCI)
(NSC101-2221-E-018-027)

42. T.Y. Wu and __
Y.M. Tseng*__,
“Further analysis of pairing-based
traitor tracing schemes for broadcast encryption”, *Security and Communication
Networks*, vol. 6, no. 1, pp. 28-32, 2013. (*Corresponding author) (SCI)
(NSC97-2221-E-018 -027)

43.
T.Y. Wu, __
Y.M. Tseng*__
and T.T. Tsai, “A
revocable ID-based authenticated group key exchange protocol with resistant to
malicious participants”, *
Computer Networks*,
vol. 56, no. 12, pp. 2994-3006, 2012. (*Corresponding author)
(SCI)
(NSC101-2221-E-018-027)

44. T.T. Tsai, __
Y.M. Tseng*__
and T.Y. Wu, “A
fully secure revocable ID-based encryption in the standard model”, *
Informatica*,
vol. 23, no. 3, pp. 487-505, 2012. (*Corresponding author) (SCI)
(NSC100-2221-E-018 -027)

45. T.Y. Wu, T.T. Tsai and __Y.M. Tseng__, “A revocable ID-based signcryption
scheme”, *Journal of Information Hiding and Multimedia Signal Processing*,
vol. 3, no. 3, pp. 240-251, 2012. (EI)

46. __
Y.M. Tseng*__, C.H. Yu and
T.Y. Wu,
"Towards scalable key management for secure multicast communication",*
Information Technology and Control*, vol. 41, no. 2, pp. 173-182, 2012.
(*Corresponding author) (SCI)
(NSC97-2221-E-018-010-MY3)

47. __
Y.M. Tseng*__
and T.T. Tsai, “Efficient revocable ID-based encryption with a public channel”,
*
The Computer Journal*,
vol. 55, no. 4, pp. 475-486, 2012. (*Corresponding author) (SCI)
(NSC100-2221-E-018 -027)

48.
C.L. Chen, C.C. Lee, __Y.M. Tseng__ and T.T. Chou, “A private online system
for executing wills based on a secret sharing mechanism”, *Security and
Communication Networks*, vol. 5, no. 7, pp. 725-737, 2012. (SCI)

49. T.Y. Wu and __
Y.M. Tseng*__,
“Towards ID-based authenticated
group key exchange protocol with identifying malicious participants”, *
Informatica*, vol. 23, no. 2, pp. 315-334,
2012. (*Corresponding author) (SCI)
(NSC97-2221-E-018-010-MY3)

50.
Y.H. Chuang, __Y.M. Tseng__ and C.-L. Lei, “Efficient mutual authentication
and key agreement with user anonymity for roaming services in global mobility
networks”, *International Journal of Innovative Computing Information and
Control*, vol. 8, no. 9, pp. 6415-6428, 2012. (SCI)

51. Y.H. Chuang and __
Y.M. Tseng*__,
“Towards generalized ID-based user
authentication for mobile multi-server environment”, *International Journal of
Communication Systems*, vol. 25, no. 4, pp. 447-460, 2012. (*Corresponding
author) (SCI)
(NSC97-2221-E-018-010-MY3)

52.
T.Y. Wu, __Y.M. Tseng*__ and C.W. Yu, “ID-based key-insulated signature
scheme with batch verifications and its novel application”, *International
Journal of Innovative Computing Information and Control*, vol. 8, no. 7(A),
pp. 4797-4810, 2012. (*Corresponding author) (SCI)
(NSC100-2221-E-018-027)

53. T.Y. Wu, __Y.M. Tseng____*__
and C.W. Yu, “Two-round
contributory group key exchange protocol for wireless network environments”,
*
EURASIP Journal on Wireless Communications and Networking*,
2011:12, 2011. (*Corresponding author)
(SCI)
(NSC97-2221-E-018-010-MY3)

54. T.Y. Wu, __Y.M. Tseng____*__
and C.W. Yu, “A secure ID-based authenticated group key exchange protocol
resistant to insider attacks”, *
Journal of Information Science and Engineering*,
vol. 27, no. 3, pp. 915-932, 2011. (*Corresponding author) (SCI)
(NSC97-2221-E-018-010-MY3)

55. __
Y.M. Tseng*__
and F.G. Chen, “A free-rider aware reputation system for peer-to-peer file
sharing networks”, *Expert Systems with Applications*,
vol. 38, no. 3, pp. 2432-2440, 2011.
(SCI) (NSC97-2221-E-018-010-MY3)

56. T.Y. Wu and __Y.M. Tseng*__, “A pairing-based publicly verifiable secret
sharing scheme”, *Journal of Systems Science and Complexity*,**
vol. 24, no. 1, pp. 186-194, 2011**. (* Corresponding author)
(SCI) (NSC97-2221-E-018-010-MY3)

57. T.C. Yeh, C.H. Wu, and __
Y.M. Tseng__,
“Improvement of the RFID authentication scheme based on quadratic residue”, *
Computer Communications*,
vol. 34, no. 3, pp. 337-341, 2011.
(SCI)

58.
T.Y. Wu and __
Y.M. Tseng*__,
“An efficient user authentication and key exchange protocol for mobile
client-server environment”, *Computer Networks*,
**
vol. 54, no. 9, pp. 1520-1530, 2010. **
(* Corresponding author)
(SCI)
(NSC97-2221-E-018-010-MY3)

59.
T.Y. Wu and __
Y.M. Tseng*__,
“An ID-based mutual authentication and key exchange protocol for low-power
mobile devices”, *
The Computer Journal*, vol. 53, no. 7, **pp.
**1062-1070**, 2010.
**(* Corresponding author)
(SCI)
(NSC97-2221-E-018-010-MY3)

60. __
Y.M. Tseng*__
and T.Y. Wu, “Analysis and improvement on a contributory group key exchange
protocol based on the Diffie-Hellman technique”, *Informatica*, vol. 21, no. 2, pp. 247-258,
2010. (SCI)
(NSC97-2221-E-018-010-MY3)

61. Y.H. Chuang and __
Y.M. Tseng*__,
"An efficient dynamic group key agreement protocol for imbalanced wireless
networks", *International Journal of Network Management*,
**
vol. 20, no.
4, pp. 167-180, 2010**.
(* Corresponding author) (SCI)
(NSC97-2221-E-018-010-MY3)

62. T.Y. Wu and __
Y.M. Tseng*__,
“Comments on an ID-based authenticated group key agreement protocol with
withstanding insider attacks”, *IEICE Trans. on Fundamentals of Electronics,
Communications of Computer*,**
vol. E92-A, no.10, pp. 2638-2640, 2009.**
(* Corresponding author)
(SCI) (NSC97-2221-E-018-010-MY3)

63. __
Y.M. Tseng*__,
T.Y. Wu and J.D. Wu, “An efficient and provably secure ID-based signature scheme
with batch verifications”, **
International
Journal of Innovative Computing, Information and Control,
**
vol. 5, no. 11,
pp.3911-3922,

64. __
Y.M. Tseng__,
“USIM-based EAP-TLS authentication protocol for wireless local area networks",
*
Computer Standards & Interfaces*,
vol. 31, no. 1,
pp.128-136,
2009.
(SCI)
(NSC97-2221-E-018-010-MY3)

65. __
Y.M. Tseng__, T.Y. Wu and J.D. Wu, “Forgery attacks on an
ID-based partially blind signature scheme”, *IAENG* *International
Journal of Computer Science*,
vol. 35, no. 3,
pp.301-304, 2008. (EI)
(NSC95-2221-E-018-010-MY2)

66. __
Y.M. Tseng*__,
T.Y. Wu
and
J.D. Wu, “A pairing-based user authentication scheme for wireless clients with
smart cards”, *
Informatica*, vol. 19, no. 2, pp. 285-302,
2008. (SCI)
(NSC95-2221-E-018-010-MY2)

67. __
Y.M. Tseng__, “A resource-constrained group key agreement
protocol for imbalanced wireless networks”, *Computers & Security*,
vol. 26, no. 4, pp. 331-337, 2007. (SCI)
(NSC95-2221-E-018-010-MY2)

68. __
Y.M. Tseng__, “A communication-efficient and
fault-tolerant conference-key agreement protocol with forward secrecy”, *
Journal of Systems and Software*,
vol. 80, no. 7, pp. 1091-1101, 2007. (SCI)
(NSC95-2221-E-018-010-MY2)

69. __
Y.M. Tseng__, “A secure authenticated group key agreement
protocol for resource-limited mobile devices”, *The Computer Journal*, vol.
50, no.1, pp. 41-52, 2007.
(NSC94-2213-E-018-009) (SCI)
(NSC95-2221-E-018-010-MY2)

70.
H.C. Lin and __
Y.M. Tseng*__,
”A scalable ID-based pairwise key establishment protocol for wireless sensor
networks”, *Journal of Computers*,
vol. 18, no. 2, pp. 13-24 , 2007. (* Corresponding author) (ISSN:1991-1599)
(NSC94-2213-E-018-010)

71. __
Y.M. Tseng__, “An efficient two-party identity-based key
exchange protocol”, *
Informatica*,
vol. 18, no. 1, pp. 125-136, 2007.
(NSC95-2221-E-018-010-MY2)
(SCI)

72. __
Y.M. Tseng__,
“A
heterogeneous-network aided public-key management scheme for mobile ad hoc
networks”, *
International Journal of Network Management*,
vol.17, no.1, pp. 3-15, 2007. (NSC94-2213-E-018-010)
(SCI)

73. __
Y.M. Tseng__, “GPRS/UMTS-aided authentication protocol
for wireless LANs”, *IEE Proceedings - Communications*, vol.153, no.6, pp.
810-817, 2006.
(NSC94-2213-E-018-009) (SCI)

74. __
Y.M. Tseng__,
“A robust multi-party key agreement protocol resistant to malicious
participants", *The Computer Journal*, vol. 48, no. 4, pp. 480-487, 2005.
(NSC93-2213-E-018-011)
(SCI) (This paper wins the runner-up paper of the Wilkes Award).

75. __
Y.M. Tseng__,
“An improved conference-key agreement protocol with forward secrecy",*
Informatica*,
vol. 16, no. 2, pp. 275-284,
2005. (SCI)
(NSC93-2213-E-018-011)

76. __
Y.M. Tseng__,
“Efficient authenticated key agreement protocols resistant to a
denial-of-service attack", *
International Journal of Network Management*,
vol. 15, no. 3, pp. 193-202,
2005.
(ISSN:1055-7148)
(SCI)
(NSC93-2213-E-018-011)

77. __
Y.M. Tseng__,
C.C. Yang and J.H. Su, “Authentication
and billing protocols for the integration of WLAN and 3G networks", *Wireless
Personal Communications*,
vol. 29, no. 3-4, pp. 351-366, 2004.
(SCI) (NSC92-2213-E-018-014)

78. __
Y.M. Tseng__,
"On
the security of an efficient two-pass key agreement protocol", *
Computer Standards & Interfaces*,
vol. 26, no. 4, pp. 371-374, 2004.
(SCI) (NSC92-2213-E-018-014)

79. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, “Solving
the invalid signer-verified signature problem and comments on Xia-You’s group
signature”, *Journal of Systems and Software*, vol. 73, no. 3, pp. 369-373,
2004.
(SCI, EI)

80. __
Y.M. Tseng__,
“A cryptographic key assignment scheme for access control in a hierarchy with
exceptions”, *Journal of Discrete Mathematical Sciences & Cryptography*,
vol. 7, no. 1, pp. 121-132, 2004.
(EI) (NSC92-2213-E-018-014)

81. Y.Y. Chen, J.K. Jan, __Y.M. Tseng__, and C.L. Chen, “Cryptanalysis of a
blind signature scheme based on ElGamal signature”, *Journal of Engineering*,
vol. 15, no. 1, pp. 37-39, 2004. (ISSN:1017-4397) (NSC92-2213-E-018-014)

82. __
Y.M. Tseng__,
"**A
scalable key management scheme with minimizing key storage for secure group
communications**”, *
International Journal of Network Management*,
vol.13, no.6, pp.419-425, 2003.
(ISSN:1055-7148) (SCI) (NSC91-2213-E-324-029)

83. __
Y.M. Tseng__,
"Cryptanalysis
and restriction of an automatic signature scheme in distributed systems”,*
IEICE **
Transactions
on Communications*,
vol.E86-B, no. 5, pp. 1679-1681,
2003.
(NSC91-2213-E-324-029) (SCI)

84. __
Y.M. Tseng__,
"Multi-party
key agreement protocols with cheater identification", *Applied Mathematics
and Computation*,
vol. 145, no.2-3, pp. 551-559,* *2003. (SCI) (NSC-91-2213-E-324-029)

85. __
Y.M. Tseng__,
J.K. Jan, and H.Y. Chien, "Authenticated encryption schemes with message
linkages for message flows", *Computers & Electrical Engineering*, vol. 29,
no. 1, pp. 101-109,* *2003. (SCI) (NSC90-2213-E-252-007)

86. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "Cryptanalysis on MU-Varadharajan's
e-voting", *Applied Mathematics and
Computation*, vol.139, no.2-3, pp. 525–530,
2003. (SCI)

87. __
Y.M. Tseng__,
J.K. Jan, and H.Y. Chien, "Digital
signature with message recovery using self-certified public keys and its
variants", *Applied Mathematics and Computation*,
vol. 136, no. 2-3, pp. 203-214, 2003. (SCI) (NSC90-2213-E-252-007)

88. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "
Partially blind threshold signature based on RSA”, *
Informatica*,
vol. 14, no. 2, pp. 155-166, 2003. (SCI) (NSC90-2213-E-252-007)

89. __
Y.M. Tseng__,
"Cryptanalysis and improvement of key distribution system for VSAT satellite
communication",
*
Informatica*,
vol. 13, no. 3, pp. 369-376,
2002.(SCI)

90. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "Forgery attacks on
multi-signature schemes for authenticating mobile code delegates", *IEEE
Transactions on Vehicular Technology*,
vol. 51, no. 6, pp. 1669-1671,
2002. (SCI)

91. __
Y.M. Tseng__,
"Robust generalized MQV key agreement protocol without using one-way hash
functions", *Computer Standards & Interfaces*, vol. 24, no. 3, pp. 241-246,*
*2002. (SCI) (NSC-89-2213-E-252-008)

92. __
Y.M. Tseng__
and J.K. Jan, "An
efficient authenticated encryption scheme with message linkages and low
communication costs",
*Journal of Information Science and Engineering*, vol. 18, no. 1, pp.
41-46,* *2002. (SCI) (NSC-90-2213-E-252-007)

93. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "An efficient and practical
solution to remote authentication: Smart card", *Computers & Security*,
vol. 21, no. 4, pp. 372-375, 2002. (SCI)

94. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "An unified approach to secret
sharing schemes with low distribution cost", *Journal of The Chinese Institute
of Engineers*,
vol. 25, no. 6, pp. 723-733, 2002. (SCI)

95. __
Y.M. Tseng__
, J.K. Jan and C.H. Wang, “Cryptanalysis and improvement of an Identity-Based
key exchange protocol”, *Journal of computers*, vol. 14, no. 3, pp. 17-22,*
*2002. (NSC-90-2213-E-252-007)

96. __
Y.M. Tseng__
and J.K. Jan, "Generalized group oriented cryptosystem with authenticated
sender", *Computer Systems Science and Engineering,* vol. 16, no. 5, pp.
291-294,* *2001. (SCI) (NSC-89-2213-E-252-008)

97. H.Y. Chien, Y.H. Chen, J.K. Jan and __Y.M. Tseng__, "Cryptanalysis on
dynamic authentication protocol for personal communication system",* IEE
Electronics Letters*, vol. 37, no. 14, pp. 895-896,* *2001. (SCI)

98. __
Y.M. Tseng__
and J.K. Jan, "Cryptanalysis of Liaw's broadcasting cryptosystem", *Computers
and Mathematics with Applications*, vol. 41, no. 12, pp. 1575-1578,* *
2001. (SCI) (NSC-89-2213-E-252-008)

99. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "A modified remote login
authentication scheme based on geometric approach", *Journal of System and
Software*, vol. 55, no. 3, pp. 287-290, 2001. (SCI)

100. __
Y.M. Tseng__,
J.K. Jan, and H.Y. Chien, "On the security methods for protecting password
transmission", *Informatica*, vol. 12, no. 3, pp. 469-476, 2001. (SCI)
(NSC89-2213-E-252-008)

101. H.Y. Chien, T.C. Wu, J.K. Jan and __Y.M. Tseng__, "Cryptanalysis of
Chang-Wu's group-oriented authentication and key exchange protocols", *
Information Processing Letters,* vol. 80, no. 2, pp. 113-117,* *2001.
(SCI)

102. __
Y.M. Tseng__,
J.K. Jan, and H.Y. Chien, "
On the security of generalization of threshold signature and authenticated
encryption",
*IEICE Trans. on Fundamentals of Electronics, Communications of Computer*,
vol. E84-A, no. 10, pp. 2606-2609,* *2001. (SCI) (NSC89-2213-E-252-008)

103. C.Y. Perng, J.K. Jan and __Y.M. Tseng__, "A efficient group-oriented (t,n)
threshold signature scheme with message linkage", *Journal of The Chinese
Institute of Engineers*, vol. 24, no. 1, pp. 113-116, 2001. (SCI)

104. __
Y.M. Tseng__,
J.K. Jan and H.Y. Chien, "Security of digital signature with one-time pair of
keys", *IEE Electronics Letters,* vol. 36, no. 16, pp. 1374-1375, 2000.
(SCI)

105. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "A practical (t,n) multi-secret
sharing scheme", *IEICE Trans. on Fundamentals of Electronics, Communications
of Computer Sciences*, vol. E83-A, no. 12, pp. 2762-2765, 2000. (SCI)

106. __
Y.M. Tseng__,
"Weakness in a simple authenticated key agreement protocol", *IEE Electronics
Letters, *vol. 36, no. 1, pp. 48-49, 2000. (SCI) (NSC89-2213-E-252-008)

107. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "Impersonation attack on
Tan-Zhu's remote login scheme",* IEE Electronics Letters,* vol.36, no.14,
pp.1202-1203, 2000. (SCI)

108.
H.C. Hsu and __
Y.M. Tseng__,
"
Non-interactive conference key distribution systems using self-certified public
keys",
*Journal of Computers*, vol. 12, no. 1, pp. 50-58, 2000.

109. __
Y.M. Tseng__
and J.K. Jan, "A novel ID-based group signature", *Information Sciences*,
vol. 120, no. 1-4, pp. 131-141, 1999. (SCI)

110. __
Y.M. Tseng__
and J.K. Jan, "Reply improved group signature scheme based on the discrete
logarithm problem", *IEE Electronics Letters, *vol. 35, no. 16, pp.
1324-1325, 1999. (SCI)

111. J.K. Jan, __Y.M. Tseng__ and H.Y. Chien, "A threshold signature scheme
withstanding the conspiracy attack", *Communications of IICM*, vol. 2, no.
3, pp. 31-38, 1999.

112. __
Y.M. Tseng__
and J.K. Jan, "Attacks on threshold signature scheme with traceable signers ",
*Information Processing Letters,* vol. 71, no. 1, pp. 1-4, 1999. (SCI)

113. __
Y.M. Tseng__
and J.K. Jan, "Anonymous conference key distribution systems based on the
discrete logarithm problem", *Computer Communications*, vol. 22, no. 8, pp.
749-754, 1999. (SCI)

114. __
Y.M. Tseng__
and J.K. Jan, "Improved group signature scheme based on the discrete logarithm
problem", *IEE Electronics Letters,* vol. 35, no. 1, pp. 37-38, 1999. (SCI)

115. J.K. Jan and __Y.M. Tseng__, "Two integrated schemes of user
authentication and access control in a distributed computer network", *IEE
Proceedings - Computers and Digital Techniques, *vol. 145, no. 6, pp.
419-424, 1998. (SCI)

116. __
Y.M. Tseng __
and J.K. Jan, "A scheme and concept for limited inheritance of privileges in a
user hierarchy", *Information Sciences,* vol. 112, no. 1-4, pp. 199-211,
1998. (SCI)

117. __
Y.M. Tseng__
and J.K. Jan, "Improvement of Chikazawa-Yamagishi ID-based key sharing system",
*IEE Electronics Letters,* vol. 34, no. 12, pp. 1221-1222, 1998. (SCI)

118. J.K. Jan and __Y.M. Tseng__, "On the security of image encryption
method", *Information Processing Letters,* vol. 60, no. 5, pp. 261-265,
1996. (SCI)

**(B)** **Conference
Papers:**

1. __Y.M.____ ____Tseng__*, J.D. Wu, R.W. Hung and
H.Y. Chien, “Leakage-resilient certificate-based
encryption scheme for IoT environments”, 2018
IEEE International Conference on Awareness Science and Technology (IEEE iCAST), Japan, pp. 1263-1266, 2018, IEEE press. (EI) (MOST 106-2221-E-007-MY2)

2. __Y.M.____ ____Tseng__*, Y.H. Hung, J.D. Wu and S.S. Huang, “Efficient
certificated-based signature over lattices”, 2018 IEEE
International Conference on Applied System Innovation (IEEE ICASI 2018), Japan, Article-J180864, 2018, IEEE press. (EI) (MOST 106-2221-E-007-MY2)

3. __Y.M.____ ____Tseng__*, S.S. Huang and J.D. Wu, “Secure
certificateless signature resisting to continual leakage attacks”, 2017 IEEE International Conference on
Applied System Innovation (IEEE ICASI 2017), pp. 1263-1266, 2017, IEEE press. (EI) (MOST 105-2221-E-018-013)

4. T.T. Tsai, __Y.M.____ ____Tseng__*, Y.H. Hung and S.S. Huang, “Cryptanalysis and improvement of provable a data possession scheme in public cloud storage”, The Third International Conference on
Computing Measurement Control and Sensor Network (CMCSN2016), Japan, May 20-22,
pp. 56-59, 2016, IEEE press. (EI) (MOST
103-2221-E-018 -022 -MY2)

5. Y.H. Hung , __Y.M.____ ____Tseng__*, and S.S. Huang, “Efficient revocable ID-based signature over lattices”, *Cryptology
and Information Security 2016 (CISC2016)*, Taiwan, May 26-27, pp. 380-388, 2016.

6. __Y.M. Tseng*__, T.T. Tsai, S.S. Huang and Y.H. Hung, “Strongly unforgeable revocable certificateless signature”, The Fourth International Conference on Informatics & Applications,
Japan, July 20-22, pp. 18-31, 2015. (MOST 103-2221-E-018 -022
-MY2)

7. C.P. Huang, T.T. Tsai, __Y.M. Tseng*__ and S.S. Huang, “Efficient ID-based encryption
with outsourced
revocation
authority”, *Cryptology and Information Security 2015 (CISC2015)*, Taiwan, May 28-29, pp. 9-20, 2015. (MOST 103-2221-E-018 -022 -MY2) (最佳論文佳作獎) (This paper obtained honorable mention of the best paper)

8. M.L. You, __Y.M.
Tseng*__ and S.S. Huang, “Strongly secure ID-based authenticated
key agreement
protocol
for mobile multi-server environments”, *Cryptology and Information Security 2015 (CISC2015)*, Taiwan, May 28-29, pp. 21-31, 2015. (MOST
103-2221-E-018 -022 -MY2) (最佳論文佳作獎) (This paper obtained honorable mention of the best paper)

9. T.T. Tsai, __Y.M. Tseng*__ and S.S. Huang, "Secure certificateless
signature in the standard model", *Cryptology and Information Security 2014 (CISC2014)*, Taiwan, May 30-31, pp.1-12, 2014. (This paper obtained the Best Paper
Award, the only one out of 63 papers). (NSC102-2221-E-018 -019)

10. L. Tseng, T.T. Tsai, __Y.M. Tseng*__ and S.S. Huang, "Ephemeral-secret-leakage
secure ID-based authenticated key exchange protocol for mobile client-serer
environments", *Cryptology and
Information Security 2014 (CISC2014)*, Taiwan, May 30-31, pp.67-78, 2014. (This paper obtained the Best Student
Paper Award, the only one out of 63 papers). (NSC102-2221-E-018 -019)

11. J.H. Ke, T.T. Tsai, Y.M. Tseng* and S.S. Huang, "Revocable ID-based mutual authentication and
key agreement protocol for multi-server environments", *Cryptology and Information Security 2014 (CISC2014)*, Taiwan, May 30-31, pp.323-334, 2014.

12. __Y.M. Tseng*__, T.T. Tsai, S.S. Huang and
H.Y. Chien, “Efficient
anonymous multi-receiver ID-based encryption with constant decryption cost”, *ISEEE2014*,
Japan, 26-28 April, pp.131-137, 2014. (EI)
(NSC102-2221-E-018 -019)

13. T.T. Tsai, __Y.M. Tseng*__ and T.Y. Wu, “Practical revocable ID-based signature with a
public channel”, *NISS2013*, 18-20
June, pp.21-26, 2013. (NSC101-2221-E-018 -027)

14. T.T. Tsai, __Y.M. Tseng*__
and T.Y. Wu, “Novel revocable
hierarchical ID-based encryption with a delegated revocation authority”,* Cryptology
and Information Security 2012 (CISC2012)*, Taiwan, May 30-31, Article-30,
2012. (This paper obtained the Best Paper Award, the
only one out of 72 papers). (NSC100-2221-E-018 -027)

15. T.Y. Wu, T.T. Tsai and __Y.M. Tseng__, “Revocable ID-based
signature scheme with batch verifications”, IIHMSP-2012, IEEE press, July 18-20, 2012, Greece, pp. 49-54, 2012. (EI) (NSC100-2221-E-018
-027)

16. __Y.M. Tseng*__, Y.H. Huang and H.J.
Chang, “CCA-secure anonymous multi-receiver ID-based
encryption”, *FINA2012 in conjunctive with AINA2012*, IEEE Computer Society, IEEE press, Japan, 26-29 March, pp.177-182, 2012. (EI)
(NSC100-2221-E-018 -027)

17. __Y.M. Tseng*__, T.Y. Wu and T.T. Tsai, “A
convinced commitment scheme for bilinear Diffie-Hellman problem”, *7th International Conference on Networked
Computing and Advanced Information Management* (*NCM2011*), Korea, June 21-23, pp. 156-161 2011. (EI) (NSC97-2221-E-018-010-MY3)

18. C.W. Yu and __Y.M. Tseng*__ and T.Y.
Wu, "A new key-insulated signature and its novel application", *Cryptology and Information Security 2010
(CISC2010)*, Taiwan, May 27-28, Article-A2-4, 2010. (最佳學生論文入選獎) (NSC97-2221-E-018-010-MY3)

19. Y.H. Chuang and __Y.M. Tseng*__, “Security weaknesses of two dynamic ID-based user authentication and key agreement
schemes for multi-server environment", Workshop on Cryptography and
Information Security, NCS2009, Taiwan, vol. 5, pp. 250-257, 2009.
(NSC97-2221-E-018-010-MY3)

20. Y.H. Chuang and __Y.M. Tseng*__, “Provably secure ID-based mutual authentication and key agreement for
multi-server environment", Workshop on Cryptography and Information
Security, NCS2009, Taiwan, vol. 5, pp. 258-269, 2009.
(NSC97-2221-E-018-010-MY3)

21. T.Y. Wu and __Y.M. Tseng*__, “Provably secure ID-based authenticated group key agreement with bilinear
pairings”, *Cryptology and Information Security 2009
(CISC2009)*, Taiwan, June 3-5, Article-B102, 2009.
(最佳學生論文佳作獎) (NSC97-2221-E-018-010-MY3)

22. __Y.M. Tseng____*__, T.Y. Wu and J.D. Wu, “Towards efficient ID-based signature schemes with batch verifications from
bilinear pairings”, 2009 International Conference on Availability, Reliability and Security
(ARES2009), Japan, 16-19 March, pp.935-940 , IEEE press, 2009. (EI) (NSC97-2221-E-018-010-MY3)

23. __Y.M. Tseng*__, T.Y. Wu, J.D. Wu, “On the security of an efficient ID-based
partially blind signature scheme”, The 2008 IAENG International Conference on Computer Science, Hong Kong, 19-21 March, vol. 1, pp.417-420, 2008. (EI) (This paper obtained the Best Paper Award, the only one out
of 34 papers). (NSC95-2221-E-018-010-MY2)

24. J.D. Wu, __Y.M. Tseng*__, T.Y. Wu, “A provably secure and efficient ID-based signature scheme supporting
variant batch verifications”, *Cryptology and Information
Security 2008 (CISC2008)*, Taiwan, May 29-30, pp.82-96, 2008. (最佳學生論文入選獎)
(NSC95-2221-E-018-010-MY2)

25. __Y.M. Tseng*__, T.Y. Wu, J.D. Wu, “A mutual authentication and key exchange scheme
from bilinear pairings for low power computing devices”, *Proc.
The 31st Annual International Computer Software & Application Conference, COMPSAC'07*,
Beijing, China, 23-27 July, vol.2, pp.700-705, IEEE press, 2007. (EI) (NSC95-2221-E-018-010-MY2)

26. __Y.M. Tseng*__, T.Y. Wu, J.D. Wu, “A practical user authentication scheme from
bilinear pairing using smart cards”, *International Conference on Business
and Information (BAI2007)*, Japan, July 10-13, Article-7131, 2007.
(NSC95-2221-E-018-010-MY2)

27. F.G. Chen and __Y.M. Tseng*__, “A contribution-oriented reputation system for peer-to-peer networks”,*
Proceedings of the Seventeenth Conference on Information Security *(ISC2007)*,* Taiwan, June 7-8, pp.517-527, 2007.

28. H.C. Lin and __Y.M. Tseng*__, “A practical and scalable ID-based protocol for secure communication in
wireless sensor networks”, *Proceedings of the Seventeenth
Conference on Information Security *(ISC2007)*,* Taiwan, June 7-8, pp. 160-168, 2007.

29. __Y.M. Tseng*__, "On the
security of two group key agreement protocols for mobile devices”, International Workshop on Future Mobile and
Ubiquitous Information Technologies(FMUIT2006), Japan, May 9-12, pp. 59-62, IEEE
press, 2006. (EI) (NSC94-2213-E-018-009)

30. M. Kone, __Y.M. Tseng*__ and J.K.
Jan, "Secure reputation system based on group transitivity and peer's
classification for peer-to-peer networks ", *Proceedings of the Sixteenth Conference on Information Security *(ISC2006)*,* Taiwan, June 8-9, pp. 554-565, 2006.
(NSC94-2213-E-018-009)

31. __Y.M. Tseng*__, C.C. Yang and J.H.
Su, “An efficient
authentication protocol for integrating WLAN and cellular networks”, *Proceeding
of the Sixth International Conference on Advanced Communication Technology 2004
(IEEE/ICACT2004)*, Korea, vol.1, pp. 416-420, 2004. (ISBN: 89-5519-119-7) (EI) (NSC92-2213-E-018-014)

32. __Y.M. Tseng*__, C.C. Yang and D.R.
Liao, “A secure group
communication protocol for ad hoc wireless networks”, *The
10th Mobile Computing Workshop (MCW 2004)*, pp. 267-276 , 2004.

33. J.K. Jan and C.H. Wang, __Y.M. Tseng*__,
"The design of authenticated key agreement protocols resistant to a
denial-of-service attack”, *Proceedings of the Thirteenth
Conference on Information Security,* pp. 516-523, 2003.

34. H.Y. Chien, J.K. Jan and Y.M. Tseng, "A RSA-based partially blind
signature with low computation", *2001
International Conference on Parallel and Distributed Systems (ICPADS'2001),*
26-29 June 2001, KyongJu City, Korea, Proceedings.
IEEE Computer Society, pp. 385-389, IEEE press, 2001. (EI) (ISBN: 0-7695-1153-8)

35. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "Undeniable billing for
anonymous channel services in wireless communication", *International Conference on Parallel and
Distributed Computing, Applications, and Techniques (PDCAT 2001)*, pp.
125-132, IEEE press, 2001. (EI) (ISBN:
957-9078-34-3)

36. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "A new generalized
group-oriented cryptosystem based on the systematic block codes",* International Computer Symposium Workshop
on Cryptology and Information Security, *pp. 26-32, Dec. 2000. (ISBN:
957-02-7308-9)

37. __Y.M. Tseng*__, J.K. Jan and H.Y.
Chien, "Authenticated encryption schemes with message linkages for message
flows", *Proceedings of the Tenth
Conference on Information Security,* pp. 401-407, May 2000.

38. H.Y. Chien, J.K. Jan and __Y.M. Tseng__, "On the general
threshold-based secret sharing scheme",*
Proceedings of the Tenth Conference on Information Security,* pp. 285-290,
2000.

39. H.Y. Chien, T.C. Wu, J.K. Jan and __Y.M. Tseng__, "Improvements
of group-oriented authentication and key exchange protocols",* Proceedings of National Computer Symposium
1999, *Part C,* *pp. 210-214, 1999.

40. J.K. Jan and __Y.M. Tseng__, "New digital signature with
subliminal channels based on the discrete logarithm problem", Proceedings
of the 1999 ICPP Workshops, 21-24 September, 1999, Wakamatsu, Japan. IEEE
Computer Society, pp.198-203, IEEE press, 1999. (EI)
(ISBN: 0-7695-0353-5)

41. __Y.M. Tseng__ and J.K. Jan, "A group signature scheme based
on a self-certified public-key system", *Proceedings of the Ninth Conference on Information Security,*
pp.165-172, 1999.

42. __Y.M. Tseng__ and J.K. Jan, "A novel ID-based group
signature", *International Computer
Symposium Workshop on Cryptology and Information Security, *pp.159-164,
1998. (ISBN: 957-

43. __Y.M. Tseng__ and J.K. Jan, "ID-based cryptographic schemes
using a non-interactive public-key distribution system",* The 14th Annual Computer Security
Applications Conference *(ACSAC 1998), 7-11 December 1998, Scottsdale, AZ,
USA., IEEE Computer Society, pp.237-243, IEEE press, 1998. (EI) (ISBN: 0-8186-8789-4)

44. __Y.M. Tseng __and J.K. Jan, "An ID-based conference key
distribution system with user attendance for the star configuration",* Proceedings of the Eighth Conference on
Information Security,* pp.393-400, 1998.

45. __Y.M. Tseng __and J.K. Jan, "A fair approach for key
escrow systems",* The 13th
Technological and Vocational Education Conference,* pp.131-139, 1998.

46. __Y.M. Tseng __and J.K. Jan, "A role-based authorization
model for large distributed hypertext systems",* Proceedings of National Computer Symposium 1997, *pp.170-176, 1997.

47. __Y.M. Tseng __and J.K. Jan, "A scheme for authorization
inheritance in a user hierarchy", *1997
Information Security Conference, *pp.109-115, 1997.