Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Changlu
    Last name: Lin
    DBLP: 00/1114
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 30  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yong Li 0002, Ge Yao, Huaqun Wang, Changlu Lin.
    Large Branching Tree Based Dynamic Provable Data Possession Scheme.
    J. Inf. Sci. Eng. 2017, Volume 33 (0) 2017
    Journal article
    Feng Wang, Chin-Chen Chang, Changlu Lin, Shih-Chang Chang.
    Secure and Efficient Identity-based Proxy Multi-signature Using Cubic Residues.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Feng Wang, Chin-Chen Chang, Changlu Lin.
    Security Analysis on Secure Untraceable Off-line Electronic Cash System.
    I. J. Network Security 2016, Volume 18 (0) 2016
    Conference paper
    Ge Yao, Yong Li 0002, Linan Lei, Huaqun Wang, Changlu Lin.
    An Efficient Dynamic Provable Data Possession Scheme in Cloud Storage.
    Green, Pervasive, and Cloud Computing - 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings 2016 (0) 2016
    Conference paper
    Fucai Luo, Changlu Lin, Yan Zhu.
    Role-Based Signature and Its Security Proof.
    J. Inf. Sci. Eng. 2016, Volume 32 (0) 2016
    Conference paper
    Yining Liu, Wei Guo, Chi Cheng, Chingfang Hsu, Junyan Qian, Changlu Lin.
    A Robust Electronic Voting Scheme Against Side Channel Attack.
    J. Inf. Sci. Eng. 2016, Volume 32 (0) 2016
    Journal article
    Changlu Lin, Yong Li 0002, Kewei Lv, Chin-Chen Chang.
    Ciphertext-Auditable Identity-Based Encryption.
    I. J. Network Security 2015, Volume 17 (0) 2015
    Journal article
    Lein Harn, Changlu Lin, Yong Li 0002.
    Fair secret reconstruction in (t, n) secret sharing.
    J. Inf. Sec. Appl. 2015, Volume 23 (0) 2015
    Conference paper
    Changlu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu.
    A Provable Data Possession Scheme with Data Hierarchy in Cloud.
    Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers 2016 (0) 2015
    Conference paper
    Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn, Shengyuan Zhang.
    Secure universal designated verifier identity-based signcryption.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Lein Harn, Changlu Lin.
    Efficient group Diffie-Hellman key agreement protocols.
    Computers Electrical Engineering 2014, Volume 40 (0) 2014
    Conference paper
    Xi Chen, Yun Liu, Chin-Chen Chang, Changlu Lin.
    The design of dynamic access control for hierarchical sensor networks with key-lock-pair mechanism.
    IJAHUC 2014, Volume 17 (0) 2014
    Journal article
    Lein Harn, Changlu Lin.
    An efficient group authentication for group communications.
    CoRR 2013, Volume 0 (0) 2013
    Conference paper
    Xiuqun Wang, Changlu Lin, Yong Li 0002.
    Proactive Secret Sharing without a Trusted Party.
    2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013 2013 (0) 2013
    Conference paper
    Fei Tang, Changlu Lin, Hongda Li.
    ID-Based Signcryption with Restrictive Unsigncryption.
    2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013 2013 (0) 2013
    Conference paper
    Fei Tang, Changlu Lin, Pinhui Ke.
    Universal Designated Verifier Signcryption.
    Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Changlu Lin, Yong Li 0002, Sriramkrishnan Srinivasan, Li Lu.
    Analysis on Token-Controlled Public Key Encryption.
    8th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2012, Chengdu, China, December 14-16, 2012 2012 (0) 2012
    Conference paper
    Lein Harn, Chia-Yin Lee, Changlu Lin, Chin-Chen Chang.
    Fully Deniable Message Authentication Protocols Preserving Confidentiality.
    Comput. J. 2011, Volume 54 (0) 2011
    Conference paper
    Fei Tang, Changlu Lin, Yong Li 0002, Shengyuan Zhang.
    Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability.
    IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011 2011 (0) 2011
    Conference paper
    Lein Harn, Changlu Lin.
    Authenticated Group Key Transfer Protocol Based on Secret Sharing.
    IEEE Trans. Computers 2010, Volume 59 (0) 2010
    Conference paper
    Lein Harn, Changlu Lin.
    Strong (n, t, n) verifiable secret sharing scheme.
    Inf. Sci. 2010, Volume 180 (0) 2010
    Conference paper
    Lein Harn, Wen-Jung Hsin, Changlu Lin.
    Efficient On-line/Off-line Signature Schemes Based on Multiple-Collision Trapdoor Hash Families.
    Comput. J. 2010, Volume 53 (0) 2010
    Conference paper
    Changlu Lin, Lein Harn, Dingfeng Ye.
    Information-theoretically Secure Strong Verifiable Secret Sharing.
    SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2009 (0) 2009
    Conference paper
    Changlu Lin, Lein Harn, Dingfeng Ye.
    Ideal Perfect Multilevel Threshold Secret Sharing Scheme.
    Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009 2009 (0) 2009
    Conference paper
    Lein Harn, Changlu Lin.
    Detection and identification of cheaters in (
    Des. Codes Cryptography 2009, Volume 52 (0) 2009
    Show item 1 to 25 of 30  

    Your query returned 30 matches in the database.